opexxx
Follow
77.3K views | +18 today
 
Scooped by alexander knorr
onto opexxx
Scoop.it!

How To Setup DNSSEC on an Authoritative BIND DNS Server

How To Setup DNSSEC on an Authoritative BIND DNS Server | opexxx | Scoop.it
We all know that DNS is a protocol which resolves domain names to IP addresses, but how do we know the authenticity of the returned IP address? It is possible for an attacker to tamper a DNS response or poison the DNS cache and take users to a malicious site with the legitimate domain name in the address bar. DNS Security Extensions (DNSSEC) is a specification which aims at maintaining the data integrity of DNS responses. DNSSEC signs all the DNS resource records (A, MX, CNAME etc.) of a zone using PKI (Public Key Infrastructure). Now DNSSEC enabled DNS resolvers (like Google Public DNS) can verify the authenticity of a DNS reply (containing an IP address) using the public DNSKEY record. Here's how to setup DNSSEC on an authoritative BIND DNS server.
more...
No comment yet.
opexxx
Your new post is loading...
Your new post is loading...
Scooped by alexander knorr
Scoop.it!

CS6520, Cryptography and data security, Security, Network Security, Information Security, Cryptology, Levent Ertaul

more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Security Wizardry Computer Network Defence Situational Awareness - The Radar Page

Security Wizardry Computer Network Defence Situational Awareness - The Radar Page | opexxx | Scoop.it
Security Wizardry Information Security Products Directory provides salient details on available network security products, either commercial or freeware.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

How to install Windows 7 or 8 from USB using UEFI - Home is where I lay my head - Site Home - TechNet Blogs

How to install Windows 7 or 8 from USB using UEFI - Home is where I lay my head - Site Home - TechNet Blogs | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Security & Privacy Best Practices | Online Trust Alliance

Security & Privacy Best Practices | Online Trust Alliance | opexxx | Scoop.it
Released January 21, 2015 Download as a PDF  See 2015 Data Breach Readiness GuideOTA recommends that all organizations implement the following best practices:
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Malware Prevention through DNS Redirection (DNS Sinkhole)

Malware Prevention through Black-Hole DNS
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

SOA Manifesto

Service orientation is a paradigm that frames what you do. Service-oriented architecture (SOA) is a type of architecture that results from applying service orientation.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Don't Hash Secrets

Don't Hash Secrets | opexxx | Scoop.it
Building secure systems is difficult. It would be nice if we had a bunch of well-designed crypto building blocks that we could assemble in all sorts of ways and be certain that they would, no matte...
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

What is the real maximum length of a DNS name? - The Old New Thing - Site Home - MSDN Blogs

What is the real maximum length of a DNS name? - The Old New Thing - Site Home - MSDN Blogs | opexxx | Scoop.it
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Malware analysis with ... Gephi?

Malware analysis with ... Gephi? | opexxx | Scoop.it
One of the more difficult questions that cyber security and cyber risk
teams need to convey to their leadership is to answer the question of
whether their organization is being targeted specifically by cyber
attackers or just mass malware.

One obvious way to look at this question is to provide a break down of
malware infections observed by the organization's security infrastructure
(let's say FireEye, Sourcefire, Symantec EP) by the level of sophistication
of malware. But, this doesn't wo
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Bayesian Methods for Hackers

Bayesian Methods for Hackers | opexxx | Scoop.it
Bayesian Methods for Hackers : An intro to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Using the Official Dropbox Command Line Interface (CLI) - The Unofficial Dropbox Wiki

This article assumes you have already installed Dropbox as per the instructions here. Contents 1 Installation2 Getting Started3 Commands3.1 STATUS3.1.1 Description3.1.2 Usage3.1.3 Sample output3.2 HELP3.2.1 Description3.2.2 Usage3.2.3 Sample output3.3 PUBURL3.3.1...
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Sphinx | Open Source Search Engine

Sphinx is an open source full text search server, designed with performance, relevance (search quality),
and integration simplicity in mind. Sphinx lets you either batch index and search data stored in files, an SQL database, NoSQL storage --
or index and search data on the fly, working with Sphinx pretty much as with a database server.
more...
No comment yet.