This tool is an ongoing experiment in better HTML checking, and its behavior remains subject to change

Showing results for https://cromwell-intl.com/cybersecurity/Index.html

Checker Input

Show

The document validates according to the specified schema(s).

Source

  1. <!DOCTYPE html>
  2. <html lang="en" xml:lang="en">
  3. <head>
  4. <meta charset="UTF-8">
  5. <title>Cybersecurity</title>
  6. <meta name="description" content="Cybersecurity resources including cryptography, network security, privacy, authentication, password cracking, and operating system hardening.">
  7. <!-- start of standard header -->
  8. <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
  9. <!-- style -->
  10. <link rel="stylesheet" href="/css/bootstrap.min.css">
  11. <link rel="stylesheet" href="/css/style.css">
  12. <link rel="icon" type="image/png" href="/pictures/favicon.png">
  13. <!-- Safari -->
  14. <link rel="apple-touch-icon" href="/pictures/touch-icon-iphone-152x152.png">
  15. <!-- Facebook, Twitter -->
  16. <link rel='canonical' href='https://cromwell-intl.com/cybersecurity/'>
  17. <meta property='og:title' content='Cybersecurity'>
  18. <meta name='twitter:title' content='Cybersecurity'>
  19. <meta name='twitter:description' content='Cybersecurity resources including cryptography, network security, privacy, authentication, password cracking, and operating system hardening.'>
  20. <meta property='og:description' content='Cybersecurity resources including cryptography, network security, privacy, authentication, password cracking, and operating system hardening.'>
  21. <meta property="fb:admins" content="bob.cromwell.10">
  22. <meta property="fb:app_id" content="9869919170">
  23. <meta property="og:type" content="website">
  24. <meta property="og:url" content="https://cromwell-intl.com/cybersecurity/Index.html">
  25. <meta property="og:site_name" content="Bob Cromwell: Travel, Linux, Cybersecurity">
  26. <meta name="twitter:url" content="https://cromwell-intl.com/cybersecurity/Index.html">
  27. <meta name="twitter:card" content="summary_large_image">
  28. <meta name="twitter:creator" content="@ToiletGuru">
  29. <!-- Google Page-level ads for mobile -->
  30. <!-- Note: only need the adsbygoogle.js script this
  31. one time in the header, not in every ad -->
  32. <script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
  33. <script>
  34. (adsbygoogle = window.adsbygoogle || []).push({
  35. google_ad_client: "ca-pub-5845932372655417",
  36. enable_page_level_ads: true
  37. });
  38. </script>
  39. <!-- Google webmaster tools -->
  40. <meta name="google-site-verification" content="-QwRAzF67ZlYJ9S4v3SCsyDceuoD2J7wLepdqiSX_Q4">
  41. <link rel="author" href="https://plus.google.com/+BobCromwell">
  42. <!-- Google translate -->
  43. <meta name="google-translate-customization" content="e577b45d2703b3f4-274692b0024c3c77-gc02a134c617e3801-12">
  44. <!-- Bing webmaster tools -->
  45. <meta name="msvalidate.01" content="3E2092BE1413B6791596BCC09A493E58">
  46. <script async src="https://fundingchoicesmessages.google.com/i/pub-5845932372655417?ers=1" nonce="-Qie8LU8Uq0o7aahCyvM1Q"></script><script nonce="-Qie8LU8Uq0o7aahCyvM1Q">(function() {function signalGooglefcPresent() {if (!window.frames['googlefcPresent']) {if (document.body) {const iframe = document.createElement('iframe'); iframe.style = 'width: 0; height: 0; border: none; z-index: -1000; left: -1000px; top: -1000px;'; iframe.style.display = 'none'; iframe.name = 'googlefcPresent'; document.body.appendChild(iframe);} else {setTimeout(signalGooglefcPresent, 0);}}}signalGooglefcPresent();})();</script>
  47. <script>(function(){/*
  48. Copyright The Closure Library Authors.
  49. SPDX-License-Identifier: Apache-2.0
  50. */
  51. 'use strict';var aa=function(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}},ba="function"==typeof Object.create?Object.create:function(a){var b=function(){};b.prototype=a;return new b},k;if("function"==typeof Object.setPrototypeOf)k=Object.setPrototypeOf;else{var m;a:{var ca={a:!0},n={};try{n.__proto__=ca;m=n.a;break a}catch(a){}m=!1}k=m?function(a,b){a.__proto__=b;if(a.__proto__!==b)throw new TypeError(a+" is not extensible");return a}:null}
  52. var p=k,q=function(a,b){a.prototype=ba(b.prototype);a.prototype.constructor=a;if(p)p(a,b);else for(var c in b)if("prototype"!=c)if(Object.defineProperties){var d=Object.getOwnPropertyDescriptor(b,c);d&&Object.defineProperty(a,c,d)}else a[c]=b[c];a.v=b.prototype},r=this||self,da=function(){},t=function(a){return a};var u;var w=function(a,b){this.g=b===v?a:""};w.prototype.toString=function(){return this.g+""};var v={},x=function(a){if(void 0===u){var b=null;var c=r.trustedTypes;if(c&&c.createPolicy){try{b=c.createPolicy("goog#html",{createHTML:t,createScript:t,createScriptURL:t})}catch(d){r.console&&r.console.error(d.message)}u=b}else u=b}a=(b=u)?b.createScriptURL(a):a;return new w(a,v)};var A=function(){return Math.floor(2147483648*Math.random()).toString(36)+Math.abs(Math.floor(2147483648*Math.random())^Date.now()).toString(36)};var B={},C=null;var D="function"===typeof Uint8Array;function E(a,b,c){return"object"===typeof a?D&&!Array.isArray(a)&&a instanceof Uint8Array?c(a):F(a,b,c):b(a)}function F(a,b,c){if(Array.isArray(a)){for(var d=Array(a.length),e=0;e<a.length;e++){var f=a[e];null!=f&&(d[e]=E(f,b,c))}Array.isArray(a)&&a.s&&G(d);return d}d={};for(e in a)Object.prototype.hasOwnProperty.call(a,e)&&(f=a[e],null!=f&&(d[e]=E(f,b,c)));return d}
  53. function ea(a){return F(a,function(b){return"number"===typeof b?isFinite(b)?b:String(b):b},function(b){var c;void 0===c&&(c=0);if(!C){C={};for(var d="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789".split(""),e=["+/=","+/","-_=","-_.","-_"],f=0;5>f;f++){var h=d.concat(e[f].split(""));B[f]=h;for(var g=0;g<h.length;g++){var l=h[g];void 0===C[l]&&(C[l]=g)}}}c=B[c];d=Array(Math.floor(b.length/3));e=c[64]||"";for(f=h=0;h<b.length-2;h+=3){var y=b[h],z=b[h+1];l=b[h+2];g=c[y>>2];y=c[(y&3)<<
  54. 4|z>>4];z=c[(z&15)<<2|l>>6];l=c[l&63];d[f++]=""+g+y+z+l}g=0;l=e;switch(b.length-h){case 2:g=b[h+1],l=c[(g&15)<<2]||e;case 1:b=b[h],d[f]=""+c[b>>2]+c[(b&3)<<4|g>>4]+l+e}return d.join("")})}var fa={s:{value:!0,configurable:!0}},G=function(a){Array.isArray(a)&&!Object.isFrozen(a)&&Object.defineProperties(a,fa);return a};var H;var J=function(a,b,c){var d=H;H=null;a||(a=d);d=this.constructor.u;a||(a=d?[d]:[]);this.j=d?0:-1;this.h=null;this.g=a;a:{d=this.g.length;a=d-1;if(d&&(d=this.g[a],!(null===d||"object"!=typeof d||Array.isArray(d)||D&&d instanceof Uint8Array))){this.l=a-this.j;this.i=d;break a}void 0!==b&&-1<b?(this.l=Math.max(b,a+1-this.j),this.i=null):this.l=Number.MAX_VALUE}if(c)for(b=0;b<c.length;b++)a=c[b],a<this.l?(a+=this.j,(d=this.g[a])?G(d):this.g[a]=I):(d=this.l+this.j,this.g[d]||(this.i=this.g[d]={}),(d=this.i[a])?
