This tool is an ongoing experiment in better HTML checking, and its behavior remains subject to change
The document validates according to the specified schema(s).
<!DOCTYPE html>↩<html lang="en" xml:lang="en">↩ <head>↩ <meta charset="UTF-8">↩ <title>Cybersecurity</title>↩ <meta name="description" content="Cybersecurity resources including cryptography, network security, privacy, authentication, password cracking, and operating system hardening.">↩ <!-- start of standard header -->↩ <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">↩↩ <!-- style -->↩ <link rel="stylesheet" href="/css/bootstrap.min.css">↩ <link rel="stylesheet" href="/css/style.css">↩↩ <link rel="icon" type="image/png" href="/pictures/favicon.png">↩ <!-- Safari -->↩ <link rel="apple-touch-icon" href="/pictures/touch-icon-iphone-152x152.png">↩↩ <!-- Facebook, Twitter -->↩ <link rel='canonical' href='https://cromwell-intl.com/cybersecurity/'>↩ <meta property='og:title' content='Cybersecurity'>↩ <meta name='twitter:title' content='Cybersecurity'>↩ <meta name='twitter:description' content='Cybersecurity resources including cryptography, network security, privacy, authentication, password cracking, and operating system hardening.'>↩ <meta property='og:description' content='Cybersecurity resources including cryptography, network security, privacy, authentication, password cracking, and operating system hardening.'>↩ <meta property="fb:admins" content="bob.cromwell.10">↩ <meta property="fb:app_id" content="9869919170">↩ <meta property="og:type" content="website">↩ <meta property="og:url" content="https://cromwell-intl.com/cybersecurity/Index.html">↩ <meta property="og:site_name" content="Bob Cromwell: Travel, Linux, Cybersecurity">↩ <meta name="twitter:url" content="https://cromwell-intl.com/cybersecurity/Index.html">↩ <meta name="twitter:card" content="summary_large_image">↩ <meta name="twitter:creator" content="@ToiletGuru">↩↩ <!-- Google Page-level ads for mobile -->↩ <!-- Note: only need the adsbygoogle.js script this↩ one time in the header, not in every ad -->↩ <script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>↩ <script>↩ (adsbygoogle = window.adsbygoogle || []).push({↩ google_ad_client: "ca-pub-5845932372655417",↩ enable_page_level_ads: true↩ });↩ </script>↩↩ <!-- Google webmaster tools -->↩ <meta name="google-site-verification" content="-QwRAzF67ZlYJ9S4v3SCsyDceuoD2J7wLepdqiSX_Q4">↩ <link rel="author" href="https://plus.google.com/+BobCromwell">↩↩ <!-- Google translate -->↩ <meta name="google-translate-customization" content="e577b45d2703b3f4-274692b0024c3c77-gc02a134c617e3801-12">↩↩ <!-- Bing webmaster tools -->↩ <meta name="msvalidate.01" content="3E2092BE1413B6791596BCC09A493E58">↩↩ ↩ ↩ ↩ <script async src="https://fundingchoicesmessages.google.com/i/pub-5845932372655417?ers=1" nonce="-Qie8LU8Uq0o7aahCyvM1Q"></script><script nonce="-Qie8LU8Uq0o7aahCyvM1Q">(function() {function signalGooglefcPresent() {if (!window.frames['googlefcPresent']) {if (document.body) {const iframe = document.createElement('iframe'); iframe.style = 'width: 0; height: 0; border: none; z-index: -1000; left: -1000px; top: -1000px;'; iframe.style.display = 'none'; iframe.name = 'googlefcPresent'; document.body.appendChild(iframe);} else {setTimeout(signalGooglefcPresent, 0);}}}signalGooglefcPresent();})();</script>↩ <script>(function(){/*↩ Copyright The Closure Library Authors.↩ SPDX-License-Identifier: Apache-2.0↩ */↩ 'use strict';var aa=function(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}},ba="function"==typeof Object.create?Object.create:function(a){var b=function(){};b.prototype=a;return new b},k;if("function"==typeof Object.setPrototypeOf)k=Object.setPrototypeOf;else{var m;a:{var ca={a:!0},n={};try{n.__proto__=ca;m=n.a;break a}catch(a){}m=!1}k=m?function(a,b){a.__proto__=b;if(a.__proto__!==b)throw new TypeError(a+" is not extensible");return a}:null}↩ var p=k,q=function(a,b){a.prototype=ba(b.prototype);a.prototype.constructor=a;if(p)p(a,b);else for(var c in b)if("prototype"!=c)if(Object.defineProperties){var d=Object.getOwnPropertyDescriptor(b,c);d&&Object.defineProperty(a,c,d)}else a[c]=b[c];a.v=b.prototype},r=this||self,da=function(){},t=function(a){return a};var u;var w=function(a,b){this.g=b===v?a:""};w.prototype.toString=function(){return this.g+""};var v={},x=function(a){if(void 0===u){var b=null;var c=r.trustedTypes;if(c&&c.createPolicy){try{b=c.createPolicy("goog#html",{createHTML:t,createScript:t,createScriptURL:t})}catch(d){r.console&&r.console.error(d.message)}u=b}else u=b}a=(b=u)?b.createScriptURL(a):a;return new w(a,v)};var A=function(){return Math.floor(2147483648*Math.random()).toString(36)+Math.abs(Math.floor(2147483648*Math.random())^Date.now()).toString(36)};var B={},C=null;var D="function"===typeof Uint8Array;function E(a,b,c){return"object"===typeof a?D&&!Array.isArray(a)&&a instanceof Uint8Array?c(a):F(a,b,c):b(a)}function F(a,b,c){if(Array.isArray(a)){for(var d=Array(a.length),e=0;e<a.length;e++){var f=a[e];null!=f&&(d[e]=E(f,b,c))}Array.isArray(a)&&a.s&&G(d);return d}d={};for(e in a)Object.prototype.hasOwnProperty.call(a,e)&&(f=a[e],null!=f&&(d[e]=E(f,b,c)));return d}↩ function ea(a){return F(a,function(b){return"number"===typeof b?isFinite(b)?b:String(b):b},function(b){var c;void 0===c&&(c=0);if(!C){C={};for(var d="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789".split(""),e=["+/=","+/","-_=","-_.","-_"],f=0;5>f;f++){var h=d.concat(e[f].split(""));B[f]=h;for(var g=0;g<h.length;g++){var l=h[g];void 0===C[l]&&(C[l]=g)}}}c=B[c];d=Array(Math.floor(b.length/3));e=c[64]||"";for(f=h=0;h<b.length-2;h+=3){var y=b[h],z=b[h+1];l=b[h+2];g=c[y>>2];y=c[(y&3)<<↩ 4|z>>4];z=c[(z&15)<<2|l>>6];l=c[l&63];d[f++]=""+g+y+z+l}g=0;l=e;switch(b.length-h){case 2:g=b[h+1],l=c[(g&15)<<2]||e;case 1:b=b[h],d[f]=""+c[b>>2]+c[(b&3)<<4|g>>4]+l+e}return d.join("")})}var fa={s:{value:!0,configurable:!0}},G=function(a){Array.isArray(a)&&!Object.isFrozen(a)&&Object.defineProperties(a,fa);return a};var H;var J=function(a,b,c){var d=H;H=null;a||(a=d);d=this.constructor.u;a||(a=d?[d]:[]);this.j=d?0:-1;this.h=null;this.g=a;a:{d=this.g.length;a=d-1;if(d&&(d=this.g[a],!(null===d||"object"!=typeof d||Array.isArray(d)||D&&d instanceof Uint8Array))){this.l=a-this.j;this.i=d;break a}void 0!==b&&-1<b?(this.l=Math.max(b,a+1-this.j),this.i=null):this.l=Number.MAX_VALUE}if(c)for(b=0;b<c.length;b++)a=c[b],a<this.l?(a+=this.j,(d=this.g[a])?G(d):this.g[a]=I):(d=this.l+this.j,this.g[d]||(this.i=this.g[d]={}),(d=this.i[a])?↩ G(d):this.i[a]=I)},I=Object.freeze(G([])),K=function(a,b){if(-1===b)return null;if(b<a.l){b+=a.j;var c=a.g[b];return c!==I?c:a.g[b]=G([])}if(a.i)return c=a.i[b],c!