Skip to main content

security-articles

Security engineering articlesโ€‹

Books and Coursesโ€‹

  • 2022-01-19 ๐ŸŽฅ Security engineering course Light Blue Touchpaper

  • 2022-01-19 ๐Ÿ“• Security Engineering - A Guide to Building Dependable Distributed Systems

  • Lectures: ๐Ÿคฉ CS50 Cybersecurity

    This is CS50, Harvard University's introduction to the intellectual enterprises of computer science and the art of programming.

    • 2024-12-26 CS50 Cybersecurity - Lecture 1 - Securing Data - YouTube { www.youtube.com } { by David Malan}

      image-20241226155537857 TABLE OF CONTENTS

      00:00:00 - Introduction 00:00:17 - Securing Data 00:02:21 - Hashing 00:39:52 - Secret-Key Cryptography 01:03:21 - Public-Key Cryptography 01:16:14 - Digital Signatures 01:27:57 - Passkeys 01:34:47 - Encryption in Transit 01:40:10 - Deletion 01:46:28 - Encryption at Rest 01:50:59 - Ransomware 01:52:24 - Quantum Computing

    • 2024-12-26 CS50 Cybersecurity - Lecture 2 - Securing Systems - YouTube { www.youtube.com }

      TABLE OF CONTENTS

      00:00:00 - Introduction 00:00:17 - Wi-Fi 00:02:50 - HTTP 00:08:50 - Packet Sniffing 00:13:45 - Cookies 00:18:32 - HTTPS 00:37:56 - VPNs 00:41:11 - SSH 00:43:48 - Ports 00:51:33 - IP Addresses 00:53:33 - Deep Packet Inspection 00:54:50 - Proxy 01:03:49 - Malware 01:12:43 - Antivirus 01:15:19 - Zero-Day Attacks

    • 2024-12-26 CS50 Cybersecurity - Lecture 3 - Securing Software - YouTube { www.youtube.com }

      TABLE OF CONTENTS

      00:00:00 - Introduction 00:00:17 - Phishing 00:11:48 - Code Injection 00:26:54 - Stored Attacks 00:39:26 - SQL Injection 00:54:49 - Prepared Statements 00:59:57 - Command Injection 01:07:51 - Client-Side Validation 01:10:31 - Server-Side Validation 01:12:44 - Cross-Site Request Forgery 01:28:39 - Open Worldwide Application Security Project 01:29:11 - Arbitrary Code Execution 01:40:28 - Reverse Engineering 01:42:03 - Open-Source and Closed-Source Software 01:45:15 - App Stores 01:50:40 - Package Managers 01:51:25 - Operating Systems 01:53:03 - Vulnerability Catalogs

Articlesโ€‹

image-20240208170915828

2023-06-12 Desktop Linux Hardening | PrivSec - A practical approach to Privacy and Security

image-20230702153430958

ToC

NGINXโ€‹

TLSโ€‹

  • 2022-08-03 The Illustrated TLS 1.3 Connection: Every Byte Explained

    Every byte explained and reproduced In this demonstration a client connects to a server, negotiates a TLS 1.3 session, sends "ping", receives "pong", and then terminates the session. Click below to begin exploring.

Notesโ€‹

# Windows
certutil -hashfile TabletopClub_vX.X.X_Windows_64.zip SHA512

# macOS
shasum -a 512 TabletopClub_vX.X.X_OSX_Universal.zip

# Linux / *BSD
sha512sum TabletopClub_vX.X.X_Linux_64.zip

Toolsโ€‹

OpenSSLโ€‹

Messengersโ€‹