Articles

Mapped  

The IVRE tool integrates into existing IT infrastructures for reconnaissance on private networks to help analyze endpoints accessible over the Internet.

Small Print  

Software licenses tell you how you can use software packages and legally deploy the software in your projects. Fortunately, tools help you automate the process of verifying licenses.

Game Plan  

Ansible has earned an excellent reputation as a tool for configuration management. Thanks to playbooks, updates are more or less child's play.

Hall Monitor  

Get-NetTCPConnection and ss are efficient and powerful tools for monitoring network connections and identifying potential security threats on Windows and Linux.

Tools at the Ready!  

Starting your journey with open source software on AIX has never been easier with the IBM AIX Toolbox.

Deviations  

Active Directory default settings could expose your AD environment to security vulnerabilities. We look at account hygiene and risk mitigation in authentication, login data, PKI, domain join, and more.

Small but Deadly  

The Flipper Zero mobile hacking tool, a highly portable device that looks like a kiddy toy at first glance, can check a wide range of wireless connections for vulnerabilities. We take a look at potential applications in pentesting scenarios.

Behind the Mask  

Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.
Powered by eZ Publish™ CMS Open Source Web Content Management. Copyright © 1999-2014 eZ Systems AS (except where otherwise noted). All rights reserved.