  55. G(d):this.i[a]=I)},I=Object.freeze(G([])),K=function(a,b){if(-1===b)return null;if(b<a.l){b+=a.j;var c=a.g[b];return c!==I?c:a.g[b]=G([])}if(a.i)return c=a.i[b],c!==I?c:a.i[b]=G([])},M=function(a,b){var c=L;if(-1===b)return null;a.h||(a.h={});if(!a.h[b]){var d=K(a,b);d&&(a.h[b]=new c(d))}return a.h[b]};J.prototype.toJSON=function(){var a=N(this,!1);return ea(a)};
  56. var N=function(a,b){if(a.h)for(var c in a.h)if(Object.prototype.hasOwnProperty.call(a.h,c)){var d=a.h[c];if(Array.isArray(d))for(var e=0;e<d.length;e++)d[e]&&N(d[e],b);else d&&N(d,b)}return a.g},O=function(a,b){H=b=b?JSON.parse(b):null;a=new a(b);H=null;return a};J.prototype.toString=function(){return N(this,!1).toString()};var P=function(a){J.call(this,a)};q(P,J);function ha(a){var b,c=(a.ownerDocument&&a.ownerDocument.defaultView||window).document,d=null===(b=c.querySelector)||void 0===b?void 0:b.call(c,"script[nonce]");(b=d?d.nonce||d.getAttribute("nonce")||"":"")&&a.setAttribute("nonce",b)};var Q=function(a,b){b=String(b);"application/xhtml+xml"===a.contentType&&(b=b.toLowerCase());return a.createElement(b)},R=function(a){this.g=a||r.document||document};R.prototype.appendChild=function(a,b){a.appendChild(b)};var S=function(a,b,c,d,e,f){try{var h=a.g,g=Q(a.g,"SCRIPT");g.async=!0;g.src=b instanceof w&&b.constructor===w?b.g:"type_error:TrustedResourceUrl";ha(g);h.head.appendChild(g);g.addEventListener("load",function(){e();d&&h.head.removeChild(g)});g.addEventListener("error",function(){0<c?S(a,b,c-1,d,e,f):(d&&h.head.removeChild(g),f())})}catch(l){f()}};var ia=r.atob("aHR0cHM6Ly93d3cuZ3N0YXRpYy5jb20vaW1hZ2VzL2ljb25zL21hdGVyaWFsL3N5c3RlbS8xeC93YXJuaW5nX2FtYmVyXzI0ZHAucG5n"),ja=r.atob("WW91IGFyZSBzZWVpbmcgdGhpcyBtZXNzYWdlIGJlY2F1c2UgYWQgb3Igc2NyaXB0IGJsb2NraW5nIHNvZnR3YXJlIGlzIGludGVyZmVyaW5nIHdpdGggdGhpcyBwYWdlLg=="),ka=r.atob("RGlzYWJsZSBhbnkgYWQgb3Igc2NyaXB0IGJsb2NraW5nIHNvZnR3YXJlLCB0aGVuIHJlbG9hZCB0aGlzIHBhZ2Uu"),la=function(a,b,c){this.h=a;this.j=new R(this.h);this.g=null;this.i=[];this.l=!1;this.o=b;this.m=c},V=function(a){if(a.h.body&&!a.l){var b=
  57. function(){T(a);r.setTimeout(function(){return U(a,3)},50)};S(a.j,a.o,2,!0,function(){r[a.m]||b()},b);a.l=!0}},T=function(a){for(var b=W(1,5),c=0;c<b;c++){var d=X(a);a.h.body.appendChild(d);a.i.push(d)}b=X(a);b.style.bottom="0";b.style.left="0";b.style.position="fixed";b.style.width=W(100,110).toString()+"%";b.style.zIndex=W(2147483544,2147483644).toString();b.style["background-color"]=ma(249,259,242,252,219,229);b.style["box-shadow"]="0 0 12px #888";b.style.color=ma(0,10,0,10,0,10);b.style.display=
  58. "flex";b.style["justify-content"]="center";b.style["font-family"]="Roboto, Arial";c=X(a);c.style.width=W(80,85).toString()+"%";c.style.maxWidth=W(750,775).toString()+"px";c.style.margin="24px";c.style.display="flex";c.style["align-items"]="flex-start";c.style["justify-content"]="center";d=Q(a.j.g,"IMG");d.className=A();d.src=ia;d.style.height="24px";d.style.width="24px";d.style["padding-right"]="16px";var e=X(a),f=X(a);f.style["font-weight"]="bold";f.textContent=ja;var h=X(a);h.textContent=ka;Y(a,
  59. e,f);Y(a,e,h);Y(a,c,d);Y(a,c,e);Y(a,b,c);a.g=b;a.h.body.appendChild(a.g);b=W(1,5);for(c=0;c<b;c++)d=X(a),a.h.body.appendChild(d),a.i.push(d)},Y=function(a,b,c){for(var d=W(1,5),e=0;e<d;e++){var f=X(a);b.appendChild(f)}b.appendChild(c);c=W(1,5);for(d=0;d<c;d++)e=X(a),b.appendChild(e)},W=function(a,b){return Math.floor(a+Math.random()*(b-a))},ma=function(a,b,c,d,e,f){return"rgb("+W(Math.max(a,0),Math.min(b,255)).toString()+","+W(Math.max(c,0),Math.min(d,255)).toString()+","+W(Math.max(e,0),Math.min(f,
  60. 255)).toString()+")"},X=function(a){a=Q(a.j.g,"DIV");a.className=A();return a},U=function(a,b){0>=b||null!=a.g&&0!=a.g.offsetHeight&&0!=a.g.offsetWidth||(na(a),T(a),r.setTimeout(function(){return U(a,b-1)},50))},na=function(a){var b=a.i;var c="undefined"!=typeof Symbol&&Symbol.iterator&&b[Symbol.iterator];b=c?c.call(b):{next:aa(b)};for(c=b.next();!c.done;c=b.next())(c=c.value)&&c.parentNode&&c.parentNode.removeChild(c);a.i=[];(b=a.g)&&b.parentNode&&b.parentNode.removeChild(b);a.g=null};var pa=function(a,b,c,d,e){var f=oa(c),h=function(l){l.appendChild(f);r.setTimeout(function(){f?(0!==f.offsetHeight&&0!==f.offsetWidth?b():a(),f.parentNode&&f.parentNode.removeChild(f)):a()},d)},g=function(l){document.body?h(document.body):0<l?r.setTimeout(function(){g(l-1)},e):b()};g(3)},oa=function(a){var b=document.createElement("div");b.className=a;b.style.width="1px";b.style.height="1px";b.style.position="absolute";b.style.left="-10000px";b.style.top="-10000px";b.style.zIndex="-10000";return b};var L=function(a){J.call(this,a)};q(L,J);var qa=function(a){J.call(this,a)};q(qa,J);var ra=function(a,b){this.l=a;this.m=new R(a.document);this.g=b;this.i=K(this.g,1);b=M(this.g,2);this.o=x(K(b,4)||"");this.h=!1;b=M(this.g,13);b=x(K(b,4)||"");this.j=new la(a.document,b,K(this.g,12))};ra.prototype.start=function(){sa(this)};
  61. var sa=function(a){ta(a);S(a.m,a.o,3,!1,function(){a:{var b=a.i;var c=r.btoa(b);if(c=r[c]){try{var d=O(P,r.atob(c))}catch(e){b=!1;break a}b=b===K(d,1)}else b=!1}b?Z(a,K(a.g,14)):(Z(a,K(a.g,8)),V(a.j))},function(){pa(function(){Z(a,K(a.g,7));V(a.j)},function(){return Z(a,K(a.g,6))},K(a.g,9),K(a.g,10),K(a.g,11))})},Z=function(a,b){a.h||(a.h=!0,a=new a.l.XMLHttpRequest,a.open("GET",b,!0),a.send())},ta=function(a){var b=r.btoa(a.i);a.l[b]&&Z(a,K(a.g,5))};(function(a,b){r[a]=function(c){for(var d=[],e=0;e<arguments.length;++e)d[e-0]=arguments[e];r[a]=da;b.apply(null,d)}})("__h82AlnkH6D91__",function(a){"function"===typeof window.atob&&(new ra(window,O(qa,window.atob(a)))).start()});}).call(this);
  62. window.__h82AlnkH6D91__("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");</script>
  63. <!-- end of standard header -->
  64. <meta name="twitter:image" content="https://cromwell-intl.com/cybersecurity/crypto/pictures/m-209-1291-banner.jpg">
  65. <meta property="og:image" content="https://cromwell-intl.com/cybersecurity/crypto/pictures/m-209-1291-banner.jpg">
  66. <style>
  67. td { vertical-align: middle; }
  68. </style>
  69. </head>
  70. <body>
  71. <article itemscope itemtype="https://schema.org/Article" class="container-fluid">
  72. <!-- start of schema.org microdata included in all pages -->
  73. <span itemprop='image' itemscope itemtype='https://schema.org/imageObject'>
  74. <meta itemprop='url' content='https://cromwell-intl.com/cybersecurity/crypto/pictures/m-209-1291-banner.jpg'>
  75. <meta itemprop='width' content='1422px'>
  76. <meta itemprop='height' content='396px'>
  77. </span>
  78. <meta itemprop='author' content='Bob Cromwell'>
  79. <span itemprop='publisher' itemscope itemtype='https://schema.org/organization'>
  80. <meta itemprop='name' content='Cromwell International'>
  81. <span itemprop='logo' itemscope itemtype='https://schema.org/imageObject'>
  82. <meta itemprop='url' content='https://cromwell-intl.com/pictures/cartoon-headshot-2484-10pc.jpg'>
  83. <meta itemprop='width' content='310px'>
  84. <meta itemprop='height' content='259px'>
  85. </span>
  86. </span>
  87. <meta itemprop='headline' content='Cybersecurity'>
  88. <meta itemprop='datePublished' content='2024-04-13'>
  89. <meta itemprop='dateModified' content='2024-04-13'>
  90. <meta itemprop='mainEntityOfPage' content='https://cromwell-intl.com/cybersecurity/Index.html'>
  91. <!-- end of schema.org microdata -->
  92. <meta itemprop="about" content="cybersecurity">
  93. <meta itemprop="about" content="cryptography">
  94. <meta itemprop="about" content="Linux">
  95. <header>
  96. <div style="background:black;">
  97. <img src="/cybersecurity/crypto/pictures/m-209-1291-banner.jpg"
  98. alt="Rotors of M-209 cipher machine.">
  99. </div>
  100. <h1>Computer System and Network Security</h1>
  101. <div class="centered top-banner">
  102. <ins class="adsbygoogle top-banner"
  103. style="display:inline-block; width:100%;"
  104. data-full-width-responsive="true"
  105. data-ad-client="ca-pub-5845932372655417"
  106. data-ad-slot="4849215406"></ins>
  107. <script>
  108. (adsbygoogle = window.adsbygoogle || []).push({});
  109. </script>
  110. </div>
  111. </header>
  112. <h2 class="centered"> Cybersecurity </h2>
  113. <p>
  114. <strong>Cybersecurity becomes more important every year,
  115. as we rely more and more on the world-wide
  116. Internet in government, business, and our
  117. private lives.</strong>
  118. <br><br>
  119. Everyone needs to know how to be safe enough in their
  120. personal email and web browsing.
