Demonstrate thought leadership to your professional networks.
Sign up with Facebook
Sign up with Twitter
Sign up with Linkedin
I don't have a Facebook, a Twitter or a LinkedIn account
Start a free trial of Scoop.it Business
Are you sure you want to delete this scoop?
If you are a merchant of any size accepting credit cards, you must be in compliance with PCI Security Council standards.
Find maintained forks of your favorite repos
Fluentd is an open-source tool to collect events and logs. 150+ plugins instantly enables you to store the massive data for Log Search, Big Data Analytics, and Archiving (MongoDB, S3, Hadoop).
IDS/IPS Linux distribution.
Many modern systems provide a way to watch a directory for events but sometimes brute force or trickery is still needed.
debian packages for moblock and peerguardian linux)
Fast downloads of the latest free software!
A website focused on using PowerShell in Infosec
This is the Glastopf Web Application Honeypot project page. Glastopf is a small Python webserver which emulates thousands of web application vulnerabilities.
The brainiacs at MIT created a cool visualization program to map how the National Security Agency can understand your relationships based on who you contact via email and how often.
LeoFS is a highly available, distributed, eventually consistent object/blob store. Organizations can use LeoFS to store lots of data efficiently, safely, and inexpensively.
Discover great UNIX and bash commands that contain 'curl'. Discuss these commands along with many more at commandlinefu.com
Updated 05/03/2012: Improved instructions based upon another guide. Dionaea is a great honeypot but I have found that getting it up and running is …
Updated on September 23, 2009: Please review the updated list of virtual appliances. You may also be interested in reviewing virtual appliances for Security. The original post has been retained as ...
About EasyIDS Detection Systems. Designed for the network security beginner with minimal Linux experience, EasyIDS can convert almost any industry standard x86 computer into a fully-functioning Intrusion Detection System in as little as 15 minutes.