==I?c:a.i[b]=G([])},M=function(a,b){var c=L;if(-1===b)return null;a.h||(a.h={});if(!a.h[b]){var d=K(a,b);d&&(a.h[b]=new c(d))}return a.h[b]};J.prototype.toJSON=function(){var a=N(this,!1);return ea(a)};↩ var N=function(a,b){if(a.h)for(var c in a.h)if(Object.prototype.hasOwnProperty.call(a.h,c)){var d=a.h[c];if(Array.isArray(d))for(var e=0;e<d.length;e++)d[e]&&N(d[e],b);else d&&N(d,b)}return a.g},O=function(a,b){H=b=b?JSON.parse(b):null;a=new a(b);H=null;return a};J.prototype.toString=function(){return N(this,!1).toString()};var P=function(a){J.call(this,a)};q(P,J);function ha(a){var b,c=(a.ownerDocument&&a.ownerDocument.defaultView||window).document,d=null===(b=c.querySelector)||void 0===b?void 0:b.call(c,"script[nonce]");(b=d?d.nonce||d.getAttribute("nonce")||"":"")&&a.setAttribute("nonce",b)};var Q=function(a,b){b=String(b);"application/xhtml+xml"===a.contentType&&(b=b.toLowerCase());return a.createElement(b)},R=function(a){this.g=a||r.document||document};R.prototype.appendChild=function(a,b){a.appendChild(b)};var S=function(a,b,c,d,e,f){try{var h=a.g,g=Q(a.g,"SCRIPT");g.async=!0;g.src=b instanceof w&&b.constructor===w?b.g:"type_error:TrustedResourceUrl";ha(g);h.head.appendChild(g);g.addEventListener("load",function(){e();d&&h.head.removeChild(g)});g.addEventListener("error",function(){0<c?S(a,b,c-1,d,e,f):(d&&h.head.removeChild(g),f())})}catch(l){f()}};var ia=r.atob("aHR0cHM6Ly93d3cuZ3N0YXRpYy5jb20vaW1hZ2VzL2ljb25zL21hdGVyaWFsL3N5c3RlbS8xeC93YXJuaW5nX2FtYmVyXzI0ZHAucG5n"),ja=r.atob("WW91IGFyZSBzZWVpbmcgdGhpcyBtZXNzYWdlIGJlY2F1c2UgYWQgb3Igc2NyaXB0IGJsb2NraW5nIHNvZnR3YXJlIGlzIGludGVyZmVyaW5nIHdpdGggdGhpcyBwYWdlLg=="),ka=r.atob("RGlzYWJsZSBhbnkgYWQgb3Igc2NyaXB0IGJsb2NraW5nIHNvZnR3YXJlLCB0aGVuIHJlbG9hZCB0aGlzIHBhZ2Uu"),la=function(a,b,c){this.h=a;this.j=new R(this.h);this.g=null;this.i=[];this.l=!1;this.o=b;this.m=c},V=function(a){if(a.h.body&&!a.l){var b=↩ function(){T(a);r.setTimeout(function(){return U(a,3)},50)};S(a.j,a.o,2,!0,function(){r[a.m]||b()},b);a.l=!0}},T=function(a){for(var b=W(1,5),c=0;c<b;c++){var d=X(a);a.h.body.appendChild(d);a.i.push(d)}b=X(a);b.style.bottom="0";b.style.left="0";b.style.position="fixed";b.style.width=W(100,110).toString()+"%";b.style.zIndex=W(2147483544,2147483644).toString();b.style["background-color"]=ma(249,259,242,252,219,229);b.style["box-shadow"]="0 0 12px #888";b.style.color=ma(0,10,0,10,0,10);b.style.display=↩ "flex";b.style["justify-content"]="center";b.style["font-family"]="Roboto, Arial";c=X(a);c.style.width=W(80,85).toString()+"%";c.style.maxWidth=W(750,775).toString()+"px";c.style.margin="24px";c.style.display="flex";c.style["align-items"]="flex-start";c.style["justify-content"]="center";d=Q(a.j.g,"IMG");d.className=A();d.src=ia;d.style.height="24px";d.style.width="24px";d.style["padding-right"]="16px";var e=X(a),f=X(a);f.style["font-weight"]="bold";f.textContent=ja;var h=X(a);h.textContent=ka;Y(a,↩ e,f);Y(a,e,h);Y(a,c,d);Y(a,c,e);Y(a,b,c);a.g=b;a.h.body.appendChild(a.g);b=W(1,5);for(c=0;c<b;c++)d=X(a),a.h.body.appendChild(d),a.i.push(d)},Y=function(a,b,c){for(var d=W(1,5),e=0;e<d;e++){var f=X(a);b.appendChild(f)}b.appendChild(c);c=W(1,5);for(d=0;d<c;d++)e=X(a),b.appendChild(e)},W=function(a,b){return Math.floor(a+Math.random()*(b-a))},ma=function(a,b,c,d,e,f){return"rgb("+W(Math.max(a,0),Math.min(b,255)).toString()+","+W(Math.max(c,0),Math.min(d,255)).toString()+","+W(Math.max(e,0),Math.min(f,↩ 255)).toString()+")"},X=function(a){a=Q(a.j.g,"DIV");a.className=A();return a},U=function(a,b){0>=b||null!=a.g&&0!=a.g.offsetHeight&&0!=a.g.offsetWidth||(na(a),T(a),r.setTimeout(function(){return U(a,b-1)},50))},na=function(a){var b=a.i;var c="undefined"!=typeof Symbol&&Symbol.iterator&&b[Symbol.iterator];b=c?c.call(b):{next:aa(b)};for(c=b.next();!c.done;c=b.next())(c=c.value)&&c.parentNode&&c.parentNode.removeChild(c);a.i=[];(b=a.g)&&b.parentNode&&b.parentNode.removeChild(b);a.g=null};var pa=function(a,b,c,d,e){var f=oa(c),h=function(l){l.appendChild(f);r.setTimeout(function(){f?(0!==f.offsetHeight&&0!==f.offsetWidth?b():a(),f.parentNode&&f.parentNode.removeChild(f)):a()},d)},g=function(l){document.body?h(document.body):0<l?r.setTimeout(function(){g(l-1)},e):b()};g(3)},oa=function(a){var b=document.createElement("div");b.className=a;b.style.width="1px";b.style.height="1px";b.style.position="absolute";b.style.left="-10000px";b.style.top="-10000px";b.style.zIndex="-10000";return b};var L=function(a){J.call(this,a)};q(L,J);var qa=function(a){J.call(this,a)};q(qa,J);var ra=function(a,b){this.l=a;this.m=new R(a.document);this.g=b;this.i=K(this.g,1);b=M(this.g,2);this.o=x(K(b,4)||"");this.h=!1;b=M(this.g,13);b=x(K(b,4)||"");this.j=new la(a.document,b,K(this.g,12))};ra.prototype.start=function(){sa(this)};↩ var sa=function(a){ta(a);S(a.m,a.o,3,!1,function(){a:{var b=a.i;var c=r.btoa(b);if(c=r[c]){try{var d=O(P,r.atob(c))}catch(e){b=!1;break a}b=b===K(d,1)}else b=!1}b?Z(a,K(a.g,14)):(Z(a,K(a.g,8)),V(a.j))},function(){pa(function(){Z(a,K(a.g,7));V(a.j)},function(){return Z(a,K(a.g,6))},K(a.g,9),K(a.g,10),K(a.g,11))})},Z=function(a,b){a.h||(a.h=!0,a=new a.l.XMLHttpRequest,a.open("GET",b,!0),a.send())},ta=function(a){var b=r.btoa(a.i);a.l[b]&&Z(a,K(a.g,5))};(function(a,b){r[a]=function(c){for(var d=[],e=0;e<arguments.length;++e)d[e-0]=arguments[e];r[a]=da;b.apply(null,d)}})("__h82AlnkH6D91__",function(a){"function"===typeof window.atob&&(new ra(window,O(qa,window.atob(a)))).start()});}).call(this);↩↩ window.__h82AlnkH6D91__("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");</script>↩↩<!-- end of standard header -->↩ <meta name="twitter:image" content="https://cromwell-intl.com/cybersecurity/crypto/pictures/m-209-1291-banner.jpg">↩ <meta property="og:image" content="https://cromwell-intl.com/cybersecurity/crypto/pictures/m-209-1291-banner.jpg">↩ <style>↩ td { vertical-align: middle; }↩ </style>↩ </head>↩↩ <body>↩ <article itemscope itemtype="https://schema.org/Article" class="container-fluid">↩ <!-- start of schema.org microdata included in all pages -->↩ <span itemprop='image' itemscope itemtype='https://schema.org/imageObject'>↩ <meta itemprop='url' content='https://cromwell-intl.com/cybersecurity/crypto/pictures/m-209-1291-banner.jpg'>↩ <meta itemprop='width' content='1422px'>↩ <meta itemprop='height' content='396px'>↩ </span>↩ <meta itemprop='author' content='Bob Cromwell'>↩ <span itemprop='publisher' itemscope itemtype='https://schema.org/organization'>↩ <meta itemprop='name' content='Cromwell International'>↩ <span itemprop='logo' itemscope itemtype='https://schema.org/imageObject'>↩ <meta itemprop='url' content='https://cromwell-intl.com/pictures/cartoon-headshot-2484-10pc.jpg'>↩ <meta itemprop='width' content='310px'>↩ <meta itemprop='height' content='259px'>↩ </span>↩ </span>↩ <meta itemprop='headline' content='Cybersecurity'>↩ <meta itemprop='datePublished' content='2024-04-13'>↩ <meta itemprop='dateModified' content='2024-04-13'>↩ <meta itemprop='mainEntityOfPage' content='https://cromwell-intl.com/cybersecurity/Index.html'>↩ <!