Submitted by admin on Tue, 09/20/2011 - 21:39
Global Cyberlympics is a CTF (capture the flag) game organized by EC-Council. This is the first time it was organized, first time in Hungary and first time I've participated. I was part of it...the beginning.
Submitted by admin on Sat, 08/06/2011 - 10:37
What do I want to be able to do in an ideal world?
Submitted by admin on Mon, 07/11/2011 - 23:07
Privileged Identity Management is a really interesting area nowadays. It just started to evolve and spread in the market.
Usually the IT leaders do not know how important this could be for the prevention, detection of an incident or as evidence in a crime case. These tools intended to deter the administrators of doing things they shouldn't do and makes it possible to record (almost) everything! HOW?
Submitted by admin on Tue, 05/31/2011 - 22:03
Well, I have been away for a while because I decided to do the OSCP exam. It is more practical exam than the CEH because it consists of a one month long access to the lab and a 24 hour practical exam.
Submitted by admin on Sat, 03/12/2011 - 09:32
This tutorial helps you to create a jail for your protection. It can happen that you download a script or code from the internet which is not a safe thing. It could contain malicious code or even an "rm -rf *". It is difficult to recover after deleting all files from your hard drive. It is even annoying if you run it as a general user. All your user level files will be lost (ok I know you can recover most of the files but I do not like to do this too often).
I found two solutions for this problem. These two were selected by me because I use Backtrack4 and Ubuntu 10.04.
Submitted by admin on Thu, 02/03/2011 - 08:28
Finally I've received the official letter confirming that I am a certified CISSP.
What next? Probably I'll try some more technical certifications. I haven't decided yet there are several opportunities in this field. I'll choose OSCP, CEH or CHFI.
Submitted by admin on Mon, 01/31/2011 - 21:34
This is a Debian Lenny based "secure" webserver install tutorial.
The server is configured like a hosted webserver. Hardened, secured.
Submitted by admin on Sun, 01/23/2011 - 09:39
This section contains the firewall stuff.
Submitted by admin on Sun, 01/23/2011 - 09:11
I am really interested in the different password cracking methods. Sometimes I cannot decide which one is the fastes and more effective. You can choose between single CPU, multiple CPU (cluster), GPU, Rainbow tables, Distributed Rainbowtables and Online crackers.
Submitted by admin on Sun, 01/23/2011 - 08:52
This is an interesting page for me, because I decided to create a lab for testing different security settings,
issues and other stuff that comes into my mind.
I plan to continuosly modify this page as the concept changes. I will draw some network diagrams eighter.
This page will be the summary of all these. You can find the links below in the correct order:
Create the basic network separated with pfSense:
- pfSense Basic
Create LAN members:
Pages