opexxx
Follow
50.0K views | +30 today
Scooped by alexander knorr
onto opexxx
Scoop.it!

Journey of a C Program to Linux Executable in 4 Stages

Journey of a C Program to Linux Executable in 4 Stages | opexxx | Scoop.it
You write a C program, use gcc to compile it, and you get an executable. It is pretty simple. Right? Have you ever wondered what happens during the
more...
No comment yet.
opexxx
Your new post is loading...
Scooped by alexander knorr
Scoop.it!

Top 15 IT Certifications For 2014

Top 15 IT Certifications For 2014 | opexxx | Scoop.it
IT industry is quite competitive today. As a result, an IT professional has to be on his toes and should be on the lookout to acquire as many relevant IT certifications as possible.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Internauten

Internauten | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

UnRarIt.Net - Batch archive extraction

UnRarIt.Net - Batch archive extraction | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Uptime Institute - Tier Certification

Uptime Institute - Tier Certification | opexxx | Scoop.it
more...
No comment yet.
Rescooped by alexander knorr from Your Privacy & Security Online
Scoop.it!

How Heartbleed Bleeds Your Privacy

How Heartbleed Bleeds Your Privacy | opexxx | Scoop.it

This bug matters for everyone

Just because 1Password’s technology isn’t affected by this doesn’t mean that you aren’t. Pretty much everyone is affected by this. Many of the secure connections that you use with various services, including HTTPS connections to secure sites for shopping and many other activities, may be fully readable to attackers. Of course, this includes the usernames and passwords that you use to log in to various services. It’s not just HTTPS connections, but IMAPS—how your email program, such as Mail.app or Outlook, talks to a mail server—may be vulnerable.


The heartbleed bug pretty much allows an attacker to probe a server that will end up revealing the private key. Once an attacker knows the private key, they can decrypt session keys that have been sent to the server, and thus decrypt all of the encrypted traffic that goes back and forth between the browser and the server.

Another bit of magic with public key encryption is the notion of “digital signature.” Your browser can create a mathematical challenge using the public key that only someone with knowledge of the private key can solve. This is part of how a website proves to a browser that it is what it says it is. If an attacker learns the private key of some website, then it can masquerade as that site.

 

All in all, the capture of a server’s private key is a bad thing, and that is what this bug enables.


Via Kathy Szczesny
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Top 30 Linux System Admin Interview Questions & Answers

Top 30 linux system admin interview questions & answers for experience professionals,which helps to clear linux interview.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Test Double | Our Thinking | Crafting a conference talk.

Test Double | Our Thinking | Crafting a conference talk. | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

YourOnlineChoices.eu - Your ad choices

more...
No comment yet.
Rescooped by alexander knorr from privacy
Scoop.it!

Microsoft changes its policy on email privacy: “we’re listening”

Microsoft changes its policy on email privacy: “we’re listening” | opexxx | Scoop.it
A little more than a week after a court document proved that Microsoft invoked its Terms of Use policy to sift through a French blogger’s Hotmail account in search of leaked company secrets, the company announced Friday that it will amend its...

Via TechinBiz, The Cloud Is Huge
more...
The Cloud Is Huge's curator insight, March 29, 8:05 AM

Shifting sands.  Same beach. Same weather patterns.

Scooped by alexander knorr
Scoop.it!

Galileo Computing - - Bücher online lesen und herunterladen

Galileo Computing -  - Bücher online lesen und herunterladen | opexxx | Scoop.it
Bücher und Video-Trainings von Galileo Computing zur Programmierung, Administration, Virtualisierung und Softwareentwicklung versandkostenfrei bestellen
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

FireEye Report Analyzes Zero-day Attacks of 2013 | SecurityWeek.Com

FireEye Report Analyzes Zero-day Attacks of 2013 | SecurityWeek.Com | opexxx | Scoop.it
FireEye has released a new report that analyzes 11 zero-day vulnerabilities discovered in 2013 by the security firm and provides context around the threats these vulnerabilities create for enterprises, along with mitigation guidance.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

The Dubious World of Website Certificate Authorities

The Dubious World of Website Certificate Authorities | opexxx | Scoop.it
HTTPs is secured with SSL encryption, but even sites using this technology are only safe to use if you are sure that the website is real. Did you know it’s possible for hackers to create fake websites that look very much like the real thing? Join us as we dive into the world of website certificate authorities and explain how a fake website poses as the real thing. Read More
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Data Sets for Data Science

