linux poison RSS
linux poison Email
0

Secure Encryption and Decryption of files and streams - ccrypt

ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.

Unlike unix crypt, the algorithm provided by ccrypt is not symmetric, i.e., one must specify whether to encrypt or decrypt. The most common way to invoke ccrypt is via the commands ccencrypt and ccdecrypt. There is also a ccat command for decrypting a file directly to the terminal, thus reducing the likelihood of leaving temporary plaintext files around. In addition, there is a compatibility mode for decrypting legacy unix crypt files. An emacs mode is also supplied for editing encrypted text files.

Read more
0

Protect SSH server from dictionary attacks using iptables

iptables is built on top of netfilter, iptables is the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.

If you are using SSH then you will sooner or later notice someone trying to hack into your box using dictionary attacks. You can use the iptables module recent to limit a minimum time between new connections from the same IP.

Read more
0

UI Application for Image Batch Processing - Phatch

Phatch is a simple to use cross-platform GUI Image Batch Processor which handles all popular image formats and can duplicate (sub) folder hierarchies. Phatch can batch resize, rotate, apply perspective, shadows, rounded corners, ... and more in minutes instead of hours or days if you do it manually. Phatch allows you to use EXIF and IPTC tags for renaming and data stamping. Phatch also supports a console version to batch photos on webservers.

Read more
0

Checks existence of open proxy - proxycheck

Open proxies of various kinds are used nowadays for various evil things like sending mass spam, hacking into your machine, making denial of service attacks (DoS) and the like. Every such machine should be either secured properly or turned off permanently, but that's not an option, since in most cases there is either no administrator of such machines exists at all, or he has no clue about what's on that machine, or it's irrelevant for him. So the only way to stop massive abuse made via such machines is to block them. Also, network administrators (of an ISP for example) are able to warn their clients whenever they are running an insecure proxy services - periodical scanning of client's network may also be a good idea.

This command-line tool, proxycheck, may be used for such purpose. Currently, it understands 3 types of proxy servers: HTTP proxies that allows you to CONNECT to any host:port, SOCKS v4 and v5 proxies, wingate "telnet" proxy servers of various kinds (incl. e.g. CCProxy variants and others), and FTP proxies that are able to create transparent connections.

Read more
1

Test your hacking skills - WackoPicko

WackoPicko is a website that contains known vulnerabilities. It was first used for the paper Why Johnny Can't Pentest: An Analysis of back-box Web Vulnerability Scanners found:
http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf

WackoPicko Install Instructions:
Import the WackoPicko database into MySQL using a command like the following:
mysql -u <user> -p < current.sql
This will create the MySQL user wackopicko with the password webvuln!@# as well as create the wackopicko table. The wackopicko table contains all of the data that was present while testing the scanners in Why Johnny Can't Pentest.

Read more
0

UI Application for checking websites and HTML documents for broken links - linkchecker

It's easy to do a manual check for broken link for a small sites but it's not possible for carrying out the same manual tasks when you sites contains 1000's web pages and these pages keep's on getting added or deleted at the same time, for this you need some sort of automation tool which can do the same job for you in very effective and smart way, With LinkChecker, you can check HTML documents and Web sites for broken links.Linkchecker also provides a graphical interface "linkchecker-gui" to check links of websites and HTML documents.

Read more
0

Create jigsaw puzzle from pictures with Picpuz

Picpuz is an on-screen "jigsaw puzzle". You can take almost any image file and break it into many pieces which you can then reassemble using the mouse.

You can control the size of the puzzle and the number of pieces (tens to thousands). You can save an unfinished puzzle and resume it later.

You can take almost any image (jpeg, tiff, png ...) and scramble it into many pieces (tens to hundreds). You can then reassemble the picture using the mouse to move the pieces around.
Read more
0

Free and Open Source network access control (NAC) system - PacketFence

If your network is a breeding ground for worms, PacketFence is for you. If you have no idea who connects to your network and who owns a particular computer, PacketFence is for you. If you have no way of mapping a network policy violation to a user, PacketFence is for you.

PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) system. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, 802.1X support, layer-2 isolation of problematic devices, integration with the Snort IDS and the Nessus vulnerability scanner; PacketFence can be used to effectively secure networks - from small to very large heterogeneous networks.

Read more
0

How to read the content from the RAM (Random Access Memory)

RAM Stands for "Random Access Memory,". RAM is made up of small memory chips that form a memory module. These modules are installed in the RAM slots on the motherboard of your computer.

RAM (random access memory) is the place in a computer where the operating system, application programs, and data in current use are kept so that they can be quickly reached by the computer's processor. RAM is much faster to read from and write to than the other kinds of storage in a computer, the hard disk, floppy disk, and CD-ROM. However, the data in RAM stays there only as long as your computer is running. When you turn the computer off, RAM loses its data. When you turn your computer on again, your operating system and other files are once again loaded into RAM, usually from your hard disk.

Read more
1

Graphical Desktop Wiki - Zim

Zim is a graphical text editor used to maintain a collection of wiki pages. Each page can contain links to other pages, simple formatting and images. Pages are stored in a folder structure, like in an outliner, and can have attachments. Creating a new page is as easy as linking to a nonexistent page. All data is stored in plain text files with wiki formatting. Various plugins provide additional functionality, like a task list manager, an equation editor, a tray icon, and support for version control.

Read more
Related Posts with Thumbnails