-- end of schema.org microdata -->↩ <meta itemprop="about" content="cybersecurity">↩ <meta itemprop="about" content="cryptography">↩ <meta itemprop="about" content="Linux">↩ <header>↩ <div style="background:black;">↩ <img src="/cybersecurity/crypto/pictures/m-209-1291-banner.jpg"↩ alt="Rotors of M-209 cipher machine.">↩ </div>↩ <h1>Computer System and Network Security</h1>↩ <div class="centered top-banner">↩<ins class="adsbygoogle top-banner"↩ style="display:inline-block; width:100%;"↩ data-full-width-responsive="true"↩ data-ad-client="ca-pub-5845932372655417"↩ data-ad-slot="4849215406"></ins>↩<script>↩ (adsbygoogle = window.adsbygoogle || []).push({});↩</script>↩</div>↩ </header>↩↩ <h2 class="centered"> Cybersecurity </h2>↩↩ <p>↩ <strong>Cybersecurity becomes more important every year,↩ as we rely more and more on the world-wide↩ Internet in government, business, and our↩ private lives.</strong>↩ <br><br>↩ Everyone needs to know how to be safe enough in their↩ personal email and web browsing.↩ Start with my↩ <a href="/cybersecurity/basics/">introductory page</a>↩ if you're new to cybersecurity.↩ <br><br>↩ Certifications are the coin of the realm nowadays,↩ and they're the main reason many people come to this page.↩ And so, here's my guidance on preparing and passing the exams:↩ </p>↩↩ <div class="row centered" style="max-width:60em;">↩↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/comptia/" class="btn btn-block btn-danger btn-lg">↩ Study guide for <br> CompTIA Security+</a>↩ </div>↩↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/isc2-cissp/" class="btn btn-block btn-danger btn-lg">↩ Study guide for <br> (ISC)<sup>2</sup> CISSP</a>↩ </div>↩↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/isc2-ccsp/" class="btn btn-block btn-danger btn-lg">↩ Study guide for <br> (ISC)<sup>2</sup> CCSP</a>↩ </div>↩↩ <div class="col-12">↩ <a href="/cybersecurity/exam-language-tricks/" class="btn btn-block btn-danger btn-lg">↩ How To Defeat the Language Tricks↩ (ISC)<sup>2</sup> and CompTIA Use↩ to Unfairly Lower Your Score</a>↩ </div>↩↩ </div>↩↩ <p>↩ The rest of these pages provide background for the courses↩ I write and teach.↩ They list the references and URLs for various tools,↩ studies, news reports, and other things that come up↩ in courses.↩ I use these pages myself, so I don't have to try to↩ memorize URLs and other reference details!↩ <br><br>↩ Here's that starting point:↩ </p>↩↩ <p class="centered">↩ <a href="/cybersecurity/basics/" class="btn btn-lg btn-info btn-block">↩ <strong>Cybersecurity Basics</strong> <br>↩ How to stay safe online</a>↩ </p>↩↩ <p class="canvased textright" style="margin-top:5px;">↩ <strong><em>Few persons can be made to believe that↩ it is not quite an easy thing to invent a↩ method of secret writing which shall baffle↩ investigation.↩ Yet it may be roundly asserted that human↩ ingenuity cannot concoct a cipher which↩ human ingenuity cannot resolve.</em></strong>↩ <br>— Edgar Allan Poe, in "A Few Words On↩ Secret Writing", <em>Graham's Magazine,</em>↩ July 1841↩ </p>↩↩ <div class="centered cb">↩<ins class="adsbygoogle responsive"↩ style="display:block;"↩ data-full-width-responsive="true"↩ data-ad-client="ca-pub-5845932372655417"↩ data-ad-slot="4849215406"></ins>↩<script>↩ (adsbygoogle = window.adsbygoogle || []).push({});↩</script>↩</div>↩↩ <nav>↩ <h2> Fundamentals — Cryptography and Networking</h2>↩↩ <div class="row centered">↩↩ <div class="col-12 col-md-7 col-lg-6">↩ <table>↩ <tr>↩ <td style="width:50%;">↩ <img src="pictures/enigma-7615.jpg"↩ alt="German Enigma encryption machine, three rotors, open with rotors exposed."↩ class="bordered captioned" loading="lazy">↩ </td>↩ <td style="width:50%;">↩ <img src="pictures/sigaba-7618.jpg"↩ alt="U.S. SIGABA encryption machine."↩ class="bordered captioned" loading="lazy">↩ </td>↩ </tr>↩ <tr>↩ <td class="caption" colspan="2"↩ style="background:#c0c0c0;↩ font-size: 85%;↩ margin-top:0; padding-top:0;↩ max-width: 414px;">↩ World War Two cryptographic hardware<br>↩ <strong>Left:</strong> German Enigma encryption machine <br>↩ <strong>Right:</strong> U.S. SIGABA encryption machine <br>↩ National Museum of the U.S. Air Force, WPAFB↩ </td>↩ </tr>↩ </table>↩ <div class="centered">↩ <a href="https://amzn.to/3Oxrs7B">↩ <img src="/amazon-pictures/amzn-dark-territory.jpg"↩ alt="Dark Territory: The Secret History of Cyber War"↩ class="bordered captioned" loading="lazy"></a>↩ <br><span class="badge badge-pill badge-primary">↩ Amazon 1476763267</span>↩ </div>↩ </div>↩↩ <div class="col-12 col-md-5 col-lg-6">↩ <a href="/cybersecurity/crypto/" class="btn btn-block btn-info">↩ <strong>Just Enough Cryptography</strong><br>↩ <em>↩ Cryptographic algorithms,↩ digital signatures,↩ cryptographic hashes,↩ the basics of how they work</em></a>↩ <a href="/cybersecurity/crypto-flowcharts.html" class="btn btn-block btn-info">↩ <strong>Cryptography Flowcharts</strong></a>↩ <a href="/cybersecurity/cipher-selection.html" class="btn btn-block btn-info">↩ <strong>Selecting an Encryption Cipher and Mode</strong></a>↩ <a href="/cybersecurity/elliptic-curve-cryptography/" class="btn btn-block btn-info">↩ <strong>How Elliptic-Curve Cryptography Works</strong></a>↩ <a href="/cybersecurity/how-rsa-works.html" class="btn btn-block btn-info">↩ <strong>How RSA Works</strong></a>↩ <a href="/cybersecurity/verify-digital-signature.html" class="btn btn-block btn-info">↩ <strong>How to Verify Digital Signatures</strong></a>↩ <a href="/networking/" class="btn btn-block btn-info">↩ <strong>TCP/IP</strong> —↩ How the networking protocols work</a>↩ <a href="/networking/routing.html" class="btn btn-block btn-info">↩ <strong>How Does IP Routing Work?</strong></a>↩ <a href="/networking/nat.html" class="btn btn-block btn-info">↩ <strong>How Does NAT Work?</strong></a>↩ <a href="/networking/what-is-ipsec.html" class="btn btn-block btn-info">↩ <strong>A simple explanation of IPsec</strong><br>↩ <em> What IPsec is,↩ what network security it provides,↩ how it builds a VPN,↩ how to set it up</em></a>↩ <a href="/cybersecurity/crypto/hash-search.html" class="btn btn-block btn-info">↩ <strong>Are all hash outputs possible?</strong></a>↩ </div>↩↩ </div>↩↩ <div class="centered cb">↩<ins class="adsbygoogle responsive"↩ style="display:block;"↩ data-full-width-responsive="true"↩ data-ad-client="ca-pub-5845932372655417"↩ data-ad-slot="4849215406"></ins>↩<script>↩ (adsbygoogle = window.adsbygoogle || []).push({});↩</script>↩</div>↩↩ <p class="canvased textright" style="margin-top:5px;">↩ <strong><em>We will bankrupt ourselves in the vain search↩ for absolute security.