  121. Start with my
  122. <a href="/cybersecurity/basics/">introductory page</a>
  123. if you're new to cybersecurity.
  124. <br><br>
  125. Certifications are the coin of the realm nowadays,
  126. and they're the main reason many people come to this page.
  127. And so, here's my guidance on preparing and passing the exams:
  128. </p>
  129. <div class="row centered" style="max-width:60em;">
  130. <div class="col-12 col-md-4">
  131. <a href="/cybersecurity/comptia/" class="btn btn-block btn-danger btn-lg">
  132. Study guide for <br> CompTIA Security+</a>
  133. </div>
  134. <div class="col-12 col-md-4">
  135. <a href="/cybersecurity/isc2-cissp/" class="btn btn-block btn-danger btn-lg">
  136. Study guide for <br> (ISC)<sup>2</sup> CISSP</a>
  137. </div>
  138. <div class="col-12 col-md-4">
  139. <a href="/cybersecurity/isc2-ccsp/" class="btn btn-block btn-danger btn-lg">
  140. Study guide for <br> (ISC)<sup>2</sup> CCSP</a>
  141. </div>
  142. <div class="col-12">
  143. <a href="/cybersecurity/exam-language-tricks/" class="btn btn-block btn-danger btn-lg">
  144. How To Defeat the Language Tricks
  145. (ISC)<sup>2</sup> and CompTIA Use
  146. to Unfairly Lower Your Score</a>
  147. </div>
  148. </div>
  149. <p>
  150. The rest of these pages provide background for the courses
  151. I write and teach.
  152. They list the references and URLs for various tools,
  153. studies, news reports, and other things that come up
  154. in courses.
  155. I use these pages myself, so I don't have to try to
  156. memorize URLs and other reference details!
  157. <br><br>
  158. Here's that starting point:
  159. </p>
  160. <p class="centered">
  161. <a href="/cybersecurity/basics/" class="btn btn-lg btn-info btn-block">
  162. <strong>Cybersecurity Basics</strong> <br>
  163. How to stay safe online</a>
  164. </p>
  165. <p class="canvased textright" style="margin-top:5px;">
  166. <strong><em>Few persons can be made to believe that
  167. it is not quite an easy thing to invent a
  168. method of secret writing which shall baffle
  169. investigation.
  170. Yet it may be roundly asserted that human
  171. ingenuity cannot concoct a cipher which
  172. human ingenuity cannot resolve.</em></strong>
  173. <br>&mdash; Edgar Allan Poe, in "A Few Words On
  174. Secret Writing", <em>Graham's Magazine,</em>
  175. July 1841
  176. </p>
  177. <div class="centered cb">
  178. <ins class="adsbygoogle responsive"
  179. style="display:block;"
  180. data-full-width-responsive="true"
  181. data-ad-client="ca-pub-5845932372655417"
  182. data-ad-slot="4849215406"></ins>
  183. <script>
  184. (adsbygoogle = window.adsbygoogle || []).push({});
  185. </script>
  186. </div>
  187. <nav>
  188. <h2> Fundamentals &mdash; Cryptography and Networking</h2>
  189. <div class="row centered">
  190. <div class="col-12 col-md-7 col-lg-6">
  191. <table>
  192. <tr>
  193. <td style="width:50%;">
  194. <img src="pictures/enigma-7615.jpg"
  195. alt="German Enigma encryption machine, three rotors, open with rotors exposed."
  196. class="bordered captioned" loading="lazy">
  197. </td>
  198. <td style="width:50%;">
  199. <img src="pictures/sigaba-7618.jpg"
  200. alt="U.S. SIGABA encryption machine."
  201. class="bordered captioned" loading="lazy">
  202. </td>
  203. </tr>
  204. <tr>
  205. <td class="caption" colspan="2"
  206. style="background:#c0c0c0;
  207. font-size: 85%;
  208. margin-top:0; padding-top:0;
  209. max-width: 414px;">
  210. World War Two cryptographic hardware<br>
  211. <strong>Left:</strong> German Enigma encryption machine <br>
  212. <strong>Right:</strong> U.S. SIGABA encryption machine <br>
  213. National Museum of the U.S. Air Force, WPAFB
  214. </td>
  215. </tr>
  216. </table>
  217. <div class="centered">
  218. <a href="https://amzn.to/3Oxrs7B">
  219. <img src="/amazon-pictures/amzn-dark-territory.jpg"
  220. alt="Dark Territory: The Secret History of Cyber War"
  221. class="bordered captioned" loading="lazy"></a>
  222. <br><span class="badge badge-pill badge-primary">
  223. Amazon 1476763267</span>
  224. </div>
  225. </div>
  226. <div class="col-12 col-md-5 col-lg-6">
  227. <a href="/cybersecurity/crypto/" class="btn btn-block btn-info">
  228. <strong>Just Enough Cryptography</strong><br>
  229. <em>
  230. Cryptographic algorithms,
  231. digital signatures,
  232. cryptographic hashes,
  233. the basics of how they work</em></a>
  234. <a href="/cybersecurity/crypto-flowcharts.html" class="btn btn-block btn-info">
  235. <strong>Cryptography Flowcharts</strong></a>
  236. <a href="/cybersecurity/cipher-selection.html" class="btn btn-block btn-info">
  237. <strong>Selecting an Encryption Cipher and Mode</strong></a>
  238. <a href="/cybersecurity/elliptic-curve-cryptography/" class="btn btn-block btn-info">
  239. <strong>How Elliptic-Curve Cryptography Works</strong></a>
  240. <a href="/cybersecurity/how-rsa-works.html" class="btn btn-block btn-info">
  241. <strong>How RSA Works</strong></a>
  242. <a href="/cybersecurity/verify-digital-signature.html" class="btn btn-block btn-info">
  243. <strong>How to Verify Digital Signatures</strong></a>
  244. <a href="/networking/" class="btn btn-block btn-info">
  245. <strong>TCP/IP</strong> &mdash;
  246. How the networking protocols work</a>
  247. <a href="/networking/routing.html" class="btn btn-block btn-info">
  248. <strong>How Does IP Routing Work?</strong></a>
  249. <a href="/networking/nat.html" class="btn btn-block btn-info">
  250. <strong>How Does NAT Work?</strong></a>
  251. <a href="/networking/what-is-ipsec.html" class="btn btn-block btn-info">
  252. <strong>A simple explanation of IPsec</strong><br>
  253. <em> What IPsec is,
  254. what network security it provides,
  255. how it builds a VPN,
  256. how to set it up</em></a>
  257. <a href="/cybersecurity/crypto/hash-search.html" class="btn btn-block btn-info">
  258. <strong>Are all hash outputs possible?</strong></a>
  259. </div>
  260. </div>
  261. <div class="centered cb">
  262. <ins class="adsbygoogle responsive"
  263. style="display:block;"
  264. data-full-width-responsive="true"
  265. data-ad-client="ca-pub-5845932372655417"
  266. data-ad-slot="4849215406"></ins>
  267. <script>
  268. (adsbygoogle = window.adsbygoogle || []).push({});
  269. </script>
  270. </div>
  271. <p class="canvased textright" style="margin-top:5px;">
  272. <strong><em>We will bankrupt ourselves in the vain search
  273. for absolute security.</em></strong>
  274. <br>&mdash; Dwight D. Eisenhower
  275. </p>
  276. <h2 class="centered">Information Security</h2>
  277. <div class="row centered">
  278. <div class="col-12">
  279. <a href="/cybersecurity/privacy.html" class="btn btn-block btn-info">
  280. <strong>Confidentiality and
  281. Data Integrity Tools</strong><br>
  282. <em> PGP &amp; Gnu Privacy Guard,
  283. Key Recovery,
  284. RADIUS,
  285. Risks of Google,
  286. Sanitizing Media,
  287. Secure Online Data Storage,
  288. Information Leakage,
  289. Commercial Cryptography,
  290. SSH, Secure FTP,
  291. Hardware Encryption,
  292. Voice Scramblers,
  293. Cryptography and International Law,
  294. X Privacy and <code>xspy</code>,
  295. IPSec,
  296. VPN's,
  297. Key Loggers,
  298. Spyware</em></a>
  299. </div>
  300. <div class="col-12 col-md-5">
  301. <a href="/cybersecurity/regulations.html" class="btn btn-block btn-info">
  302. <strong>Government and Industry Regulations</strong><br>
  303. <em>HIPAA, Sarbanes-Oxley (Sarbox/SOX),
  304. PCI DSS (Payment Card Industry
  305. Data Security Standard)</em></a>
  306. </div>
  307. <div class="col-12 col-md-7">
  308. <a href="/cybersecurity/backdoors.html" class="btn btn-info">
  309. <strong>Backdoor Problems</strong><br>
  310. <em>Government-imposed backdoors make
  311. security much worse for
  312. individuals, businesses,
  313. and the government itself</em></a>
  314. </div>
  315. </div>
  316. <div class="row centered">
  317. <div class="col-12 col-md-6 col-lg-4">
  318. <a href="/cybersecurity/surveillance.html" class="btn btn-block btn-info">
  319. <strong>Government Surveillance</strong><br>
  320. <em>US and other government surveillance,
  321. PRISM&nbsp;/
  322. US-984XN&nbsp;/
  323. XKeyscore&nbsp;/
  324. Boundless Informant
  325. programs,
  326. backdoors and weaknesses</em></a>
  327. </div>
  328. <div class="col-12 col-md-6 col-lg-3">
  329. <a href="/cybersecurity/availability/" class="btn btn-block btn-info">
  330. <strong>Availability Tools</strong><br>
  331. <em>Remote and local archiving,
  332. Real costs of data loss,
  333. Laptop theft prevention,
  334. Fighting spam</em></a>
  335. </div>
  336. <div class="col-12 col-md-6 col-lg-3">
  337. <a href="/cybersecurity/availability/destruction.html" class="btn btn-block btn-info">
