Useful links

Started by certforumz, May 30, 2018, 05:49:24 AM

Previous topic - Next topic

certforumz

SSL Decription: https://live.paloaltonetworks.com/t5/Community-Blog/What-is-SSL-Decryption/ba-p/51883
Radius vs TACACS: https://www.networkworld.com/article/2838882/radius-versus-tacacs.html
USB on the GO: https://en.wikipedia.org/wiki/USB_On-The-Go
DLL Sideloading: https://cleartextblog.blogspot.com/2015/02/malware-technique-dll-side-loading.html
Penetration testing: https://itpro.tv/course-library/security-updated-2017/penetration-testing-concepts/
Pivot testing: https://www.packtpub.com/mapt/book/networking_and_servers/9781787287839/3/ch03lvl1sec30/using-the-pivot
Active rennaissance: https://www.webopedia.com/TERM/A/active_reconnaissance.html
Persistent penetration testing: https://microsolved.com/persistentPenetration.html
Pivoting to internal network: https://securitycafe.ro/tag/pentest-pivoting/
Phases of penetration testing: http://gotowebsecurity.com/ethical-hacking-course-module-01-phases-of-penetration-testing/
Risk Response Strategies: https://ebrary.net/3409/management/risk_response_strategies
SAN and NAS: https://www.networkworld.com/article/3256312/storage/what-is-a-san-and-how-does-it-differ-from-nas.html
Vulnerability scanning: https://www.safaribooksonline.com/library/view/security-power-tools/9780596009632/ch03.html
Remote wipe: https://www.techopedia.com/definition/10352/remote-wipe
NFC Near Field Communication: http://nearfieldcommunication.org/about-nfc.html
RFID: https://www.tutorialsweb.com/rfid/introduction-to-radio-frequency-identification.htm
Phishing, Pharming, Vishing, and Smishing : https://security.intuit.com/index.php/protect-your-information/phishing-pharming-vishing-and-smishing
Typo squatting: https://securingtomorrow.mcafee.com/consumer/family-safety/what-is-typosquatting/
Rainbow table" https://en.wikipedia.org/wiki/Rainbow_table
Driver manipulation: https://www.lynda.com/Security-tutorials/Driver-manipulation/599625/661859-4.html
Refactoring: https://www.agilealliance.org/glossary/refactoring/#q=~(filters~(postType~(~'page~'post~'aa_book~'aa_event_session~'aa_experience_report~'aa_glossary~'aa_research_paper~'aa_video)~tags~(~'refactoring))~searchTerm~'~sort~false~sortDirection~'asc~page~1)
Shim(computing): https://en.wikipedia.org/wiki/Shim_(computing)
SQL injection: https://www.w3schools.com/sql/sql_injection.asp

certforumz

arp: http://www.erg.abdn.ac.uk/users/gorry/course/inet-pages/arp.html
ping tracert etc: http://www.c-jump.com/CIS24/Slides/Networking/html_utils/ping.html
How to Use Traceroute to Identify Network Problems: https://www.howtogeek.com/134132/how-to-use-traceroute-to-identify-network-problems/
Prevent Cross-Site Request Forgery (XSRF/CSRF) https://docs.microsoft.com/en-us/aspnet/core/security/anti-request-forgery?view=aspnetcore-2.0
Cross site scripting forgery: https://www.acunetix.com/blog/articles/cross-site-request-forgery/
What is a Polymorphic Virus and how do you deal with it http://www.thewindowsclub.com/polymorphic-virus
Phage virus: https://www.techopedia.com/definition/28318/phage-virus
What is DevOps: https://theagileadmin.com/what-is-devops/
Race condition and how to avoid it: https://www.quora.com/What-is-a-race-condition-How-do-you-avoid-it
Security as service: http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Security-As-A-Service.aspx
Correlation engine: https://whatis.techtarget.com/definition/correlation-engine
A Comparative Study of Correlation Engines for Security Event Management https://www.researchgate.net/publication/275654821_A_Comparative_Study_of_Correlation_Engines_for_Security_Event_Management
SSL acceleration: https://en.wikipedia.org/wiki/SSL_acceleration
Hardware-based full disk encryption https://en.wikipedia.org/wiki/Hardware-based_full_disk_encryption
Full Disk Encryption: https://spaces.internet2.edu/display/2014infosecurityguide/Full+Disk+Encryption
What are the differences between TPM and HSM? https://security.stackexchange.com/questions/88744/what-are-the-differences-between-tpm-and-hsm
Intrusion Detetion (IDS) and Prevention (IPS) Systems https://www.webopedia.com/DidYouKnow/Computer_Science/intrusion_detection_prevention.asp
Sniffers: What They Are and How to Protect Yoursel https://www.symantec.com/connect/articles/sniffers-what-they-are-and-how-protect-yourself
Intrusion Detection using Packet Sniffer  http://www.academicscience.co.in/admin/resources/project/paper/f201510151444878340.pdf
FED and SED: https://www.thalesesecurity.com/faq/encryption/what-full-disk-encryption-fed-and-what-are-self-encrypting-drives-sed