</em></strong>↩ <br>— Dwight D. Eisenhower↩ </p>↩↩ <h2 class="centered">Information Security</h2>↩↩ <div class="row centered">↩ <div class="col-12">↩ <a href="/cybersecurity/privacy.html" class="btn btn-block btn-info">↩ <strong>Confidentiality and↩ Data Integrity Tools</strong><br>↩ <em> PGP & Gnu Privacy Guard,↩ Key Recovery,↩ RADIUS,↩ Risks of Google,↩ Sanitizing Media,↩ Secure Online Data Storage,↩ Information Leakage,↩ Commercial Cryptography,↩ SSH, Secure FTP,↩ Hardware Encryption,↩ Voice Scramblers,↩ Cryptography and International Law,↩ X Privacy and <code>xspy</code>,↩ IPSec,↩ VPN's,↩ Key Loggers,↩ Spyware</em></a>↩ </div>↩↩ <div class="col-12 col-md-5">↩ <a href="/cybersecurity/regulations.html" class="btn btn-block btn-info">↩ <strong>Government and Industry Regulations</strong><br>↩ <em>HIPAA, Sarbanes-Oxley (Sarbox/SOX),↩ PCI DSS (Payment Card Industry↩ Data Security Standard)</em></a>↩ </div>↩ <div class="col-12 col-md-7">↩ <a href="/cybersecurity/backdoors.html" class="btn btn-info">↩ <strong>Backdoor Problems</strong><br>↩ <em>Government-imposed backdoors make↩ security much worse for↩ individuals, businesses,↩ and the government itself</em></a>↩ </div>↩↩ </div>↩↩ <div class="row centered">↩↩ <div class="col-12 col-md-6 col-lg-4">↩ <a href="/cybersecurity/surveillance.html" class="btn btn-block btn-info">↩ <strong>Government Surveillance</strong><br>↩ <em>US and other government surveillance,↩ PRISM /↩ US-984XN /↩ XKeyscore /↩ Boundless Informant↩ programs,↩ backdoors and weaknesses</em></a>↩ </div>↩↩ <div class="col-12 col-md-6 col-lg-3">↩ <a href="/cybersecurity/availability/" class="btn btn-block btn-info">↩ <strong>Availability Tools</strong><br>↩ <em>Remote and local archiving,↩ Real costs of data loss,↩ Laptop theft prevention,↩ Fighting spam</em></a>↩ </div>↩↩ <div class="col-12 col-md-6 col-lg-3">↩ <a href="/cybersecurity/availability/destruction.html" class="btn btn-block btn-info">↩ <strong>Data Destruction</strong><br>↩ <em>Overwriting digital storage,↩ Destroying physical media</em></a>↩ </div>↩↩ <div class="col-12 col-md-6 col-lg-2">↩ <a href="/cybersecurity/availability/ddos.html" class="btn btn-block btn-info">↩ <strong>DDOS</strong><br>↩ <em>Distributed denial of service</em></a>↩ </div>↩↩ </div>↩↩ <div class="row centered">↩↩ <div class="col-12 col-md-6 col-lg-3">↩ <a href="/cybersecurity/availability/storage-longevity.html" class="btn btn-block btn-info">↩ <strong>Storage Longevity</strong><br>↩ <em>Media longevity and failure rates,↩ Format longevity</em></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-3">↩ <a href="/cybersecurity/availability/cloud-archiving.html" class="btn btn-block btn-info">↩ <strong>Cloud Archiving</strong><br>↩ <em>Google Coldline, AWS Glacier,↩ Cloud archiving tools</em></a>↩ </div>↩↩ <div class="col-12 col-lg-6">↩ <a href="/cybersecurity/forensics.html" class="btn btn-block btn-info">↩ <strong>Computer Forensics</strong><br>↩ <em>Free tools for forensics and↩ recovering deleted pictures from↩ camera memory,↩ file system forks and↩ Alternate Data Streams,↩ EFS and forensics</em></a>↩ </div>↩↩ <div class="col-12">↩ <a href="/cybersecurity/mobile-phone-security/" class="btn btn-block btn-info">↩ <strong>Minimize the Impact of↩ Smart Phone Loss or Theft</strong><br>↩ You can't prevent such an event,↩ but you can creatly minimize its impact by↩ configuring and using your phone in↩ safer ways</a>↩ </div>↩↩ </div>↩↩ <p class="canvased textright" style="margin-top:5px;">↩ <strong><em>Treat your password like your toothbrush.↩ Don't let anybody else use it,↩ and get a new one every six months. </em></strong>↩ <br>— Clifford Stoll↩ </p>↩↩ <h2 class="centered">User Authentication</h2>↩↩ <div class="row centered">↩ <div class="col-12">↩ <strong>Passwords — How they work,↩ how to break them,↩ and the alternatives</strong><br>↩ <div class="row centered">↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/password.html" class="btn btn-block btn-info">↩ <strong>1: How passwords work:</strong>↩ processing and storage,↩ salt values,↩ hashes and entropy</a>↩ </div>↩ <div class="col-12 col-md-8">↩ <a href="/cybersecurity/password-breaking.html" class="btn btn-block btn-info">↩ <strong>2: Breaking passwords:</strong>↩ analysis of↩ authentication strength of various↩ operating systems, dictionary attacks,↩ cracking attacks, Rainbow Table attacks,↩ frequent password changes and the↩ illusion of security</a>↩ </div>↩ </div>↩ </div>↩ <div class="col-12 col-md-3">↩ <a href="/cybersecurity/yubikey/" class="btn btn-block btn-info">↩ <strong>YubiKey Authentication</strong></a>↩ </div>↩ <div class="col-12 col-md-3">↩ <a href="/cybersecurity/yubikey/pam_pkcs11.html" class="btn btn-block btn-info">↩ <strong>YubiKey Authentication With pam_pkcs11.so</strong></a>↩ </div>↩ <div class="col-12 col-md-3">↩ <a href="/cybersecurity/yubikey/pam_yubico.html" class="btn btn-block btn-info">↩ <strong>YubiKey Authentication With pam_yubico.so</strong></a>↩ </div>↩ <div class="col-12 col-md-3">↩ <a href="/cybersecurity/yubikey/pam_u2f.html" class="btn btn-block btn-info">↩ <strong>YubiKey Authentication With pam_u2f.so</strong></a>↩ </div>↩ <div class="col-12 col-md-6">↩ <a href="/open-source/linux-pam-compliance/" class="btn btn-block btn-info">↩ <strong>Linux PAM Configuration for Compliance</strong><br>↩ <em> Configure PAM to meet US DoD/DISA↩ STIG Compliance Requirements</em></a>↩ </div>↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/hacker-passwords.html" class="btn btn-block btn-info">↩ <strong>Reverse-Engineering the Hacker</strong><br>↩ <em> What types of passwords will a typical↩ hacker guess?</em></a>↩ </div>↩ <div class="col-12">↩ <a href="/cybersecurity/authentication.html" class="btn btn-block btn-info">↩ <strong>Authentication Tools</strong><br>↩ <em>Windows authentication details,↩ Well-known default passwords,↩ Studies of real-world passwords↩ and PINs,↩ Kerberos,↩ Password tools,↩ Active Authentication,↩ sudo,↩ Tokens, Biometrics</em></a>↩ </div>↩ </div>↩↩ <p class="canvased textright" style="margin-top:5px;">↩ <strong><em>He that breaks a thing to find out what it is has left the path of wisdom.</em></strong>↩ <br>— Gandalf in <em>The Fellowship of the Ring</em>↩ </p>↩↩ <h2 class="centered"> System Security (operating system auditing↩ and hardening)</h2>↩↩ <div class="row centered">↩ <div class="col-12 col-md-6 col-lg-8">↩ <a href="/cybersecurity/sysaudit.html" class="btn btn-block btn-info">↩ <strong>System Security Auditing and↩ Monitoring Tools</strong><br>↩ <em>Common Criteria,↩ US DOD STIGs and SRRs,↩ SCAP tools,↩ US Federal Desktop Core Configuration,↩ printer security,↩ Windows Security Configuration and↩ Analysis Snap-In,↩ Lynis Enterprise Suite,↩ older tools (TARA, COPS, Titan,↩ Bastille)</em></a>↩ </div>↩ <div class="col-12 col-md-3 col-lg-2">↩ <a href="/cybersecurity/openscap.html" class="btn btn-block btn-info">↩ <strong>System Auditing and Hardening with OpenSCAP</strong></a>↩ </div>↩ <div class="col-12 col-md-3 col-lg-2">↩ <a href="/cybersecurity/hardware.html" class="btn btn-block btn-info">↩ <strong>Hardware / Firmware Exploits</strong></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-3 col-lg-2">↩ <a href="/cybersecurity/physical.html" class="btn btn-block btn-info">↩ <strong>Physical Security</strong></a>↩ </div>↩ <div class="col-12 col-md-9 col-lg-10">↩ <a href="/cybersecurity/os-specific.html" class="btn btn-block btn-info">↩ <strong>OS-Specific Security Issues</strong><br>↩ <em>Cisco IOS, Linux, Solaris,↩ Tru64 (ULTRIX, OSF/1),↩ IRIX, AIX, DOS, Macintosh,↩ Novell, AS/400, VMS, Windows</em></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-5">↩ <a href="/cybersecurity/virtualization.html" class="btn btn-block btn-info">↩ <strong>Attacks on Virtualization Security </strong></a>↩ </div>↩ <div class="col-12 col-md-7">↩ <a href="/cybersecurity/root-password.html" class="btn btn-block btn-info">↩ <strong>How to harden a default Linux or BSD installation</strong></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12">↩ <a href="/cybersecurity/selinux/" class="btn btn-block btn-info">↩ <strong>Security-Enhanced Linux</strong><br>↩ <em>How to use SELinux booleans and↩ build and use custom SELinux policy modules</em></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/intrusion.html" class="btn btn-block btn-info">↩ <strong>Intrusion Detection Tools</strong><br>↩ <em>Tripwire, AIDE, Snort,↩ RazorBack, ACID-XML, SNARE, BackLog,↩ NetRanger, NetStalker, GrIDS</em></a>↩ </div>↩ <div class="col-12 col-md-3">↩ <a href="/cybersecurity/intrusion-intro/" class="btn btn-block btn-info">↩ <strong>Intrusion Detection Introduction</strong><br>↩ A small example</a>↩ </div>↩ <div class="col-12 col-md-3">↩ <a href="/cybersecurity/intrusion-analysis/" class="btn btn-block btn-info">↩ <strong>Analyzing multiple intrusions into↩ a poorly configured Linux system</strong></a>↩ </div>↩ <div class="col-12 col-md-2">↩ <a href="/open-source/stig-compliance.html" class="btn btn-block btn-info">↩ <strong>US DOD/DISA STIG Compliance for Linux</strong></a>↩ </div>↩ </div>↩↩ <p class="canvased textright" style="margin-top:5px;">↩ <strong><em>From a practical standpoint the security problem will↩ remain as long as manufacturers remain↩ committed to current system architectures,↩ produced without a firm requirement for↩ security.↩ As long as there is support for ad hoc fixes↩ and security packages for these inadequate↩ designs and as long as the illusory results↩ of penetration teams are accepted as↩ demonstrations of a computer system security,↩ proper security will not be a reality.</em></strong>↩ <br>— Roger Schell in the USAF report↩ <em>Preliminary Notes on the Design of Secure Military↩ Computer Systems,</em> written in 1973↩ </p>↩↩ <h2 class="centered">Public-Key Infrastructure, TLS, and SSL</h2>↩↩ <div class="row centered">↩ <div class="col-7 col-md-5">↩ <a href="/cybersecurity/how-browsers-use-https.html" class="btn btn-block btn-info">↩ <strong>How Browsers Use HTTPS and TLS to Secure Web Traffic</strong></a>↩ </div>↩ <div class="col-5 col-md-2">↩ <a href="/cybersecurity/ssl-tls.html" class="btn btn-block btn-info">↩ <strong>SSL/TLS Security</strong></a>↩ </div>↩ <div class="col-12 col-md-5">↩ <a href="/cybersecurity/pki-failures.html" class="btn btn-block btn-info">↩ <strong>Failures of the Internet's Public-Key Infrastructure (PKI)</strong></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-3">↩ <a href="/open-source/nginx-openssl-quantum-safe/" class="btn btn-info btn-block">↩ <strong>Nginx, OpenSSL, and Open Quantum Safe</strong></a>↩ </div>↩ <div class="col-6 col-md-4">↩ <a href="/open-source/google-freebsd-tls/" class="btn btn-info btn-block">↩ <strong>How to Use a Let's Encrypt TLS Certificate on Google Cloud</strong></a>↩ </div>↩ <div class="col-6 col-md-5">↩ <a href="/open-source/letsencrypt-tls-cert-godaddy.html" class="btn btn-info btn-block">↩ <strong>How to Use a Let's Encrypt TLS Certificate on GoDaddy Shared Hosting</strong></a>↩ </div>↩ </div>↩↩ <p class="canvased textright" style="margin-top:5px;">↩ <strong><em>He who fights monsters should see to it that↩ he himself does not become a monster.↩ And if you gaze long enough into an abyss,↩ the abyss will also gaze into you.</em></strong>↩ <br>— Friedrich Nietzsche in↩ <a href="https://amzn.to/44yBmeC">↩ <em>Beyond Good and Evil</em></a>↩ </p>↩↩ <h2 class="centered">Network Security</h2>↩↩ <div class="row centered">↩ <div class="col-12 col-lg-8">↩ <a href="/cybersecurity/monitoring.html" class="btn btn-block btn-info">↩ <strong>Network Monitoring / Protocol Analysis /↩ Packet Sniffing Tools</strong><br>↩ <em>Linux-based, Windows-based,↩ switch spoofing,↩ Wireless LAN/WAN security,↩ WLAN antenna construction,↩ packet-sniffing attack detection</em></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-4">↩ <a href="/cybersecurity/router-update.html" class="btn btn-block btn-info">↩ <strong>Update Your Router</strong><br>↩ Stay Secure at Home</a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-4">↩ <a href="/cybersecurity/telecom-outages.html" class="btn btn-block btn-info">↩ <strong>Telecommunications Outages</strong><br>↩ <em>Submarine cables, satellites</em></a>↩ </div>↩ <div class="col-6 col-md-6 col-lg-4">↩ <a href="/open-source/openbsd-wireless-wpa2.html" class="btn btn-block btn-info">↩ <strong>802.11i / WPA2</strong><br>↩ <em>Wireless networking</em></a>↩ </div>↩ <div class="col-6 col-md-6 col-lg-4">↩ <a href="/cybersecurity/availability/ddos.html" class="btn btn-block btn-info">↩ <strong>DDoS</strong> <br>↩ <em>Distributed Denial of Service</em></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-6">↩ <a href="/cybersecurity/bgp-hijacking.html" class="btn btn-block btn-info">↩ <strong>BGP Hijacking</strong><br>↩ <em>Plus outages caused by politics and errors</em></a>↩ </div>↩ <div class="col-6">↩ <a href="/cybersecurity/comsec.html" class="btn btn-block btn-info">↩ <strong>COMSEC</strong><br>↩ <em>Attacking Mobile / Cellular / GSM Telephony</em></a>↩ </div>↩ <div class="col-12">↩ <a href="/cybersecurity/netaudit.html" class="btn btn-block btn-info">↩ <strong>Network Security Auditing Tools</strong><br>↩ <em>Top 100 Network Security Tools,↩ Lists of TCP ports used by attacks,↩ Port scanners,↩ Network vulnerability testing,↩ Automatic Teller Machine↩ (ATM) security</em></a>↩ </div>↩ <div class="col-5 col-xl-2">↩ <a href="/cybersecurity/www.html" class="btn btn-block btn-info">↩ <strong>Web Security</strong></a>↩ </div>↩ <div class="col-7 col-xl-3">↩ <a href="/cybersecurity/stack-hardening.html" class="btn btn-block btn-info">↩ <strong>TCP/IP Stack hardening</strong></a>↩ </div>↩ <div class="col-7 col-xl-4">↩ <a href="/cybersecurity/qr-nfc.html" class="btn btn-block btn-info">↩ <strong>QR codes and Near-Field Communication Risks</strong></a>↩ </div>↩ <div class="col-5 col-xl-3">↩ <a href="/open-source/ssh.html" class="btn btn-block btn-info">↩ <strong>How to set up and use SSH</strong></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/firewall.html" class="btn btn-block btn-info">↩ <strong>Firewall Tools</strong><br>↩ <em>Linux/Unix-based, Windows based,↩ SOHO firewalls, Commercial vendors</em></a>↩ </div>↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/attack-study/" class="btn btn-block btn-info">↩ <strong>Network Attack Analysis</strong><br>↩ <em>Classifying and Identifying Attack Patterns↩ With Textual Analysis Tools</em></a>↩ </div>↩ </div>↩↩ <p class="canvased textright" style="margin-top:5px;">↩ <strong><em>The world is never going to be perfect, either on-↩ or offline; so let's not set impossibly↩ high standards for online.