  338. <strong>Data Destruction</strong><br>
  339. <em>Overwriting digital storage,
  340. Destroying physical media</em></a>
  341. </div>
  342. <div class="col-12 col-md-6 col-lg-2">
  343. <a href="/cybersecurity/availability/ddos.html" class="btn btn-block btn-info">
  344. <strong>DDOS</strong><br>
  345. <em>Distributed denial of service</em></a>
  346. </div>
  347. </div>
  348. <div class="row centered">
  349. <div class="col-12 col-md-6 col-lg-3">
  350. <a href="/cybersecurity/availability/storage-longevity.html" class="btn btn-block btn-info">
  351. <strong>Storage Longevity</strong><br>
  352. <em>Media longevity and failure rates,
  353. Format longevity</em></a>
  354. </div>
  355. <div class="col-12 col-md-6 col-lg-3">
  356. <a href="/cybersecurity/availability/cloud-archiving.html" class="btn btn-block btn-info">
  357. <strong>Cloud Archiving</strong><br>
  358. <em>Google Coldline, AWS Glacier,
  359. Cloud archiving tools</em></a>
  360. </div>
  361. <div class="col-12 col-lg-6">
  362. <a href="/cybersecurity/forensics.html" class="btn btn-block btn-info">
  363. <strong>Computer Forensics</strong><br>
  364. <em>Free tools for forensics and
  365. recovering deleted pictures from
  366. camera memory,
  367. file system forks and
  368. Alternate Data Streams,
  369. EFS and forensics</em></a>
  370. </div>
  371. <div class="col-12">
  372. <a href="/cybersecurity/mobile-phone-security/" class="btn btn-block btn-info">
  373. <strong>Minimize the Impact of
  374. Smart Phone Loss or Theft</strong><br>
  375. You can't prevent such an event,
  376. but you can creatly minimize its impact by
  377. configuring and using your phone in
  378. safer ways</a>
  379. </div>
  380. </div>
  381. <p class="canvased textright" style="margin-top:5px;">
  382. <strong><em>Treat your password like your toothbrush.
  383. Don't let anybody else use it,
  384. and get a new one every six months. </em></strong>
  385. <br>&mdash; Clifford Stoll
  386. </p>
  387. <h2 class="centered">User Authentication</h2>
  388. <div class="row centered">
  389. <div class="col-12">
  390. <strong>Passwords &mdash; How they work,
  391. how to break them,
  392. and the alternatives</strong><br>
  393. <div class="row centered">
  394. <div class="col-12 col-md-4">
  395. <a href="/cybersecurity/password.html" class="btn btn-block btn-info">
  396. <strong>1: How passwords work:</strong>
  397. processing and storage,
  398. salt values,
  399. hashes and entropy</a>
  400. </div>
  401. <div class="col-12 col-md-8">
  402. <a href="/cybersecurity/password-breaking.html" class="btn btn-block btn-info">
  403. <strong>2: Breaking passwords:</strong>
  404. analysis of
  405. authentication strength of various
  406. operating systems, dictionary attacks,
  407. cracking attacks, Rainbow Table attacks,
  408. frequent password changes and the
  409. illusion of security</a>
  410. </div>
  411. </div>
  412. </div>
  413. <div class="col-12 col-md-3">
  414. <a href="/cybersecurity/yubikey/" class="btn btn-block btn-info">
  415. <strong>YubiKey Authentication</strong></a>
  416. </div>
  417. <div class="col-12 col-md-3">
  418. <a href="/cybersecurity/yubikey/pam_pkcs11.html" class="btn btn-block btn-info">
  419. <strong>YubiKey Authentication With pam_pkcs11.so</strong></a>
  420. </div>
  421. <div class="col-12 col-md-3">
  422. <a href="/cybersecurity/yubikey/pam_yubico.html" class="btn btn-block btn-info">
  423. <strong>YubiKey Authentication With pam_yubico.so</strong></a>
  424. </div>
  425. <div class="col-12 col-md-3">
  426. <a href="/cybersecurity/yubikey/pam_u2f.html" class="btn btn-block btn-info">
  427. <strong>YubiKey Authentication With pam_u2f.so</strong></a>
  428. </div>
  429. <div class="col-12 col-md-6">
  430. <a href="/open-source/linux-pam-compliance/" class="btn btn-block btn-info">
  431. <strong>Linux PAM Configuration for Compliance</strong><br>
  432. <em> Configure PAM to meet US DoD/DISA
  433. STIG Compliance Requirements</em></a>
  434. </div>
  435. <div class="col-12 col-md-6">
  436. <a href="/cybersecurity/hacker-passwords.html" class="btn btn-block btn-info">
  437. <strong>Reverse-Engineering the Hacker</strong><br>
  438. <em> What types of passwords will a typical
  439. hacker guess?</em></a>
  440. </div>
  441. <div class="col-12">
  442. <a href="/cybersecurity/authentication.html" class="btn btn-block btn-info">
  443. <strong>Authentication Tools</strong><br>
  444. <em>Windows authentication details,
  445. Well-known default passwords,
  446. Studies of real-world passwords
  447. and PINs,
  448. Kerberos,
  449. Password tools,
  450. Active Authentication,
  451. sudo,
  452. Tokens, Biometrics</em></a>
  453. </div>
  454. </div>
  455. <p class="canvased textright" style="margin-top:5px;">
  456. <strong><em>He that breaks a thing to find out what it is has left the path of wisdom.</em></strong>
  457. <br>&mdash; Gandalf in <em>The Fellowship of the Ring</em>
  458. </p>
  459. <h2 class="centered"> System Security (operating system auditing
  460. and hardening)</h2>
  461. <div class="row centered">
  462. <div class="col-12 col-md-6 col-lg-8">
  463. <a href="/cybersecurity/sysaudit.html" class="btn btn-block btn-info">
  464. <strong>System Security Auditing and
  465. Monitoring Tools</strong><br>
  466. <em>Common Criteria,
  467. US DOD STIGs and SRRs,
  468. SCAP tools,
  469. US Federal Desktop Core Configuration,
  470. printer security,
  471. Windows Security Configuration and
  472. Analysis Snap-In,
  473. Lynis Enterprise Suite,
  474. older tools (TARA, COPS, Titan,
  475. Bastille)</em></a>
  476. </div>
  477. <div class="col-12 col-md-3 col-lg-2">
  478. <a href="/cybersecurity/openscap.html" class="btn btn-block btn-info">
  479. <strong>System Auditing and Hardening with OpenSCAP</strong></a>
  480. </div>
  481. <div class="col-12 col-md-3 col-lg-2">
  482. <a href="/cybersecurity/hardware.html" class="btn btn-block btn-info">
  483. <strong>Hardware&nbsp;/ Firmware Exploits</strong></a>
  484. </div>
  485. </div>
  486. <div class="row centered">
  487. <div class="col-12 col-md-3 col-lg-2">
  488. <a href="/cybersecurity/physical.html" class="btn btn-block btn-info">
  489. <strong>Physical Security</strong></a>
  490. </div>
  491. <div class="col-12 col-md-9 col-lg-10">
  492. <a href="/cybersecurity/os-specific.html" class="btn btn-block btn-info">
  493. <strong>OS-Specific Security Issues</strong><br>
  494. <em>Cisco IOS, Linux, Solaris,
  495. Tru64 (ULTRIX, OSF/1),
  496. IRIX, AIX, DOS, Macintosh,
  497. Novell, AS/400, VMS, Windows</em></a>
  498. </div>
  499. </div>
  500. <div class="row centered">
  501. <div class="col-12 col-md-5">
  502. <a href="/cybersecurity/virtualization.html" class="btn btn-block btn-info">
  503. <strong>Attacks on Virtualization Security </strong></a>
  504. </div>
  505. <div class="col-12 col-md-7">
  506. <a href="/cybersecurity/root-password.html" class="btn btn-block btn-info">
  507. <strong>How to harden a default Linux or BSD installation</strong></a>
  508. </div>
  509. </div>
  510. <div class="row centered">
  511. <div class="col-12">
  512. <a href="/cybersecurity/selinux/" class="btn btn-block btn-info">
  513. <strong>Security-Enhanced Linux</strong><br>
  514. <em>How to use SELinux booleans and
  515. build and use custom SELinux policy modules</em></a>
  516. </div>
  517. </div>
  518. <div class="row centered">
  519. <div class="col-12 col-md-4">
  520. <a href="/cybersecurity/intrusion.html" class="btn btn-block btn-info">
  521. <strong>Intrusion Detection Tools</strong><br>
  522. <em>Tripwire, AIDE, Snort,
  523. RazorBack, ACID-XML, SNARE, BackLog,
  524. NetRanger, NetStalker, GrIDS</em></a>
  525. </div>
  526. <div class="col-12 col-md-3">
  527. <a href="/cybersecurity/intrusion-intro/" class="btn btn-block btn-info">
  528. <strong>Intrusion Detection Introduction</strong><br>
  529. A small example</a>
  530. </div>
  531. <div class="col-12 col-md-3">
  532. <a href="/cybersecurity/intrusion-analysis/" class="btn btn-block btn-info">
  533. <strong>Analyzing multiple intrusions into
  534. a poorly configured Linux system</strong></a>
  535. </div>
  536. <div class="col-12 col-md-2">
  537. <a href="/open-source/stig-compliance.html" class="btn btn-block btn-info">
  538. <strong>US DOD/DISA STIG Compliance for Linux</strong></a>
  539. </div>
  540. </div>
  541. <p class="canvased textright" style="margin-top:5px;">
  542. <strong><em>From a practical standpoint the security problem will
  543. remain as long as manufacturers remain
  544. committed to current system architectures,
  545. produced without a firm requirement for
  546. security.
