Friday, March 6, 2015

Oracle 11g Anti-Hacker's Cookbook (e-book)




Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server.
Learn to protect your sensitive data by using industry certified techniques
Implement and use ultimate techniques in Oracle Security and new security features introduced in Oracle 11g R2
Implement strong network communication security using different encryption solutions provided by Oracle Advanced Security

In Detail

For almost all organizations, data security is a matter of prestige and credibility. The Oracle Database is one of the most rich in features and probably the most used Database in a variety of industries where security is essential. To ensure security of data both in transit and on the disk, Oracle has implemented the security technologies to achieve a reliable and solid system. In Oracle 11g Anti-Hacker's Cookbook, you will learn about the most important solutions that can be used for better database security

"Oracle 11g Anti-hacker's Cookbook" covers all the important security measures and includes various tips and tricks to protect your Oracle Database.

"Oracle 11g Anti-hacker's Cookbook" uses real-world scenarios to show you how to secure the Oracle Database server from different perspectives and against different attack scenarios. Almost every chapter has a possible threads section, which describes the major dangers that can be confronted. The initial chapters cover how to defend the operating system, the network, the data and the users. The defense scenarios are linked and designed to prevent these attacks. The later chapters cover Oracle Vault, Oracle VPD, Oracle Labels, and Oracle Audit. Finally, in the Appendices, the book demonstrates how to perform a security assessment against the operating system and the database, and how to use a DAM tool for monitoring.

Network Forensics: Tracking Hackers through Cyberspace (e-book)




“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”

– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.



“It’s like a symphony meeting an encyclopedia meeting a spy novel.”

–Michael Ford, Corero Network Security

Maximum Security - A Hacker's Guide to Protecting Your Inter (e-book)

                                  


Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their network- and work toward a solution to those problems.

Friday, February 27, 2015

Debian 7.6.0 AMD64 Gnome Desktop



Debian remains one of the most important projects in Linux. Debian 7 offers some significant improvements, and it certainly warrants an upgrade if you are using an older version of Debian.

No doubt that some folks will be disappointed by the lack of support for Secure Boot, but I don’t think that that should be a deal breaker. The support for UEFI in 64-bit PCs is a step forward that will be built on later, so I try to take the long view on this issue.

Some will take issue with my comments about the forced inclusion of the ad blocker in Iceweasel, but I think it’s something worth talking about since Debian 7 is such an important Linux project. I fully understand that some folks hate ads and will block them, that is their right. However, advertising remains the basis for free content like this review, so it’s worth noting and thinking about the ramifications of browsers having ad blockers installed by default.

Debian 6.x.x






Debian 6.0 includes the KDE Plasma Desktop and Applications, the GNOME, Xfce, and LXDE desktop environments as well as all kinds of server applications. It also features compatibility with the FHS v2.3 and software developed for version 3.2 of the LSB.


Debian runs on computers ranging from palmtops and handheld systems to supercomputers, and on nearly everything in between. A total of nine architectures are supported by Debian GNU/Linux: 32-bit PC / Intel IA-32 (i386), 64-bit PC / Intel EM64T / x86-64 (amd64), Motorola/IBM PowerPC (powerpc), Sun/Oracle SPARC (sparc), MIPS (mips (big-endian) and mipsel (little-endian)), Intel Itanium (ia64), IBM S/390 (s390), and ARM EABI (armel).


Debian 6.0 Squeeze introduces technical previews of two new ports to the kernel of the FreeBSD project using the known Debian/GNU userland: Debian GNU/kFreeBSD for the 32-bit PC (kfreebsd-i386) and the 64-bit PC (kfreebsd-amd64). These ports are the first ones ever to be included in a Debian release which are not based on the Linux kernel. The support of common server software is strong and combines the existing features of Linux-based Debian versions with the unique features known from the BSD world. However, for this release these new ports are limited; for example, some advanced desktop features are not yet supported.