</em></strong>↩ <br>— Esther Dyson↩ </p>↩↩ <h2 class="centered"> Cloud Security </h2>↩↩ <div class="row centered">↩ <div class="col-12 col-md-8">↩ <a href="/cybersecurity/isc2-ccsp/" class="btn btn-block btn-info">↩ <strong>Study guide for the (ISC)<sup>2</sup>↩ CCSP (Certified Cloud Security↩ Professional) Exam</strong></a>↩ </div>↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/cloud.html" class="btn btn-block btn-info">↩ <strong>An Overview of Cloud Security</strong> </a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/availability/cloud-archiving.html" class="btn btn-block btn-info">↩ <strong>Cloud Archiving</strong><br>↩ <em>Google Coldline, AWS Glacier,↩ Cloud archiving tools</em></a>↩ </div>↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/cloud-survey.html" class="btn btn-block btn-info">↩ <strong>Security Concerns of Cloud Technology Users:↩ A Survey of Major Cloud Customers </strong> </a>↩ </div>↩ <div class="col-12 col-md-4">↩ <a href="/open-source/linux-blog.html" class="btn btn-block btn-info">↩ <strong>Linux and Security Blog —↩ Thoughts from Time to Time on↩ Linux, Security, and the Cloud</strong></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-lg-4">↩ <a href="/cybersecurity/rsyslog-tls/" class="btn btn-block btn-info">↩ <strong>Secure Logging with Rsyslog and TLS</strong></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-4">↩ <a href="/cybersecurity/ec2-secure-storage.html" class="btn btn-block btn-info">↩ <strong>How to set up encrypted storage on Amazon EC2</strong></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-4">↩ <a href="/cybersecurity/cloud-exploit.html" class="btn btn-block btn-info">↩ <strong>Hacked in the Cloud — An Attacker Takes Over a Cloud Server </strong></a>↩ </div>↩ </div>↩↩ <div class="row centered">↩↩ <div class="col-12 col-md-6 textleft">↩↩ <h2 class="centered"> Malware, Social Engineering, and Software Security </h2>↩↩ <p>↩ <strong>Good free anti-virus / anti-malware software</strong>↩ includes the following.↩ ZoneAlarm incorporates spyware detection and↩ removal software.↩ <br>↩ <a href="https://www.clamav.net/" class="btn btn-danger">↩ ClamAV</a>↩ ↩ <a href="https://www.clamxav.com/" class="btn btn-danger">↩ ClamXav</a>↩ ↩ <a href="https://www.avira.com/" class="btn btn-danger">Avira</a>↩ ↩ <a href="https://www.avg.com/free-antivirus-download" class="btn btn-danger">AVG</a>↩ ↩ <a href="https://www.zonealarm.com/" class="btn btn-danger">ZoneAlarm</a>↩ </p>↩↩ <p>↩ I <em class="underlined">used to</em> recommend↩ <a href="https://www.avast.com/" class="btn btn-danger">Avast!</a>,↩ but then it was↩ <a href="https://www.msn.com/en-us/news/technology/avast-fined-165-million-for-privacy-software-that-actually-sold-users-browsing-data/ar-BB1iJpg2">↩ fined US$ 16.5 million for↩ selling users' browsing data</a>.↩ </p>↩↩ <p>↩ <a href="https://www.virustotal.com/gui/home/upload">↩ <strong>VirusTotal</strong></a>↩ lets you up upload suspicious data for scanning and↩ analysis by several malware detection systems.↩ <br>↩ <a href="https://www.virustotal.com/gui/home/upload" class="btn btn-danger">VirusTotal</a>↩ </p>↩↩ <p>↩ The↩ <strong><a href="https://support.kaspersky.com/viruses/rescuedisk">↩ Kaspersky Rescue Disk</a></strong>↩ lets you safely boot and clean infected Windows↩ systems that can't be cleaned with the normal tools.↩ </p>↩ <p>↩ <a href="https://malware.lu/">Malware.lu</a>↩ is a repository of malware and technical analyses for↩ security researchers.↩ </p>↩ <p>↩ Attrition.org has a↩ <a href="https://attrition.org/errata/cpo/">↩ list of vendors that have shipped malware↩ with their products</a>.↩ </p>↩↩ </div>↩↩ <div class="col-12 col-md-6">↩ <div class="centered cb">↩<ins class="adsbygoogle responsive"↩ style="display:block;"↩ data-full-width-responsive="true"↩ data-ad-client="ca-pub-5845932372655417"↩ data-ad-slot="4849215406"></ins>↩<script>↩ (adsbygoogle = window.adsbygoogle || []).push({});↩</script>↩</div>↩ </div>↩↩ </div>↩↩ <div class="row centered">↩ <div class="col-12 col-md-4 col-lg-3">↩ <a href="/cybersecurity/scams-spam-phishing.html" class="btn btn-block btn-info">↩ <strong>Learn about scams, spam, phishing, and worse,↩ and take some great Phishing IQ tests</strong></a>↩ </div>↩ <div class="col-12 col-md-8 col-lg-4">↩ <a href="/cybersecurity/hostile/" class="btn btn-block btn-info">↩ <strong>Analyzing Hostile Data</strong><br>↩ <em>An overview of viruses, worms, trojans,↩ downloaders and other malware, plus↩ analysis of: Bagel, Mytob, Mydoom,↩ and more</em></a>↩ </div>↩ <div class="col-12 col-lg-5">↩ <a href="/cybersecurity/software.html" class="btn btn-block btn-info">↩ <strong>Software Security Tools</strong><br>↩ <em>How to develop software that is more secure,↩ The SAFECode <em>Fundamental Practices for Secure Software Development,</em>↩ C/C++ Security,↩ Python Security,↩ Java Security,↩ Node.js Security,↩ ActiveX Attacks,↩ Writing Exploit Code</em></a>↩ </div>↩ <div class="col-12">↩ <a href="/cybersecurity/extortion.html" class="btn btn-block btn-info">↩ <strong>Analyzing a System Hacked by Extortionware, also called Police Ransomware</strong></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-3">↩ <a href="/cybersecurity/hoax.html" class="btn btn-block btn-info">↩ <strong>Social Engineering and Fighting Internet Hoaxes</strong></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-3">↩ <a href="/cybersecurity/html-email.html" class="btn btn-block btn-info">↩ <strong>Why HTML E-mail is Dangerous</strong></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-3">↩ <a href="/cybersecurity/web-mail-spear-phishing.html" class="btn btn-block btn-info">↩ <strong>Analyzing Web Mail Abuse and Spear-Phishing</strong></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-3">↩ <a href="/cybersecurity/scam-analysis.html" class="btn btn-block btn-info">↩ <strong>Analyzing a Phishing Scam Attempt</strong></a>↩ </div>↩ </div>↩↩ <p class="canvased textright" style="margin-top:5px;">↩ <strong><em>We kill people based on metadata.</em></strong>↩ <br>— Former NSA and CIA director Michael Hayden, 2014↩ </p>↩↩ <h2 class="centered">Reference Material</h2>↩↩ <div class="row centered">↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/exam-prep.html" class="btn btn-block btn-info">↩ <strong>How to Prepare For, and Pass,↩ Certification Exams</strong></a>↩ </div>↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/comptia/" class="btn btn-block btn-info">↩ <strong>Guidance for passing the CompTIA↩ Security+ Certification Exam</strong></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/isc2-cissp/" class="btn btn-block btn-info">↩ <strong>Study guide for the (ISC)<sup>2</sup>↩ CISSP (Certified Information Systems↩ Security Professional) Exam</strong></a>↩ </div>↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/isc2-ccsp/" class="btn btn-block btn-info">↩ <strong>Study guide for the (ISC)<sup>2</sup>↩ CCSP (Certified Cloud Security↩ Professional) Exam</strong></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/bulletins.html" class="btn btn-block btn-info">↩ <strong>Infosec Bulletins and Mailing Lists</strong></a>↩ </div>↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/policy.html" class="btn btn-block btn-info">↩ <strong>Policy Requirements and Guidance</strong></a>↩ </div>↩ </div>↩↩ <p>↩ Here is a chart comparing certifications,↩ someone picked this up at a SANS event.