  547. As long as there is support for ad hoc fixes
  548. and security packages for these inadequate
  549. designs and as long as the illusory results
  550. of penetration teams are accepted as
  551. demonstrations of a computer system security,
  552. proper security will not be a reality.</em></strong>
  553. <br>&mdash; Roger Schell in the USAF report
  554. <em>Preliminary Notes on the Design of Secure Military
  555. Computer Systems,</em> written in 1973
  556. </p>
  557. <h2 class="centered">Public-Key Infrastructure, TLS, and SSL</h2>
  558. <div class="row centered">
  559. <div class="col-7 col-md-5">
  560. <a href="/cybersecurity/how-browsers-use-https.html" class="btn btn-block btn-info">
  561. <strong>How Browsers Use HTTPS and TLS to Secure Web Traffic</strong></a>
  562. </div>
  563. <div class="col-5 col-md-2">
  564. <a href="/cybersecurity/ssl-tls.html" class="btn btn-block btn-info">
  565. <strong>SSL/TLS Security</strong></a>
  566. </div>
  567. <div class="col-12 col-md-5">
  568. <a href="/cybersecurity/pki-failures.html" class="btn btn-block btn-info">
  569. <strong>Failures of the Internet's Public-Key Infrastructure (PKI)</strong></a>
  570. </div>
  571. </div>
  572. <div class="row centered">
  573. <div class="col-12 col-md-3">
  574. <a href="/open-source/nginx-openssl-quantum-safe/" class="btn btn-info btn-block">
  575. <strong>Nginx, OpenSSL, and Open Quantum Safe</strong></a>
  576. </div>
  577. <div class="col-6 col-md-4">
  578. <a href="/open-source/google-freebsd-tls/" class="btn btn-info btn-block">
  579. <strong>How to Use a Let's Encrypt TLS Certificate on Google Cloud</strong></a>
  580. </div>
  581. <div class="col-6 col-md-5">
  582. <a href="/open-source/letsencrypt-tls-cert-godaddy.html" class="btn btn-info btn-block">
  583. <strong>How to Use a Let's Encrypt TLS Certificate on GoDaddy Shared Hosting</strong></a>
  584. </div>
  585. </div>
  586. <p class="canvased textright" style="margin-top:5px;">
  587. <strong><em>He who fights monsters should see to it that
  588. he himself does not become a monster.
  589. And if you gaze long enough into an abyss,
  590. the abyss will also gaze into you.</em></strong>
  591. <br>&mdash; Friedrich Nietzsche in
  592. <a href="https://amzn.to/44yBmeC">
  593. <em>Beyond Good and Evil</em></a>
  594. </p>
  595. <h2 class="centered">Network Security</h2>
  596. <div class="row centered">
  597. <div class="col-12 col-lg-8">
  598. <a href="/cybersecurity/monitoring.html" class="btn btn-block btn-info">
  599. <strong>Network Monitoring / Protocol Analysis /
  600. Packet Sniffing Tools</strong><br>
  601. <em>Linux-based, Windows-based,
  602. switch spoofing,
  603. Wireless LAN/WAN security,
  604. WLAN antenna construction,
  605. packet-sniffing attack detection</em></a>
  606. </div>
  607. <div class="col-12 col-md-6 col-lg-4">
  608. <a href="/cybersecurity/router-update.html" class="btn btn-block btn-info">
  609. <strong>Update Your Router</strong><br>
  610. Stay Secure at Home</a>
  611. </div>
  612. <div class="col-12 col-md-6 col-lg-4">
  613. <a href="/cybersecurity/telecom-outages.html" class="btn btn-block btn-info">
  614. <strong>Telecommunications Outages</strong><br>
  615. <em>Submarine cables, satellites</em></a>
  616. </div>
  617. <div class="col-6 col-md-6 col-lg-4">
  618. <a href="/open-source/openbsd-wireless-wpa2.html" class="btn btn-block btn-info">
  619. <strong>802.11i / WPA2</strong><br>
  620. <em>Wireless networking</em></a>
  621. </div>
  622. <div class="col-6 col-md-6 col-lg-4">
  623. <a href="/cybersecurity/availability/ddos.html" class="btn btn-block btn-info">
  624. <strong>DDoS</strong> <br>
  625. <em>Distributed Denial of Service</em></a>
  626. </div>
  627. </div>
  628. <div class="row centered">
  629. <div class="col-6">
  630. <a href="/cybersecurity/bgp-hijacking.html" class="btn btn-block btn-info">
  631. <strong>BGP Hijacking</strong><br>
  632. <em>Plus outages caused by politics and errors</em></a>
  633. </div>
  634. <div class="col-6">
  635. <a href="/cybersecurity/comsec.html" class="btn btn-block btn-info">
  636. <strong>COMSEC</strong><br>
  637. <em>Attacking Mobile&nbsp;/ Cellular&nbsp;/ GSM Telephony</em></a>
  638. </div>
  639. <div class="col-12">
  640. <a href="/cybersecurity/netaudit.html" class="btn btn-block btn-info">
  641. <strong>Network Security Auditing Tools</strong><br>
  642. <em>Top 100 Network Security Tools,
  643. Lists of TCP ports used by attacks,
  644. Port scanners,
  645. Network vulnerability testing,
  646. Automatic Teller Machine
  647. (ATM) security</em></a>
  648. </div>
  649. <div class="col-5 col-xl-2">
  650. <a href="/cybersecurity/www.html" class="btn btn-block btn-info">
  651. <strong>Web Security</strong></a>
  652. </div>
  653. <div class="col-7 col-xl-3">
  654. <a href="/cybersecurity/stack-hardening.html" class="btn btn-block btn-info">
  655. <strong>TCP/IP Stack hardening</strong></a>
  656. </div>
  657. <div class="col-7 col-xl-4">
  658. <a href="/cybersecurity/qr-nfc.html" class="btn btn-block btn-info">
  659. <strong>QR codes and Near-Field Communication Risks</strong></a>
  660. </div>
  661. <div class="col-5 col-xl-3">
  662. <a href="/open-source/ssh.html" class="btn btn-block btn-info">
  663. <strong>How to set up and use SSH</strong></a>
  664. </div>
  665. </div>
  666. <div class="row centered">
  667. <div class="col-12 col-md-6">
  668. <a href="/cybersecurity/firewall.html" class="btn btn-block btn-info">
  669. <strong>Firewall Tools</strong><br>
  670. <em>Linux/Unix-based, Windows based,
  671. SOHO firewalls, Commercial vendors</em></a>
  672. </div>
  673. <div class="col-12 col-md-6">
  674. <a href="/cybersecurity/attack-study/" class="btn btn-block btn-info">
  675. <strong>Network Attack Analysis</strong><br>
  676. <em>Classifying and Identifying Attack Patterns
  677. With Textual Analysis Tools</em></a>
  678. </div>
  679. </div>
  680. <p class="canvased textright" style="margin-top:5px;">
  681. <strong><em>The world is never going to be perfect, either on-
  682. or offline; so let's not set impossibly
  683. high standards for online.</em></strong>
  684. <br>&mdash; Esther Dyson
  685. </p>
  686. <h2 class="centered"> Cloud Security </h2>
  687. <div class="row centered">
  688. <div class="col-12 col-md-8">
  689. <a href="/cybersecurity/isc2-ccsp/" class="btn btn-block btn-info">
  690. <strong>Study guide for the (ISC)<sup>2</sup>
  691. CCSP (Certified Cloud Security
  692. Professional) Exam</strong></a>
  693. </div>
  694. <div class="col-12 col-md-4">
  695. <a href="/cybersecurity/cloud.html" class="btn btn-block btn-info">
  696. <strong>An Overview of Cloud Security</strong> </a>
  697. </div>
  698. </div>
  699. <div class="row centered">
  700. <div class="col-12 col-md-4">
  701. <a href="/cybersecurity/availability/cloud-archiving.html" class="btn btn-block btn-info">
  702. <strong>Cloud Archiving</strong><br>
  703. <em>Google Coldline, AWS Glacier,
  704. Cloud archiving tools</em></a>
  705. </div>
  706. <div class="col-12 col-md-4">
  707. <a href="/cybersecurity/cloud-survey.html" class="btn btn-block btn-info">
  708. <strong>Security Concerns of Cloud Technology Users:
  709. A Survey of Major Cloud Customers </strong> </a>
  710. </div>
  711. <div class="col-12 col-md-4">
  712. <a href="/open-source/linux-blog.html" class="btn btn-block btn-info">
  713. <strong>Linux and Security Blog &mdash;
  714. Thoughts from Time to Time on
  715. Linux, Security, and the Cloud</strong></a>
  716. </div>
  717. </div>
  718. <div class="row centered">
  719. <div class="col-12 col-lg-4">
  720. <a href="/cybersecurity/rsyslog-tls/" class="btn btn-block btn-info">
  721. <strong>Secure Logging with Rsyslog and TLS</strong></a>
  722. </div>
  723. <div class="col-12 col-md-6 col-lg-4">
  724. <a href="/cybersecurity/ec2-secure-storage.html" class="btn btn-block btn-info">
  725. <strong>How to set up encrypted storage on Amazon EC2</strong></a>
  726. </div>
  727. <div class="col-12 col-md-6 col-lg-4">
  728. <a href="/cybersecurity/cloud-exploit.html" class="btn btn-block btn-info">
  729. <strong>Hacked in the Cloud &mdash; An Attacker Takes Over a Cloud Server </strong></a>
  730. </div>
  731. </div>
  732. <div class="row centered">
  733. <div class="col-12 col-md-6 textleft">
  734. <h2 class="centered"> Malware, Social Engineering, and Software Security </h2>
  735. <p>
  736. <strong>Good free anti-virus / anti-malware software</strong>
  737. includes the following.
