security-articles
Security engineering articlesโ
- 2022-04-23 How SHA-256 Works Step-By-Step Boot.dev
- 2022-04-23 Very Basic Intro to Hash Functions SHA-256, MD5, etc Boot.dev
- 2022-04-23 Basic Intro to Key Derivation Functions Boot.dev
By Lane Wagner on Dec 30, 2019
- 2022-04-20 What an X.509 Certificate Is & How It Works Sectigoยฎ Official
- 2022-04-20 What is an X.509 certificate?
- 2022-06-01 ๐บ 7 Cryptography Concepts EVERY Developer Should Know - YouTube
Books and Coursesโ
2022-01-19 ๐ฅ Security engineering course Light Blue Touchpaper
2022-01-19 ๐ Security Engineering - A Guide to Building Dependable Distributed Systems
Lectures: ๐คฉ CS50 Cybersecurity
This is CS50, Harvard University's introduction to the intellectual enterprises of computer science and the art of programming.
2024-12-26 CS50 Cybersecurity - Lecture 1 - Securing Data - YouTube { www.youtube.com } { by David Malan}
TABLE OF CONTENTS
00:00:00 - Introduction 00:00:17 - Securing Data 00:02:21 - Hashing 00:39:52 - Secret-Key Cryptography 01:03:21 - Public-Key Cryptography 01:16:14 - Digital Signatures 01:27:57 - Passkeys 01:34:47 - Encryption in Transit 01:40:10 - Deletion 01:46:28 - Encryption at Rest 01:50:59 - Ransomware 01:52:24 - Quantum Computing
2024-12-26 CS50 Cybersecurity - Lecture 2 - Securing Systems - YouTube { www.youtube.com }
TABLE OF CONTENTS
00:00:00 - Introduction 00:00:17 - Wi-Fi 00:02:50 - HTTP 00:08:50 - Packet Sniffing 00:13:45 - Cookies 00:18:32 - HTTPS 00:37:56 - VPNs 00:41:11 - SSH 00:43:48 - Ports 00:51:33 - IP Addresses 00:53:33 - Deep Packet Inspection 00:54:50 - Proxy 01:03:49 - Malware 01:12:43 - Antivirus 01:15:19 - Zero-Day Attacks
2024-12-26 CS50 Cybersecurity - Lecture 3 - Securing Software - YouTube { www.youtube.com }
TABLE OF CONTENTS
00:00:00 - Introduction 00:00:17 - Phishing 00:11:48 - Code Injection 00:26:54 - Stored Attacks 00:39:26 - SQL Injection 00:54:49 - Prepared Statements 00:59:57 - Command Injection 01:07:51 - Client-Side Validation 01:10:31 - Server-Side Validation 01:12:44 - Cross-Site Request Forgery 01:28:39 - Open Worldwide Application Security Project 01:29:11 - Arbitrary Code Execution 01:40:28 - Reverse Engineering 01:42:03 - Open-Source and Closed-Source Software 01:45:15 - App Stores 01:50:40 - Package Managers 01:51:25 - Operating Systems 01:53:03 - Vulnerability Catalogs
Articlesโ
- 2022-03-05 Badly implementing encryption
Low-level security in Rust
- 2022-02-22 โญโญโญ veeral-patel/how-to-secure-anything: How to systematically secure anything: a repository about security engineering
Security engineering is the discipline of building secure systems. Its lessons are not just applicable to computer security. In fact, in this repo, I aim to document a process for securing anything, whether it's a medieval castle, an art museum, or a computer network.
2023-06-12 Desktop Linux Hardening | PrivSec - A practical approach to Privacy and Security
ToC
- During Installation
- Privacy Tweaks
- Application Confinement
- Security Hardening
- Secure Boot
NGINXโ
TLSโ
- 2022-08-03 The Illustrated TLS 1.3 Connection: Every Byte Explained
Every byte explained and reproduced In this demonstration a client connects to a server, negotiates a TLS 1.3 session, sends "ping", receives "pong", and then terminates the session. Click below to begin exploring.
Notesโ
# Windows
certutil -hashfile TabletopClub_vX.X.X_Windows_64.zip SHA512
# macOS
shasum -a 512 TabletopClub_vX.X.X_OSX_Universal.zip
# Linux / *BSD
sha512sum TabletopClub_vX.X.X_Linux_64.zip
Toolsโ
OpenSSLโ
- 2022-06-14 How to encrypt a big file using OpenSSL and someone's public key
- 2022-06-14 Encrypting and decrypting files with OpenSSL Opensource.com
Stay on top of the latest thoughts, strategies and insights from enterprising peers.
Messengersโ
- 2022-06-14 Off-the-Record Messaging