↩ An interactive updated version is↩ <a href="https://pauljerimy.com/security-certification-roadmap/">↩ here</a>.↩ </p>↩↩ <div class="centered">↩ <img src="pictures/cert_2020.jpg"↩ alt="Chart of certifications as of 2020."↩ class="bordered" loading="lazy">↩ </div>↩↩ <div class="row centered">↩ <div class="col-12">↩ <a href="/cybersecurity/rfcs.html" class="btn btn-block btn-info">↩ <strong>Security-Related RFCs (Valuable Documents!)↩ and Mitre nomenclature projects</strong><br>↩ <em>Some of these function as dictionaries↩ and explain the terminology.↩ Others provide the formal definitions↩ of networking protocols</em></a>↩ </div>↩ <div class="col-12 col-md-2">↩ <a href="/cybersecurity/major-breaches.html" class="btn btn-block btn-info">↩ <strong>Major Breaches</strong><br>↩ <em>Password dumps, large data breaches</em></a>↩ </div>↩ <div class="col-12 col-md-4">↩ <a href="/cybersecurity/generalinfo.html" class="btn btn-block btn-info">↩ <strong>General Information</strong><br>↩ <em>DNS Security Issues,↩ Incidents and Anecdotes,↩ Government Warnings and Reactions</em></a>↩ </div>↩ <div class="col-12 col-md-6">↩ <a href="/cybersecurity/cyberwar/" class="btn btn-block btn-info">↩ <strong>Cyberwar, Economic Espionage, and Advanced Persistent Threats</strong><br>↩ <em>Military Applications of Network↩ Attack and Defense,↩ International Conflict on the Internet,↩ Military-Industrial Espionage,↩ Viruses and Hacking,↩ Threat Reports and Warnings,↩ Offensive Information Warfare &↩ Information Operations</em></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-7 col-lg-9">↩ <a href="/cybersecurity/infosec-response.html" class="btn btn-block btn-info">↩ <strong>Infosec Response Teams</strong><br>↩ <em>Incident Response Teams,↩ Assistance and Guidance,↩ Research and Development, Vendors,↩ Risk Management and Insurance↩ Coverage</em></a>↩ </div>↩ <div class="col-12 col-md-5 col-lg-3">↩ <a href="/cybersecurity/badguys.html" class="btn btn-block btn-info">↩ <strong>Keeping Track of the Bad Guys</strong><br>↩ <em>Classic Hackers, Hacker Technology</em></a>↩ </div>↩ </div>↩ <div class="row centered">↩ <div class="col-12 col-md-6 col-lg-4">↩ <a href="/cybersecurity/history/" class="btn btn-block btn-info">↩ <strong>Cryptographic History</strong></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-4">↩ <a href="/open-source/crashdumps.html" class="btn btn-block btn-info">↩ <strong>The Gallery of Crash Dump Screens</strong></a>↩ </div>↩ <div class="col-12 col-md-6 col-lg-4">↩ <a href="/cybersecurity/crypto/haiku.html" class="btn btn-block btn-info">↩ <strong>Cryptographic Haiku</strong></a>↩ </div>↩ </div>↩↩ <p>↩ <a href="https://www.cvedetails.com/"><strong>CVE Details</strong></a>↩ is a great source of information on vulnerabilities.↩ You can search by CVE reference, by vendor, and product name.↩ </p>↩↩ </nav>↩↩ <h2> Internet threat warnings </h2>↩↩ <p>↩ I find these to be helpful sources of information on↩ current events and trends:↩ </p>↩ <p>↩ <a href="https://krebsonsecurity.com/" class="btn btn-success" style="margin:5px;">↩ Krebs On Security</a>↩ <a href="https://securelist.com/" class="btn btn-success" style="margin:5px;">↩ SecureList</a>↩ <a href="https://www.us-cert.gov/ncas/current-activity" class="btn btn-success" style="margin:5px;">↩ US-CERT Current Activity</a>↩ <a href="https://www.flashpoint.io/blog/" class="btn btn-success" style="margin:5px;">↩ Flashpoint Intelligence Corner</a>↩ </p>↩↩ <div class="centered">↩ <img src="https://www.dshield.org/images/dshield_live_banner.png"↩ alt="DShield live banner."↩ loading="lazy">↩ </div>↩↩ <h2> Internet security "global dashboards" </h2>↩↩ <p>↩ Some of these are useful, some have a relatively high↩ level of hype, but you might find some of these useful:↩ </p>↩↩ <p>↩ <a href="https://map.internetintel.oracle.com/" class="btn btn-warning" style="margin:5px;">↩ Oracle Internet Intelligence</a>↩ <a href="https://cybermap.kaspersky.com/" class="btn btn-warning" style="margin:5px;">↩ Kaspersky</a>↩ <a href="https://dshield.org/" class="btn btn-warning" style="margin:5px;">↩ DShield</a>↩ <a href="http://www.internettrafficreport.com/" class="btn btn-warning" style="margin:5px;">↩ Internet Traffic Report</a>↩ <a href="https://isc.sans.org/" class="btn btn-warning" style="margin:5px;">↩ SANS Internet Storm Center</a>↩ <a href="https://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16434&view=map" class="btn btn-warning" style="margin:5px;">↩ Live Digital Attack Map</a>↩ <a href="https://radar.securitywizardry.com/" class="btn btn-warning" style="margin:5px;">↩ Security Wizardry Computer Network <br>↩ Defence Situational Awareness</a>↩ </p>↩↩ <h2> Where to go from here </h2>↩↩ <p>↩ Make sure you understand your systems well, and set them↩ up properly!↩ As Hippocrates said, <em>"Primum non nocere"</em>, or↩ <em>"First, do no harm."</em>↩ </p>↩↩ <p>↩ Be aware that your browser always gives away some information↩ about you, unless you are using↩ <a href="https://www.torproject.org/">↩ Tor</a>↩ and using it very carefully.↩ Your browser just provided this information:↩ </p>↩↩ <table class="bordered" style="font-size: 80%; max-width:100%; display:inline-block; white-space:nowrap;">↩ <tr><td>REMOTE ADDR</td><td>23.22.170.185</td></tr>↩<tr><td>REMOTE PORT</td><td>54258</td></tr>↩<tr><td>HTTP CONNECTION</td><td>Keep-Alive</td></tr>↩<tr><td>HTTP HOST</td><td>cromwell-intl.com</td></tr>↩<tr><td>HTTP ACCEPT ENCODING</td><td>gzip</td></tr>↩<tr><td>HTTP ACCEPT</td><td>text/html, application/xhtml+xml, application/xml; q=0.9, */*; q=0.8</td></tr>↩<tr><td>HTTP USER AGENT</td><td>Validator.nu/LV https://validator.w3.org/services</td></tr>↩ </table>↩↩ <!-- start of footer.html -->↩<footer>↩<nav class="cb centered">↩<hr style="margin-bottom: 2px; padding-bottom: 0px;">↩↩<!-- Amazon oneTag script -->↩<div id="amzn-assoc-ad-06659344-4b29-4e93-b5fa-6c771be869c0"></div>↩<script async src="https://z-na.associates-amazon.com/onetag/v2?MarketPlace=US&instanceId=06659344-4b29-4e93-b5fa-6c771be869c0"></script>↩↩<!