Posts

Showing posts from November, 2017

Some Services to Secure Your Applications - Alibaba Cloud

Alibaba offers an industry-leading suite of security solutions through its Alibaba Cloud platform. These solutions offer features an enterprise needs to provide a solid base for all their web and mobile applications to directly serve their customers, and enhance partner relationships. Overview Alibaba Cloud, as one of the largest international public cloud computing companies, has a strong focus on providing security services as part of its offerings, and has the largest market share within China. The security services offered range from basic SSH key management to advanced DDoS protection and mobile application scanning. All of these services are available to be subscribed to and used via Alibaba Cloud’s administration console, via a single global account. Host (Server-based) Security The first security service that you need to be aware of is the key management service for SSH keys. These keys are used by Linux instances for authentication. Each instance of a Linux server c

5 Blockchain Applications That Are Shaping Your Future

You probably have heard of bitcoin and cryptocurrency by now. And as of late the term “ Blockchain “ has made huge splashes in the tech community. It’s the technology that underpins  digital currencies  and ensures that all transactions are properly conducted and recorded. But what is stored on the blockchain need not be just a monetary unit - it can be put to all manner of other interesting uses. But, there is one underlying question most have. What are the blockchain applications of the future? As it turns out, more applications besides the currency can be developed to harness the technology. The following are five of the blockchain ideas that are in work in progress stage. DISTRIBUTED CLOUD STORAGE Blockchain data storage will become a massive disruptor shortly. (3-5 years) Current cloud storage services are centralized — thus you the users must place trust in a single storage provider. “They” control all of your online assets. On the other hand with the Blockchain

A collection of hacking / penetration testing resources to make you better!

Learning the Skills Free interactive labs with White Hat Academy  - 32 labs, easy account sign in with github credentials Learning Exploitation with Offensive Computer Security 2.0  - blog-style instruction, includes: slides, videos, homework, discussion. No login required. Cybrary  - coursera style website, lots of user-contributed content, account required, content can be filtered by experience level OffensiveComputerSecurity  - academic content, full semester course including 27 lecture videos with slides and assign readings CS 642: Intro to Computer Security  - academic content, full semester course, includes assigned readings, homework and github refs for exploit examples. NO VIDEO LECTURES. Free cyber security training  - Academic content, 8 full courses with videos from a quirky instructor sam, links to research, defcon materials and other recommended training/learning SecurityTube  - tube-styled content, "megaprimer" videos covering various topics, no readabl