In my last post, I discussed using sed, the stream editor to make configuration file changes via a bash script. There are two important factors to keep in mind: Many configuration file can only be modified as root, and The location of configuration files will vary depending on the Linux… Continue reading
Search this site
- Create an EC2 that runs Chrome for sandboxed websurfing
- Check Multiple AWS S3 Buckets for Missing Default Encryption
- The Equifax Data Breach and the Apache Struts Vulnerability
- Test Early, Test Often
- Linux Hardening
- Information Security at Startup Companies
- Timestamp bash_history with every command
- Has SHA-1 been hacked?
Forbes: Everything You Want To Know About Anthos - Google's Hybrid And Multi-Cloud Platform.
Flanked by communications workers, Pres Trump declares that "the race to 5G is a race American must win." "It's a race that we will win," he says of the nezxt generation wireless system. He says the private sector will lead the way, the Government doesn't have to spend a lot.
Walk-through techniques that can be used to perform forensics on AWS EC2 instances with @KennethGHartman at #SANSCloudSummit.
Summit Agenda: https://t.co/94wxI47ELm
Super exciting announcement! #MSFT released their very own Web App, Linux app and Windows Desktop App Security Scanner (fuzzer+) TODAY. It's the tool that all of Microsoft uses to secure the software that WE make.
Now with a working link!