Search

Search this site:

Gunnar Wolf - Nice grey life - page 151

Showing posts 1501 – 1510

Asegurando tu red con Linux
Short text going over several tools that can help a system administrator work on incident prevention, network monitoring and intrusion detection in Linux. I presented this talk in UNAM’s Departamento de Seguridad en Cómputo internal admin-unam seminar, in June 2005. It was also published in the August 2005 issue of PC Magazine en español. Full text (PDF) Comments Armando 2008-11-24 13:28:43 Que tal Que tal soy un Alumno Recien egresado de la carrera de Telemática (Telecomunicaciones e informática) y como trabajo de residencia debo realizar un proyecto de Esquemas de seguridad sobre Internet II, esto es en LINUX. Cuento con...

SOMBI - Still One More Backup Implementation
I presented this proposal about a backup system in the Computer Security 2001 Conference. Here I present a proposal for the implementation of a cyphered, automatic remote backup scheme. SOMBI client and server

Security in Perl scripts / Seguridad en scripts de Perl
I presented this tutorial at Congreso de Seguridad en Cómputo 2000, and later rewrote it (and moved it to a free, portable format) for Días de Software Libre at Guadalajara, May 2002. In this tutorial, I review some important key points not to fall in security errors while programming with Perl. I later adapted it together with a coworker, Alex Juárez, and we presented it in English at YAPC::Europe 2002. Here you will find this text both in Spanish and in English. Full paper in English (HTML; natively written in this format) Magicpoint slides in English (native Magicpoint format) Magicpoint...

Recomendaciones de seguridad en Linux
Once again, I was invited to the seminar, with Computer Security Department of UNAM, this time in April 2001. The topic this time: Security guidelines in a Linux installation. How you can make a newly made Linux installation a difficult target for an attacker. This same material, although updated and enhanced, was also presented as a tutorial at Congreso de Seguridad en Cómputo 2001, also organized (of course) by DSC, UNAM. PDF (fit for printing) HTML (for online viewing) LyX sources (if you want to edit or modify it)

Preguntas y respuestas relativas a la seguridad en redes inalámbricas
I was invited to give a talk on wireless networks to 27 Simposium Internacional de Sistemas Computacionales y Tecnologías de la Información, organized by Tecnológico de Monterrey. I did not prepare a presentation or slides, so instead of that, I promised I would answer to every question made by the audience. Here are the promised answers.

Portsentry
Talk I gave at the Admin-UNAM seminar, with Computer Security Department of UNAM, in September 2000. PortSentry is a tool that permits easy detection of port scanning, and has the ability to act immediately upon detection. HTML version

Logcheck
Talk I gave at the Admin-UNAM seminar, with Computer Security Department of UNAM, in September 2000. Logcheck is a tool that checks periodically the system’s log files, reporting to the administrator whatever is -according to operator-defined patterns- important. HTML version

Implementación de seguridad con sistemas operativos y herramientas libres
I gave this talk at the GNU/Linux 2001 conference in Jalapa, Veracruz, in September 2001. In this article I show different characteristics and security reccomendations using free operating systems and tools. PDF (fit for printing) HTML (fit for online viewing) LyX sources (for editing or modifying)

cat STDERR | rot13
Cannot help but laugh and share. I’ve been triaging and trying to reproduce some oldish bugs on pkg-perl’s packages. Some bugs are no longer there, some have to be forwarded upstream, and so on. Usual tasks, yes. Until I stumbled with #406227. I just have to laugh and share! Hope nobody feels ashamed - The bug is the result of different people coding maybe under pressure and with quite different mindsets :) For some reason I fail to understand, the submitter’s test case (rot13 implemented over a HTTP proxy) is invoked in the report as ./rot13 2>/dev/null. Of course, when...

5. Conclusión
Bibliografía Varios de los ejemplos aquí presentados fueron tomados del libro Perl for System Administration, de David N. Blank-Edelman, publicado por O’Reilly en junio del 2000 (ISBN 1-56592-609-9). Otras importantes fuentes de recursos para scripts aplicables a la seguridad son: The Perl Journal, revista cuatrimestral dedicada exclusivamente a Perl. SysAdmin, revista mensual dedicada a la administración de sistemas. Programming Perl 3rd edition, Larry Wall, Tom Christiansen y Jon Orwant (O’Reilly 2000) Perl Cookbook, Tom Christiansen y Nathan Torkington (O’Reilly 1998) Advanced Perl Programming, Sriram Srinivasan (O’Reilly 1997) http://www.ora.com/ - O’Reilly Associates, editores de una gran cantidad de libros de Perl...


subscribe via RSS