Bookmarks for 16 Mar 2016 through 24 Mar 2016

These are my links for 16 Mar 2016 through 24 Mar 2016:

  • “Reverse Engineering for Beginners” free book
  • Resolve Hardware Status Alert SEL_FULLNESS | Brian Ragazzi – […] I noticed an alert on two UCS B250M2 hosts in the vSphere Client. The alert Name was “Status of other host hardware objects”. This isn’t helpful. To get more information, you have to navigate to the Hardware Status tab of the host properties. Here I saw more information about the alert. It’s cryptically named “System Board 0 SEL_FULLNESS”. […]
  • Network Stack: Cisco ASA Packet Capture – […] The ASA platform has fantastic built-in packet capture capabilities which can come in very handy for troubleshooting issues. I will be demonstrating some of the capabilities using an ASA 5505 running version 9.0(1).Performing a packet capture is done using the capture command from privileged exec mode. […][ Fantastic… I won’t say that ]
  • Sanesecurity ClamAV Malware, Phishing, and Spam Signatures – Sanesecurity produces add-ons signatures to help improve the ClamAV detection rate on Zero-Day malware and even on Zero-Hour malware. Since 2006 we have provided professional quality ClamAV signatures to protect against the following email types: Macro malware, Zip malware, Rar malware, Javascript malware, 7z malware, Phishing, Spear phishing and other types of common emailed malware and spam. Sanesecurity 3rd Party ClamAV signatures can also help prevent TeslaCrypt, Cryptowall, Cryptolocker and other ransomware, who’s source usually starts as a malicious email.
  • Multistage environments with Ansible – Ross Tuck – Ansible has excellent documentation but one thing I was confused about was the best way to store the configuration for multistage projects: say, different passwords for dev, staging, production. This isn’t really covered in the ansible-examples repo because it’s specific to your project and while the documentation has recommendations, it doesn’t spell it out completely (which I need since I’m an idiot).

Bookmarks for 19 set 2013 through 25 set 2013

These are my links for 19 set 2013 through 25 set 2013:

  • AIXchange: Restricting FTP Access (AIX) – A customer was trying to restrict user access to a particular directory on an AIX system when FTP was used. We came across two good options.
  • FBI Tor Malware Analysis – […] In April 2013, a piece of malware was found embedded in Freedom Hosting's darknet server that would exploit a security hole in a particular web browser and execute code on the user's computer. This code gathered some information about the user and sent it to a server in Virginia and then crashed – it had no obvious malicious intent that is so characteristic of malware. It was therefore theorised that the FBI, who have offices in Virginia, and who have 'form' for writing malware, may have authored it – this now appears to be true. […]
  • Samba4 and OpenChange on a Debian or Ubuntu server – Samba4/Openchange suite promises to provide a complete Active Directory© domain controller with an alternative to a Microsoft Exchange server. Gracefully to the rewrite of MAPI protocol, Outlook can now seamlessly connect to a Linux server for synchronizing and sharing calendars, contacts, tasks and mails.

Bookmarks for 28 mag 2012 through 2 giu 2012

These are my links for 28 mag 2012 through 2 giu 2012:

Bookmarks for 10 mag 2012 through 11 mag 2012

These are my links for 10 mag 2012 through 11 mag 2012:

  • Linux Malware Detect | R-fx Networks – Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection. In addition, threat data is also derived from user submissions with the LMD checkout feature and from malware community resources. The signatures that LMD uses are MD5 file hashes and HEX pattern matches, they are also easily exported to any number of detection tools such as ClamAV.
  • Shinken | The next Industry Standard in IT Monitoring – Shinken is an open source Nagios® like tool, redesigned and rewritten from scratch. Its main goal is to meet today’s system monitoring requirements while still allowing compatibility to Nagios®
  • Index of /downloads/binaries/latest – These binaries are statically linked using