  738. ZoneAlarm incorporates spyware detection and
  739. removal software.
  740. <br>
  741. <a href="https://www.clamav.net/" class="btn btn-danger">
  742. ClamAV</a>
  743. &nbsp;
  744. <a href="https://www.clamxav.com/" class="btn btn-danger">
  745. ClamXav</a>
  746. &nbsp;
  747. <a href="https://www.avira.com/" class="btn btn-danger">Avira</a>
  748. &nbsp;
  749. <a href="https://www.avg.com/free-antivirus-download" class="btn btn-danger">AVG</a>
  750. &nbsp;
  751. <a href="https://www.zonealarm.com/" class="btn btn-danger">ZoneAlarm</a>
  752. </p>
  753. <p>
  754. I <em class="underlined">used to</em> recommend
  755. <a href="https://www.avast.com/" class="btn btn-danger">Avast!</a>,
  756. but then it was
  757. <a href="https://www.msn.com/en-us/news/technology/avast-fined-165-million-for-privacy-software-that-actually-sold-users-browsing-data/ar-BB1iJpg2">
  758. fined US$&nbsp;16.5 million for
  759. selling users' browsing data</a>.
  760. </p>
  761. <p>
  762. <a href="https://www.virustotal.com/gui/home/upload">
  763. <strong>VirusTotal</strong></a>
  764. lets you up upload suspicious data for scanning and
  765. analysis by several malware detection systems.
  766. <br>
  767. <a href="https://www.virustotal.com/gui/home/upload" class="btn btn-danger">VirusTotal</a>
  768. </p>
  769. <p>
  770. The
  771. <strong><a href="https://support.kaspersky.com/viruses/rescuedisk">
  772. Kaspersky Rescue Disk</a></strong>
  773. lets you safely boot and clean infected Windows
  774. systems that can't be cleaned with the normal tools.
  775. </p>
  776. <p>
  777. <a href="https://malware.lu/">Malware.lu</a>
  778. is a repository of malware and technical analyses for
  779. security researchers.
  780. </p>
  781. <p>
  782. Attrition.org has a
  783. <a href="https://attrition.org/errata/cpo/">
  784. list of vendors that have shipped malware
  785. with their products</a>.
  786. </p>
  787. </div>
  788. <div class="col-12 col-md-6">
  789. <div class="centered cb">
  790. <ins class="adsbygoogle responsive"
  791. style="display:block;"
  792. data-full-width-responsive="true"
  793. data-ad-client="ca-pub-5845932372655417"
  794. data-ad-slot="4849215406"></ins>
  795. <script>
  796. (adsbygoogle = window.adsbygoogle || []).push({});
  797. </script>
  798. </div>
  799. </div>
  800. </div>
  801. <div class="row centered">
  802. <div class="col-12 col-md-4 col-lg-3">
  803. <a href="/cybersecurity/scams-spam-phishing.html" class="btn btn-block btn-info">
  804. <strong>Learn about scams, spam, phishing, and worse,
  805. and take some great Phishing IQ tests</strong></a>
  806. </div>
  807. <div class="col-12 col-md-8 col-lg-4">
  808. <a href="/cybersecurity/hostile/" class="btn btn-block btn-info">
  809. <strong>Analyzing Hostile Data</strong><br>
  810. <em>An overview of viruses, worms, trojans,
  811. downloaders and other malware, plus
  812. analysis of: Bagel, Mytob, Mydoom,
  813. and more</em></a>
  814. </div>
  815. <div class="col-12 col-lg-5">
  816. <a href="/cybersecurity/software.html" class="btn btn-block btn-info">
  817. <strong>Software Security Tools</strong><br>
  818. <em>How to develop software that is more secure,
  819. The SAFECode <em>Fundamental Practices for Secure Software Development,</em>
  820. C/C++ Security,
  821. Python Security,
  822. Java Security,
  823. Node.js Security,
  824. ActiveX Attacks,
  825. Writing Exploit Code</em></a>
  826. </div>
  827. <div class="col-12">
  828. <a href="/cybersecurity/extortion.html" class="btn btn-block btn-info">
  829. <strong>Analyzing a System Hacked by Extortionware, also called Police Ransomware</strong></a>
  830. </div>
  831. <div class="col-12 col-md-6 col-lg-3">
  832. <a href="/cybersecurity/hoax.html" class="btn btn-block btn-info">
  833. <strong>Social Engineering and Fighting Internet Hoaxes</strong></a>
  834. </div>
  835. <div class="col-12 col-md-6 col-lg-3">
  836. <a href="/cybersecurity/html-email.html" class="btn btn-block btn-info">
  837. <strong>Why HTML E-mail is Dangerous</strong></a>
  838. </div>
  839. <div class="col-12 col-md-6 col-lg-3">
  840. <a href="/cybersecurity/web-mail-spear-phishing.html" class="btn btn-block btn-info">
  841. <strong>Analyzing Web Mail Abuse and Spear-Phishing</strong></a>
  842. </div>
  843. <div class="col-12 col-md-6 col-lg-3">
  844. <a href="/cybersecurity/scam-analysis.html" class="btn btn-block btn-info">
  845. <strong>Analyzing a Phishing Scam Attempt</strong></a>
  846. </div>
  847. </div>
  848. <p class="canvased textright" style="margin-top:5px;">
  849. <strong><em>We kill people based on metadata.</em></strong>
  850. <br>&mdash; Former NSA and CIA director Michael Hayden, 2014
  851. </p>
  852. <h2 class="centered">Reference Material</h2>
  853. <div class="row centered">
  854. <div class="col-12 col-md-6">
  855. <a href="/cybersecurity/exam-prep.html" class="btn btn-block btn-info">
  856. <strong>How to Prepare For, and Pass,
  857. Certification Exams</strong></a>
  858. </div>
  859. <div class="col-12 col-md-6">
  860. <a href="/cybersecurity/comptia/" class="btn btn-block btn-info">
  861. <strong>Guidance for passing the CompTIA
  862. Security+ Certification Exam</strong></a>
  863. </div>
  864. </div>
  865. <div class="row centered">
  866. <div class="col-12 col-md-6">
  867. <a href="/cybersecurity/isc2-cissp/" class="btn btn-block btn-info">
  868. <strong>Study guide for the (ISC)<sup>2</sup>
  869. CISSP (Certified Information Systems
  870. Security Professional) Exam</strong></a>
  871. </div>
  872. <div class="col-12 col-md-6">
  873. <a href="/cybersecurity/isc2-ccsp/" class="btn btn-block btn-info">
  874. <strong>Study guide for the (ISC)<sup>2</sup>
  875. CCSP (Certified Cloud Security
  876. Professional) Exam</strong></a>
  877. </div>
  878. </div>
  879. <div class="row centered">
  880. <div class="col-12 col-md-6">
  881. <a href="/cybersecurity/bulletins.html" class="btn btn-block btn-info">
  882. <strong>Infosec Bulletins and Mailing Lists</strong></a>
  883. </div>
  884. <div class="col-12 col-md-6">
  885. <a href="/cybersecurity/policy.html" class="btn btn-block btn-info">
  886. <strong>Policy Requirements and Guidance</strong></a>
  887. </div>
  888. </div>
  889. <p>
  890. Here is a chart comparing certifications,
  891. someone picked this up at a SANS event.
