"Knowledge is Power. Guard it well."

If you would like to have your paper hosted here, please let me know. It will at the the very least need to be IT related and I will format it (font, etc) to fit in - although I promise not to change anything. Thats all there is to it actually...

--INDEX: > Erich Samuel  > Linux: Security

--- 2013
> Hash Monitoring Setup
> John the Ripper and Hashcat - Markov Comparison - Take 2
> Cracking Passwords 101
>
Metaplsoitable using Virtualbox and CLI
> Metasploitable model answer

--- 2012
> Hashdumps and Passwords
>
John the Ripper and Hashcat - Markov Comparison
> EHarmony - Plaintext and Hashdump
> Hashcat - Cracking EHarmony hashes easily
> LinkedIn Hashdump and Passwords

--- 2011
> John the Ripper - Making it better

--- 2010
> Root Level Activity Logging - Take 2
> Starting Nikto
> Using TOR for more then Web
> SSH Bruteforce Passwords

--- 2009
> More SSH Passwords
> Logging SSH Passwords
> Your data from the outside - A quick look
> Making History a Record
> Logging History to Syslog
> Nmap 5
> Nmap5 - Network Check

--- Pre 2009;
> Iptables: Basic Security
> Checksum: Watching your Files
> Securing your new Linux box
> Stop Scans: Fog-of-War
> Honeypots: The Easy Way
> Forgotten Threat: Fork Bomb
> IPTables: Non-Basic Security
> IPTables and Kernels: The Good Stuff
> Snort: A Basic Setup
> Port Knocking: Statically
> Remote Check: Better Checksums
> Host Firewalls: Linux Machines
> SSH Tricks: Forwarding
> Hardening SSH: Good to Better
> SSH for the Paranoid
> Postfix: Greylisting
> Postfix: Anti-Spam and Anti-Virus
> Fun with DHCP
> Openvpn: Multi-Client Setup
> Postfix: More Antispam
> Chrooted SFTP: Locking Down
> Archiving Emails: Postfix
> BIND DNS: Null Routing Baddies
> Fun with Network Pipes
> Transparent Proxy and Proxy Usernames
> Policy Routing: Iptables
> Checking Passwords with John
> Brute Forcing Logons
> Cryptcat and Netcat Scanning
> Paratrace: Sneaky Tracerouting
> Iptables: Interesting Modules
> CLI Line Monitoring
> Hide Stuff: Encrypted Devices
> Antispam: Tarpits
> Squid Delay Pools
> Obfuscating Cleartext
> Postfix: Dealing with large mails
> Postfix: Image spam problems
> IPTables: Block Bruteforce
> SSH: Dynamic Forwarding
> Quick Security Tips
> Making Dictionaries