Data Sets for Data Science | opexxx | Scoop.it
by Joseph Rickert Recently, I had the opportunity to be a member of a job panel for Mathematics, Economics and Statistics students at my alma mater, CSUEB (California State University East Bay). In the context of preparing for a career in data science a student at the event asked: “Where can I find good data sets?”. This triggered a number of thoughts: the first being that it was time to update the list of data sets that I maintain and blog about from time to time. So, thanks to that reminder I have added a few new links to the...
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

it-sicherheit.de - Der Marktplatz IT-Sicherheit

it-sicherheit.de - Der Marktplatz IT-Sicherheit | opexxx | Scoop.it
Bundesweit größter Marktplatz rund um IT-Sicherheit: Anbieter, IT-Sicherheitslösungen, Jobangebote, Veranstaltungen, Tipps und weitere hilfreiche Informationen zum Thema IT-Sicherheit.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Deutschland sicher im Netz e.V.

Deutschland sicher im Netz e.V. | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Data Center Map - Colocation, Cloud, Managed Hosting etc.

Data Center Map - Colocation, Cloud, Managed Hosting etc. | opexxx | Scoop.it
Data center, colocation rack, cloud servers, managed hosting or dedicated servers? Data Center Map is your guide to the right data center provider.
more...
No comment yet.
Rescooped by alexander knorr from Linux FAQ
Scoop.it!

How to set up a transparent HTTPS filtering proxy on CentOS - Linux FAQ

How to set up a transparent HTTPS filtering proxy on CentOS - Linux FAQ | opexxx | Scoop.it
HTTPS protocol is used more and more in today’s web. While this may be good for privacy, it leaves modern network administrator without any means to prevent questionable or adult contents from entering his/her network. Previously it was assumed that this problem does not have a decent solution. Our how-to guide will try to prove …Continue reading...

Via xmodulo
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

[papers] - Whatsapp Forensic/Stealer (Android) POC Paper

Whatsapp Forensic/Stealer (Android) POC Paper
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Best NLP books

Best NLP books | opexxx | Scoop.it
Do you know any Natural Language Processing best-sellers?
Natural Language Processing (NLP) is a vast field and what is more important - today it’s a fast-moving area of research. In this post we...
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

GitBook

Build beautiful programming books and exercises using GitHub/Git and Markdown.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Opt Out From Online Behavioral Advertising By Participating Companies (BETA)

more...
No comment yet.
Rescooped by alexander knorr from Big Data Security Analytics
Scoop.it!

21CT Episode 1: Security Analytics - YouTube

A weekly look at how data analytics and visualization can help you take a look at problems in a new way, and get to solutions faster. Our team will demonstra...

Via cysap
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

How To Setup DNSSEC on an Authoritative BIND DNS Server

How To Setup DNSSEC on an Authoritative BIND DNS Server | opexxx | Scoop.it
We all know that DNS is a protocol which resolves domain names to IP addresses, but how do we know the authenticity of the returned IP address? It is possible for an attacker to tamper a DNS response or poison the DNS cache and take users to a malicious site with the legitimate domain name in the address bar. DNS Security Extensions (DNSSEC) is a specification which aims at maintaining the data integrity of DNS responses. DNSSEC signs all the DNS resource records (A, MX, CNAME etc.) of a zone using PKI (Public Key Infrastructure). Now DNSSEC enabled DNS resolvers (like Google Public DNS) can verify the authenticity of a DNS reply (containing an IP address) using the public DNSKEY record. Here's how to setup DNSSEC on an authoritative BIND DNS server.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

NSA Has Been Hijacking the Botnets of Other Hackers | Threat Level | WIRED

NSA Has Been Hijacking the Botnets of Other Hackers | Threat Level | WIRED | opexxx | Scoop.it
The NSA doesn’t just hack foreign computers. It also piggybacks on the work of professional for-profit hackers, taking over entire networks of already-hacked machines and using them for their own purposes.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Black Hat USA 2014

Black Hat USA 2014 | opexxx | Scoop.it
Black Hat USA 2014
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

nload: Monitor Network Traffic and Bandwidth Usage In Real Time On a Linux/Unix Based System

nload: Monitor Network Traffic and Bandwidth Usage In Real Time On a Linux/Unix Based System | opexxx | Scoop.it
Explains how to install and use nload console application which monitors network traffic in real time on a Linux, FreeBSD, HP-UX, Solaris and Unix-like systems.
more...
No comment yet.