  892. An interactive updated version is
  893. <a href="https://pauljerimy.com/security-certification-roadmap/">
  894. here</a>.
  895. </p>
  896. <div class="centered">
  897. <img src="pictures/cert_2020.jpg"
  898. alt="Chart of certifications as of 2020."
  899. class="bordered" loading="lazy">
  900. </div>
  901. <div class="row centered">
  902. <div class="col-12">
  903. <a href="/cybersecurity/rfcs.html" class="btn btn-block btn-info">
  904. <strong>Security-Related RFCs (Valuable Documents!)
  905. and Mitre nomenclature projects</strong><br>
  906. <em>Some of these function as dictionaries
  907. and explain the terminology.
  908. Others provide the formal definitions
  909. of networking protocols</em></a>
  910. </div>
  911. <div class="col-12 col-md-2">
  912. <a href="/cybersecurity/major-breaches.html" class="btn btn-block btn-info">
  913. <strong>Major Breaches</strong><br>
  914. <em>Password dumps, large data breaches</em></a>
  915. </div>
  916. <div class="col-12 col-md-4">
  917. <a href="/cybersecurity/generalinfo.html" class="btn btn-block btn-info">
  918. <strong>General Information</strong><br>
  919. <em>DNS Security Issues,
  920. Incidents and Anecdotes,
  921. Government Warnings and Reactions</em></a>
  922. </div>
  923. <div class="col-12 col-md-6">
  924. <a href="/cybersecurity/cyberwar/" class="btn btn-block btn-info">
  925. <strong>Cyberwar, Economic Espionage, and Advanced Persistent Threats</strong><br>
  926. <em>Military Applications of Network
  927. Attack and Defense,
  928. International Conflict on the Internet,
  929. Military-Industrial Espionage,
  930. Viruses and Hacking,
  931. Threat Reports and Warnings,
  932. Offensive Information Warfare &amp;
  933. Information Operations</em></a>
  934. </div>
  935. </div>
  936. <div class="row centered">
  937. <div class="col-12 col-md-7 col-lg-9">
  938. <a href="/cybersecurity/infosec-response.html" class="btn btn-block btn-info">
  939. <strong>Infosec Response Teams</strong><br>
  940. <em>Incident Response Teams,
  941. Assistance and Guidance,
  942. Research and Development, Vendors,
  943. Risk Management and Insurance
  944. Coverage</em></a>
  945. </div>
  946. <div class="col-12 col-md-5 col-lg-3">
  947. <a href="/cybersecurity/badguys.html" class="btn btn-block btn-info">
  948. <strong>Keeping Track of the Bad Guys</strong><br>
  949. <em>Classic Hackers, Hacker Technology</em></a>
  950. </div>
  951. </div>
  952. <div class="row centered">
  953. <div class="col-12 col-md-6 col-lg-4">
  954. <a href="/cybersecurity/history/" class="btn btn-block btn-info">
  955. <strong>Cryptographic History</strong></a>
  956. </div>
  957. <div class="col-12 col-md-6 col-lg-4">
  958. <a href="/open-source/crashdumps.html" class="btn btn-block btn-info">
  959. <strong>The Gallery of Crash Dump Screens</strong></a>
  960. </div>
  961. <div class="col-12 col-md-6 col-lg-4">
  962. <a href="/cybersecurity/crypto/haiku.html" class="btn btn-block btn-info">
  963. <strong>Cryptographic Haiku</strong></a>
  964. </div>
  965. </div>
  966. <p>
  967. <a href="https://www.cvedetails.com/"><strong>CVE Details</strong></a>
  968. is a great source of information on vulnerabilities.
  969. You can search by CVE reference, by vendor, and product name.
  970. </p>
  971. </nav>
  972. <h2> Internet threat warnings </h2>
  973. <p>
  974. I find these to be helpful sources of information on
  975. current events and trends:
  976. </p>
  977. <p>
  978. <a href="https://krebsonsecurity.com/" class="btn btn-success" style="margin:5px;">
  979. Krebs On Security</a>
  980. <a href="https://securelist.com/" class="btn btn-success" style="margin:5px;">
  981. SecureList</a>
  982. <a href="https://www.us-cert.gov/ncas/current-activity" class="btn btn-success" style="margin:5px;">
  983. US-CERT Current Activity</a>
  984. <a href="https://www.flashpoint.io/blog/" class="btn btn-success" style="margin:5px;">
  985. Flashpoint Intelligence Corner</a>
  986. </p>
  987. <div class="centered">
  988. <img src="https://www.dshield.org/images/dshield_live_banner.png"
  989. alt="DShield live banner."
  990. loading="lazy">
  991. </div>
  992. <h2> Internet security "global dashboards" </h2>
  993. <p>
  994. Some of these are useful, some have a relatively high
  995. level of hype, but you might find some of these useful:
  996. </p>
  997. <p>
  998. <a href="https://map.internetintel.oracle.com/" class="btn btn-warning" style="margin:5px;">
  999. Oracle Internet Intelligence</a>
  1000. <a href="https://cybermap.kaspersky.com/" class="btn btn-warning" style="margin:5px;">
  1001. Kaspersky</a>
  1002. <a href="https://dshield.org/" class="btn btn-warning" style="margin:5px;">
  1003. DShield</a>
  1004. <a href="http://www.internettrafficreport.com/" class="btn btn-warning" style="margin:5px;">
  1005. Internet Traffic Report</a>
  1006. <a href="https://isc.sans.org/" class="btn btn-warning" style="margin:5px;">
  1007. SANS Internet Storm Center</a>
  1008. <a href="https://www.digitalattackmap.com/#anim=1&amp;color=0&amp;country=ALL&amp;list=0&amp;time=16434&amp;view=map" class="btn btn-warning" style="margin:5px;">
  1009. Live Digital Attack Map</a>
  1010. <a href="https://radar.securitywizardry.com/" class="btn btn-warning" style="margin:5px;">
  1011. Security Wizardry Computer Network <br>
  1012. Defence Situational Awareness</a>
  1013. </p>
  1014. <h2> Where to go from here </h2>
  1015. <p>
  1016. Make sure you understand your systems well, and set them
  1017. up properly!
  1018. As Hippocrates said, <em>"Primum non nocere"</em>, or
  1019. <em>"First, do no harm."</em>
  1020. </p>
  1021. <p>
  1022. Be aware that your browser always gives away some information
  1023. about you, unless you are using
  1024. <a href="https://www.torproject.org/">
  1025. Tor</a>
  1026. and using it very carefully.
  1027. Your browser just provided this information:
  1028. </p>
  1029. <table class="bordered" style="font-size: 80%; max-width:100%; display:inline-block; white-space:nowrap;">
  1030. <tr><td>REMOTE ADDR</td><td>23.22.170.185</td></tr>
  1031. <tr><td>REMOTE PORT</td><td>54258</td></tr>
  1032. <tr><td>HTTP CONNECTION</td><td>Keep-Alive</td></tr>
  1033. <tr><td>HTTP HOST</td><td>cromwell-intl.com</td></tr>
  1034. <tr><td>HTTP ACCEPT ENCODING</td><td>gzip</td></tr>
  1035. <tr><td>HTTP ACCEPT</td><td>text/html, application/xhtml+xml, application/xml; q=0.9, */*; q=0.8</td></tr>
  1036. <tr><td>HTTP USER AGENT</td><td>Validator.nu/LV https://validator.w3.org/services</td></tr>
  1037. </table>
  1038. <!-- start of footer.html -->
  1039. <footer>
  1040. <nav class="cb centered">
  1041. <hr style="margin-bottom: 2px; padding-bottom: 0px;">
  1042. <!-- Amazon oneTag script -->
  1043. <div id="amzn-assoc-ad-06659344-4b29-4e93-b5fa-6c771be869c0"></div>
  1044. <script async src="https://z-na.associates-amazon.com/onetag/v2?MarketPlace=US&instanceId=06659344-4b29-4e93-b5fa-6c771be869c0"></script>
  1045. <!-- Google matched content -->
  1046. <p style="font-size:0.8rem; text-align:left; margin:0; padding:2px;">
  1047. Now some lurid advertisements from Google AdSense:
  1048. </p>
  1049. <div class="centered">
  1050. <ins class="adsbygoogle"
  1051. style="display:block;"
  1052. data-full-width-responsive="true"
  1053. data-ad-client="ca-pub-5845932372655417"
  1054. data-ad-slot="9123376601"
  1055. data-ad-format="autorelaxed"></ins>
  1056. <script>
  1057. (adsbygoogle = window.adsbygoogle || []).push({});
  1058. </script>
  1059. </div>
  1060. <nav class="row centered" style="margin-top:1px; padding-top:0; margin-bottom: 1em;">
  1061. <div class="col-6 col-md-3">
  1062. <a href="/" class="btn btn-info btn-block">
  1063. Home</a>
  1064. </div>
  1065. <div class="col-6 col-md-3">
  1066. <a href="/travel/" class="btn btn-info btn-block">
  1067. Travel</a>
  1068. </div>
  1069. <div class="col-6 col-md-3">
  1070. <a href="/open-source/" class="btn btn-info btn-block">
  1071. Linux/Unix</a>
  1072. </div>
  1073. <div class="col-6 col-md-3">
  1074. <a href="/cybersecurity/" class="btn btn-info btn-block">
  1075. Cybersecurity</a>
  1076. </div>
  1077. <div class="col-6 col-md-3">
  1078. <a href="/networking/" class="btn btn-info btn-block">
  1079. Networking</a>
  1080. </div>
  1081. <div class="col-6 col-md-3">
  1082. <a href="/technical/" class="btn btn-info btn-block">
  1083. Technical</a>
  1084. </div>
  1085. <div class="col-6 col-md-3">
  1086. <a href="/radio/" class="btn btn-info btn-block">
  1087. Radio</a>
  1088. </div>
  1089. <div class="col-6 col-md-3">
  1090. <a href="/blog/" class="btn btn-info btn-block">
  1091. Blog</a>
  1092. </div>
  1093. </nav>
  1094. <div class="row centered">
  1095. <div class="col-4 col-lg-2">
  1096. <a href="https://www.freebsd.org/">
  1097. <img src="/ssi/powerlogo.gif" alt="FreeBSD" loading="lazy"></a>
  1098. </div>
  1099. <div class="col-4 col-lg-2">
  1100. <a href="https://nginx.org/">
  1101. <img src="/ssi/nginx_logo-70pc.png" alt="Nginx" loading="lazy"></a>
  1102. </div>
  1103. <div class="col-4 col-lg-2">
  1104. <a href="https://www.unicode.org/">
  1105. <img src="/ssi/unicode.png"
  1106. alt="Valid Unicode."