-- Google matched content -->↩<p style="font-size:0.8rem; text-align:left; margin:0; padding:2px;">↩Now some lurid advertisements from Google AdSense:↩</p>↩<div class="centered">↩<ins class="adsbygoogle"↩ style="display:block;"↩ data-full-width-responsive="true"↩ data-ad-client="ca-pub-5845932372655417"↩ data-ad-slot="9123376601"↩ data-ad-format="autorelaxed"></ins>↩<script>↩(adsbygoogle = window.adsbygoogle || []).push({});↩</script>↩</div>↩↩<nav class="row centered" style="margin-top:1px; padding-top:0; margin-bottom: 1em;">↩ <div class="col-6 col-md-3">↩ <a href="/" class="btn btn-info btn-block">↩ Home</a>↩ </div>↩ <div class="col-6 col-md-3">↩ <a href="/travel/" class="btn btn-info btn-block">↩ Travel</a>↩ </div>↩ <div class="col-6 col-md-3">↩ <a href="/open-source/" class="btn btn-info btn-block">↩ Linux/Unix</a>↩ </div>↩ <div class="col-6 col-md-3">↩ <a href="/cybersecurity/" class="btn btn-info btn-block">↩ Cybersecurity</a>↩ </div>↩ <div class="col-6 col-md-3">↩ <a href="/networking/" class="btn btn-info btn-block">↩ Networking</a>↩ </div>↩ <div class="col-6 col-md-3">↩ <a href="/technical/" class="btn btn-info btn-block">↩ Technical</a>↩ </div>↩ <div class="col-6 col-md-3">↩ <a href="/radio/" class="btn btn-info btn-block">↩ Radio</a>↩ </div>↩ <div class="col-6 col-md-3">↩ <a href="/blog/" class="btn btn-info btn-block">↩ Blog</a>↩ </div>↩</nav>↩↩<div class="row centered">↩↩<div class="col-4 col-lg-2">↩<a href="https://www.freebsd.org/">↩ <img src="/ssi/powerlogo.gif" alt="FreeBSD" loading="lazy"></a>↩</div>↩↩<div class="col-4 col-lg-2">↩<a href="https://nginx.org/">↩ <img src="/ssi/nginx_logo-70pc.png" alt="Nginx" loading="lazy"></a>↩</div>↩↩<div class="col-4 col-lg-2">↩<a href="https://www.unicode.org/">↩<img src="/ssi/unicode.png"↩ alt="Valid Unicode."↩ loading="lazy"↩ style="padding: 0 0 8px 0; margin: 0;"></a>↩</div>↩↩<div class="col-4 col-lg-2">↩<a href="https://notbyai.fyi/">↩<img src="/ssi/produced-by-human.png"↩ alt="Produced by a human, not A.I."↩ loading="lazy"></a>↩</div>↩↩<div class="col-4 col-lg-2">↩<a href="https://validator.w3.org/nu/?showsource=yes&doc=https://cromwell-intl.com/cybersecurity/Index.html"><img src="/ssi/html5-badge-h-css3-semantics.png"↩ alt="Valid HTML 5. Validate it here."↩ loading="lazy"↩ style="padding: 0; margin: 0;"></a>↩</div>↩↩<div class="col-4 col-lg-2">↩<a href="https://jigsaw.w3.org/css-validator/check/referer">↩<img src="/ssi/valid-css.png"↩ alt="Valid CSS. Validate it here."↩ loading="lazy"↩ style="padding: 5px 0 3px 0; margin: 0;"></a>↩</div>↩↩</div>↩↩<div class="fl">↩↩<a href="https://mastodon.world/@bobthetraveler" rel="me" class="badge badge-pill badge-success" style="margin-bottom:5px;"><span style="font-size:1.25rem;">🦣</span> Bob the Traveler</a>↩ ↩<a href="https://mstdn.social/@conansysadmin" rel="me" class="badge badge-pill badge-success" style="margin-bottom:5px;"><span style="font-size:1.25rem;">🦣</span> Conan the Sysadmin</a>↩<br>↩↩<!--↩<a href="https://twitter.com/share" class="twitter-share-button" data-lang="en" data-count="none" style="margin:0; padding:0;">Tweet</a>↩<a href="https://twitter.com/ToiletGuru" class="twitter-follow-button" data-show-count="false" data-show-screen-name="false">Follow @ToiletGuru</a>↩<br>↩↩<a href="https://www.reddit.com/login?dest=https%3A%2F%2Fwww.reddit.com%2Fsubmit" onclick="window.location = 'https://www.reddit.com/login?dest=https%3A%2F%2Fwww.reddit.com%2Fsubmit' + encodeURIComponent(window.location); return false"><img src="https://www.redditstatic.com/spreddit6.gif" alt="submit to reddit" loading="lazy" style="position:relative; margin:0; padding:0;"></a>↩-->↩</div>↩↩<aside>↩<p class="fr textright" style="font-size: 0.8rem;">↩Viewport size:↩<span id="w"></span> × <span id="h"></span>↩<script>↩ (function() {↩ if (typeof(document.documentElement.clientWidth) != 'undefined') {↩ var $w = document.getElementById('w'),↩ $h = document.getElementById('h');↩ $w.innerHTML = document.documentElement.clientWidth;↩ $h.innerHTML = document.documentElement.clientHeight;↩ window.onresize = function(event) {↩ $w.innerHTML = document.documentElement.clientWidth;↩ $h.innerHTML = document.documentElement.clientHeight;↩ };↩ }↩ })();↩</script>↩<br>↩<a href="/open-source/google-freebsd-tls/apache-http2-php.html">Protocols</a>: HTTP/1.0 / TLSv1.3<br><a href="/open-source/nginx-openssl-quantum-safe/">Crypto</a>: X25519 / TLS_AES_256_GCM_SHA384</p>↩</aside>↩↩<!-- margin-bottom needed for infolinks ad -->↩<p class="cl centered" style="font-size:0.9rem; margin-bottom:120px;">↩© by↩<a href="/contact.html">Bob Cromwell</a>↩May 2024. Created with↩<a href="http://thomer.com/vi/vi.html"><code>vim</code></a>↩and↩<a href="https://www.imagemagick.org/">ImageMagick</a>,↩hosted on↩<a href="https://www.freebsd.org/">FreeBSD</a>↩with↩<a href="https://nginx.org/">Nginx</a>.↩<br>↩As an Amazon Associate, I earn from qualifying purchases.↩<br>↩<a href="/contact.html">Contact</a> |↩<a href="/cybersecurity/privacy-policy.html">Privacy policy</a> |↩<a href="/cybersecurity/root-password.html">Root password here</a>↩</p>↩↩</nav>↩↩↩</footer>↩</article>↩↩<!-- moved to footer for speed, get JavaScript from CDN -->↩<!-- get integrity="..." strings from https://www.srihash.org/ -->↩<script async src="https://cdnjs.cloudflare.com/ajax/libs/modernizr/2.8.3/modernizr.min.js" integrity="sha512-3n19xznO0ubPpSwYCRRBgHh63DrV+bdZfHK52b1esvId4GsfwStQNPJFjeQos2h3JwCmZl0/LgLxSKMAI55hgw==" crossorigin="anonymous"></script>↩<script async src="https://code.jquery.com/jquery-3.6.1.slim.min.js" integrity="sha384-MYL22lstpGhSa4+udJSGro5I+VfM13fdJfCbAzP9krCEoK5r2EDFdgTg2+DGXdj+" crossorigin="anonymous"></script>↩<script async src="https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.min.js" integrity="sha384-cVKIPhGWiC2Al4u+LWgxfKTRIcfu0JTxR+EQDz/bgldoEyl4H0zUF0QKbrJ0EcQF" crossorigin="anonymous"></script>↩↩<!-- Use this to "lazy-load" images as: <img data-src="...↩ <script async src="/js/jquery.lazyloadxt.js"></script>↩ -->↩↩<!-- social media button support -->↩↩<!-- twitter support -->↩<!--↩<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="https://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>↩-->↩↩<!-- facebook support -->↩<!--↩<div id="fb-root"></div>↩<script>(function(d, s, id) {↩ var js, fjs = d.getElementsByTagName(s)[0];↩ if (d.getElementById(id)) return;↩ js = d.createElement(s); js.id = id;↩ js.src = "https://connect.facebook.net/en_US/all.js#xfbml=1";↩ fjs.parentNode.insertBefore(js, fjs);↩}(document, 'script', 'facebook-jssdk'));</script>↩-->↩↩<!-- pinterest -->↩<!--↩<script>↩(function(d){↩ var f = d.getElementsByTagName('SCRIPT')[0], p = d.createElement('SCRIPT');↩ p.type = 'text/javascript';↩ p.async = true;↩ p.src = '//assets.pinterest.com/js/pinit.js';↩ f.parentNode.insertBefore(p, f);↩}(document));↩</script>↩-->↩↩<!-- Infolinks ad support -->↩ <script> var infolinks_pid = 3267443; var infolinks_wsid = 0; </script> <script async src="//resources.infolinks.com/js/infolinks_main.js"></script>↩<!-- end of footer.html -->↩ </body>↩</html>Used the schema for HTML + SVG 1.1 + MathML 3.0 + RDFa 1.1.
Used the HTML parser. Externally specified character encoding was UTF-8.
Total execution time 403 milliseconds.
About this checker • Report an issue • Version: 24.4.22