Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark – Network packet analyzer Snort – Open-source network intrusion detection system (NIDS) Suricata – High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) – Network security monitoring tool Tcpdump –…… Continue reading Cybersecurity and Cyber Forensics tools – Part 1 (Collated from internet & AI)
Tag: Cyber Security
List of hacking types you should be protecting your website / portal against – Part 1
Comprehensive List of Website Hacking Types (100+) sourced from ChatGPT SQL Injection Blind SQL Injection Boolean-Based SQL Injection Time-Based SQL Injection Error-Based SQL Injection Cross-Site Scripting (XSS) Reflected XSS Stored XSS DOM-Based XSS Cross-Site Request Forgery (CSRF) Clickjacking Remote File Inclusion (RFI) Local File Inclusion (LFI) Directory Traversal Session Hijacking DNS Spoofing Man-in-the-Middle (MITM) Attack…… Continue reading List of hacking types you should be protecting your website / portal against – Part 1
Security best practice, patterns & architecture links from AWS, GCP & Azure – Part 1
Herewith I am providing a curated list of links for security best practices, patterns & architecture for AWS, GCP & Azure – Part 1. AWS: Security – AWS Well-Architected Framework (amazon.com) AWS Security Reference Architecture (AWS SRA) – AWS Prescriptive Guidance (amazon.com) AWS Security Documentation (amazon.com) Security, identity, compliance – AWS Prescriptive Guidance (amazon.com) Cloud…… Continue reading Security best practice, patterns & architecture links from AWS, GCP & Azure – Part 1
Security tips for Google Drive & Android
Google Drive: Open Google Drive on web based browser like Chrome On each of the folders if you see a person symbol it’s shared, if you don’t see the symbol its not shared For each folder -> click SHARE -> Advanced -> Check which user has view rights and which user has edit rights ->…… Continue reading Security tips for Google Drive & Android