  1107. loading="lazy"
  1108. style="padding: 0 0 8px 0; margin: 0;"></a>
  1109. </div>
  1110. <div class="col-4 col-lg-2">
  1111. <a href="https://notbyai.fyi/">
  1112. <img src="/ssi/produced-by-human.png"
  1113. alt="Produced by a human, not A.I."
  1114. loading="lazy"></a>
  1115. </div>
  1116. <div class="col-4 col-lg-2">
  1117. <a href="https://validator.w3.org/nu/?showsource=yes&amp;doc=https://cromwell-intl.com/cybersecurity/Index.html"><img src="/ssi/html5-badge-h-css3-semantics.png"
  1118. alt="Valid HTML 5. Validate it here."
  1119. loading="lazy"
  1120. style="padding: 0; margin: 0;"></a>
  1121. </div>
  1122. <div class="col-4 col-lg-2">
  1123. <a href="https://jigsaw.w3.org/css-validator/check/referer">
  1124. <img src="/ssi/valid-css.png"
  1125. alt="Valid CSS. Validate it here."
  1126. loading="lazy"
  1127. style="padding: 5px 0 3px 0; margin: 0;"></a>
  1128. </div>
  1129. </div>
  1130. <div class="fl">
  1131. <a href="https://mastodon.world/@bobthetraveler" rel="me" class="badge badge-pill badge-success" style="margin-bottom:5px;"><span style="font-size:1.25rem;">&#x1f9a3;</span> Bob the Traveler</a>
  1132. &nbsp;
  1133. <a href="https://mstdn.social/@conansysadmin" rel="me" class="badge badge-pill badge-success" style="margin-bottom:5px;"><span style="font-size:1.25rem;">&#x1f9a3;</span> Conan the Sysadmin</a>
  1134. <br>
  1135. <!--
  1136. <a href="https://twitter.com/share" class="twitter-share-button" data-lang="en" data-count="none" style="margin:0; padding:0;">Tweet</a>
  1137. <a href="https://twitter.com/ToiletGuru" class="twitter-follow-button" data-show-count="false" data-show-screen-name="false">Follow @ToiletGuru</a>
  1138. <br>
  1139. <a href="https://www.reddit.com/login?dest=https%3A%2F%2Fwww.reddit.com%2Fsubmit" onclick="window.location = 'https://www.reddit.com/login?dest=https%3A%2F%2Fwww.reddit.com%2Fsubmit' + encodeURIComponent(window.location); return false"><img src="https://www.redditstatic.com/spreddit6.gif" alt="submit to reddit" loading="lazy" style="position:relative; margin:0; padding:0;"></a>
  1140. -->
  1141. </div>
  1142. <aside>
  1143. <p class="fr textright" style="font-size: 0.8rem;">
  1144. Viewport size:
  1145. <span id="w"></span> &times; <span id="h"></span>
  1146. <script>
  1147. (function() {
  1148. if (typeof(document.documentElement.clientWidth) != 'undefined') {
  1149. var $w = document.getElementById('w'),
  1150. $h = document.getElementById('h');
  1151. $w.innerHTML = document.documentElement.clientWidth;
  1152. $h.innerHTML = document.documentElement.clientHeight;
  1153. window.onresize = function(event) {
  1154. $w.innerHTML = document.documentElement.clientWidth;
  1155. $h.innerHTML = document.documentElement.clientHeight;
  1156. };
  1157. }
  1158. })();
  1159. </script>
  1160. <br>
  1161. <a href="/open-source/google-freebsd-tls/apache-http2-php.html">Protocols</a>: HTTP/1.0 / TLSv1.3<br><a href="/open-source/nginx-openssl-quantum-safe/">Crypto</a>: X25519 / TLS_AES_256_GCM_SHA384</p>
  1162. </aside>
  1163. <!-- margin-bottom needed for infolinks ad -->
  1164. <p class="cl centered" style="font-size:0.9rem; margin-bottom:120px;">
  1165. &#x00a9; by
  1166. <a href="/contact.html">Bob Cromwell</a>
  1167. May 2024. Created with
  1168. <a href="http://thomer.com/vi/vi.html"><code>vim</code></a>
  1169. and
  1170. <a href="https://www.imagemagick.org/">ImageMagick</a>,
  1171. hosted on
  1172. <a href="https://www.freebsd.org/">FreeBSD</a>
  1173. with
  1174. <a href="https://nginx.org/">Nginx</a>.
  1175. <br>
  1176. As an Amazon Associate, I earn from qualifying purchases.
  1177. <br>
  1178. <a href="/contact.html">Contact</a> |
  1179. <a href="/cybersecurity/privacy-policy.html">Privacy policy</a> |
  1180. <a href="/cybersecurity/root-password.html">Root password here</a>
  1181. </p>
  1182. </nav>
  1183. </footer>
  1184. </article>
  1185. <!-- moved to footer for speed, get JavaScript from CDN -->
  1186. <!-- get integrity="..." strings from https://www.srihash.org/ -->
  1187. <script async src="https://cdnjs.cloudflare.com/ajax/libs/modernizr/2.8.3/modernizr.min.js" integrity="sha512-3n19xznO0ubPpSwYCRRBgHh63DrV+bdZfHK52b1esvId4GsfwStQNPJFjeQos2h3JwCmZl0/LgLxSKMAI55hgw==" crossorigin="anonymous"></script>
  1188. <script async src="https://code.jquery.com/jquery-3.6.1.slim.min.js" integrity="sha384-MYL22lstpGhSa4+udJSGro5I+VfM13fdJfCbAzP9krCEoK5r2EDFdgTg2+DGXdj+" crossorigin="anonymous"></script>
  1189. <script async src="https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.min.js" integrity="sha384-cVKIPhGWiC2Al4u+LWgxfKTRIcfu0JTxR+EQDz/bgldoEyl4H0zUF0QKbrJ0EcQF" crossorigin="anonymous"></script>
  1190. <!-- Use this to "lazy-load" images as: <img data-src="...
  1191. <script async src="/js/jquery.lazyloadxt.js"></script>
  1192. -->
  1193. <!-- social media button support -->
  1194. <!-- twitter support -->
  1195. <!--
  1196. <script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="https://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script>
  1197. -->
  1198. <!-- facebook support -->
  1199. <!--
  1200. <div id="fb-root"></div>
  1201. <script>(function(d, s, id) {
  1202. var js, fjs = d.getElementsByTagName(s)[0];
  1203. if (d.getElementById(id)) return;
  1204. js = d.createElement(s); js.id = id;
  1205. js.src = "https://connect.facebook.net/en_US/all.js#xfbml=1";
  1206. fjs.parentNode.insertBefore(js, fjs);
  1207. }(document, 'script', 'facebook-jssdk'));</script>
  1208. -->
  1209. <!-- pinterest -->
  1210. <!--
  1211. <script>
  1212. (function(d){
  1213. var f = d.getElementsByTagName('SCRIPT')[0], p = d.createElement('SCRIPT');
  1214. p.type = 'text/javascript';
  1215. p.async = true;
  1216. p.src = '//assets.pinterest.com/js/pinit.js';
  1217. f.parentNode.insertBefore(p, f);
  1218. }(document));
  1219. </script>
  1220. -->
  1221. <!-- Infolinks ad support -->
  1222. <script> var infolinks_pid = 3267443; var infolinks_wsid = 0; </script> <script async src="//resources.infolinks.com/js/infolinks_main.js"></script>
  1223. <!-- end of footer.html -->
  1224. </body>
  1225. </html>

Used the schema for HTML + SVG 1.1 + MathML 3.0 + RDFa 1.1.

Used the HTML parser. Externally specified character encoding was UTF-8.

Total execution time 403 milliseconds.


About this checkerReport an issueVersion: 24.4.22