Sunday, February 22, 2015

Windows 7 Sp1 Ultimate en-US (x86)



If you want to run Windows 7 on your PC, here's what it takes:
  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver

Additional requirements to use certain features:
  • Internet access (fees may apply)
  • Depending on resolution, video playback may require additional memory and advanced graphics hardware
  • Some games and programs might require a graphics card compatible with DirectX 10 or higher for optimal performance
  • For some Windows Media Center functionality a TV tuner and additional hardware may be required
  • Windows Touch and Tablet PCs require specific hardware
  • HomeGroup requires a network and PCs running Windows 7
  • DVD/CD authoring requires a compatible optical drive
  • BitLocker requires Trusted Platform Module (TPM) 1.2
  • BitLocker To Go requires a USB flash drive
  • Windows XP Mode requires an additional 1 GB of RAM and an additional 15 GB of available hard disk space.
  • Music and sound require audio output

Windows 8.1 Preactived V2 Office 2013 Pro Plus



Windows  8.1 Preactived V2 Office 2013 Pro Plus

No Windows 8.1 Settings were harmed in the making of this ISO
No Programs are added to Windows
No Registry Settings were modified
No Unattended Settings were added to the ISO


Installation Indexes:
Windows 8.1 (Core) x64 / KMS-Activated
Windows 8.1 (Core) N x64 / KMS-Activated
Windows 8.1 (Core) Single Language x64 / KMS-Activated
Windows 8.1 Pro x64 / KMS-Activated



Tools used:
imagex for /flags "ProfessionalWMC" setting and index renames
dism for set-edition for ProWMC, KB integration, install.esd export
oscdimg for ISO mastering with MS's default -u1 option
Info folder added to Windows Setup folder to annoy credit theives


Features:
Non-Activated and Pre-Activated indexes. Take your pick.*
*Uses custom AutoKMS_VL_ALL folder in Windows directory. You can
uninstall the daily task there if you wish to use a different
activator later. I've included the uninstall script
Highly Compressed install.esd recovery compression format
UEFI boot information added to ISO boot data

Windows 7 Sp1 Ultimate en-US (x64)



If you want to run Windows 7 on your PC, here's what it takes:
  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver

Additional requirements to use certain features:
  • Internet access (fees may apply)
  • Depending on resolution, video playback may require additional memory and advanced graphics hardware
  • Some games and programs might require a graphics card compatible with DirectX 10 or higher for optimal performance
  • For some Windows Media Center functionality a TV tuner and additional hardware may be required
  • Windows Touch and Tablet PCs require specific hardware
  • HomeGroup requires a network and PCs running Windows 7
  • DVD/CD authoring requires a compatible optical drive
  • BitLocker requires Trusted Platform Module (TPM) 1.2
  • BitLocker To Go requires a USB flash drive
  • Windows XP Mode requires an additional 1 GB of RAM and an additional 15 GB of available hard disk space.
  • Music and sound require audio output

Friday, February 20, 2015

Maximum Security - A Hacker's Guide to Protecting Your Internet and Network (e-book)



Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their network- and work toward a solution to those problems.



Downlaod   Maximum Security - A Hacker's Guide to Protecting Your Internet and Network  (e-book) 


                 

Machine Learning For Hackers (e-book)



If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.

Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.

Thursday, February 19, 2015

Back | Track 5 R3




The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.

Building, testing and releasing a new BackTrack revision is never an easy task.Keeping up-to-date with all the latest tools, while balancing their requirements of dependencies, is akin to a magic show juggling act. Thankfully, active members of our redmine community such as backtracklover and JudasIscariot make our task that much easier by actively reporting bugs and suggesting new tools on a regular basis. Hats off to the both of you.

Back Track 4 R2



“BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.“



This is the official change log for the update:

-  Kernel 2.6.35.8 – *Much* improved mac80211 stack.
-  USB 3.0 support.
-  New wireless cards supported.
-  All wireless Injection patches applied, maximum support for wireless attacks.
-  Even *faster* desktop environment.
-  Revamped Fluxbox environment for the KDE challenged.
-  Metasploit rebuilt from scratch, MySQL db_drivers working out of the box.
-  Updated old packages, added new ones, and removed obsolete ones.
-  New BackTrack Wiki with better documentation and support.
-  Our most professional, tested and streamlined release ever.This release comes with faster Desktop       responsiveness, better hardware support, broader wireless cardsupport, streamlined work                  environment. It also has the new kernel.