💎 پورت های شبکه جهت برقراری ارتباط بین کامپوننت های مختلف Splunk
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
Iran Open Source (IOS)
🐧 لینک گروه جامعه متن باز ایران https://t.iss.one/joinchat/BDE3OUs-jzRKVI8btbY4kA @iranopensource🐧
Redis 4.x Cookbook by Pengcheng Huang #redis #programming
----------------------------
Redis is considered the world's most popular key-value store database. Its versatility and the wide variety of use cases it enables have made it a popular choice of database for many enterprises. Based on the latest version of Redis, this book provides both step-by-step recipes and relevant the background information required to utilize its features to the fullest. It covers everything from a basic understanding of Redis data types to advanced aspects of Redis high availability, clustering, administration, and troubleshooting. This book will be your great companion to master all aspects of Redis.
The book starts off by installing and configuring Redis for you to get started with ease. Moving on, all the data types and features of Redis are introduced in detail. Next, you will learn how to develop applications with Redis in Java, Python, and the Spring Boot web framework. You will also learn replication tasks, which will help you to troubleshoot replication issues. Furthermore, you will learn the steps that need to be undertaken to ensure high availability on your cluster and during production deployment. Toward the end of the book, you will learn the topmost tasks that will help you to troubleshoot your ecosystem efficiently, along with extending Redis by using different modules.
-----------------------------
2018 | PDF | 382 pages | 3,72 MB
-----------------------------
@iranopensource🐧
----------------------------
Redis is considered the world's most popular key-value store database. Its versatility and the wide variety of use cases it enables have made it a popular choice of database for many enterprises. Based on the latest version of Redis, this book provides both step-by-step recipes and relevant the background information required to utilize its features to the fullest. It covers everything from a basic understanding of Redis data types to advanced aspects of Redis high availability, clustering, administration, and troubleshooting. This book will be your great companion to master all aspects of Redis.
The book starts off by installing and configuring Redis for you to get started with ease. Moving on, all the data types and features of Redis are introduced in detail. Next, you will learn how to develop applications with Redis in Java, Python, and the Spring Boot web framework. You will also learn replication tasks, which will help you to troubleshoot replication issues. Furthermore, you will learn the steps that need to be undertaken to ensure high availability on your cluster and during production deployment. Toward the end of the book, you will learn the topmost tasks that will help you to troubleshoot your ecosystem efficiently, along with extending Redis by using different modules.
-----------------------------
2018 | PDF | 382 pages | 3,72 MB
-----------------------------
@iranopensource🐧
💎لیست کامپوننت های Splunk
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
Forwarded from Deleted Account
Preventing Ransomware Understand, prevent, and remediate ransomware attacks by Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan #Ransomware #malware
--------------------------------------
Ransomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a defensive mechanism in place for workstations and servers under one organization.
This book starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware analysis and how you can identify different kinds of malware. We will also take a look at different types of ransomware, and how it reaches your system, spreads in your organization, and hijacks your computer. We will then move on to how the ransom is paid and the negative effects of doing so. You will learn how to respond quickly to ransomware attacks and how to protect yourself. The book gives a brief overview of the internals of security software and Windows features that can be helpful in ransomware prevention for administrators. You will also look at practical use cases in each stage of the ransomware phenomenon. The book talks in detail about the latest ransomware attacks involving WannaCry, Petya, and BadRabbit.
By the end of this book, you will have end-to-end knowledge of the trending malware in the tech industry at present.
-----------------------------------------
2018 | EPUB | 266 pages | 11,7 MB
--------------------------------------
@iranopensource🐧
--------------------------------------
Ransomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a defensive mechanism in place for workstations and servers under one organization.
This book starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware analysis and how you can identify different kinds of malware. We will also take a look at different types of ransomware, and how it reaches your system, spreads in your organization, and hijacks your computer. We will then move on to how the ransom is paid and the negative effects of doing so. You will learn how to respond quickly to ransomware attacks and how to protect yourself. The book gives a brief overview of the internals of security software and Windows features that can be helpful in ransomware prevention for administrators. You will also look at practical use cases in each stage of the ransomware phenomenon. The book talks in detail about the latest ransomware attacks involving WannaCry, Petya, and BadRabbit.
By the end of this book, you will have end-to-end knowledge of the trending malware in the tech industry at present.
-----------------------------------------
2018 | EPUB | 266 pages | 11,7 MB
--------------------------------------
@iranopensource🐧
Forwarded from Deleted Account
Preventing_Ransomware_-_Abhijit_Mohanta.epub
11.7 MB
Iran Open Source (IOS)
💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
Think Like a Hacker: A Sysadmin's Guide to Cybersecurity by Michael Melone #hacker #Cybersecurity
—-------------------------
Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage.
Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and backdoors inside an enterprise. Be introduced to the concept of service-centric design - and how it can help improve both security and usability.
To defend against hackers you must first learn to think like a hacker.
—------------------—
2017 | EPUB | 99 pages | 294 KB
—----------------
@iranopensource🐧
—-------------------------
Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage.
Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and backdoors inside an enterprise. Be introduced to the concept of service-centric design - and how it can help improve both security and usability.
To defend against hackers you must first learn to think like a hacker.
—------------------—
2017 | EPUB | 99 pages | 294 KB
—----------------
@iranopensource🐧
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
@iranopensource🐧
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
@iranopensource🐧
Iran Open Source (IOS)
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA @iranopensource🐧
Containers in OpenStack by Pradeep Kumar Singh #Containers #OpenStack
------------------------------
Containers are one of the most talked about technologies of recent times. They have become increasingly popular as they are changing the way we develop, deploy, and run software applications. OpenStack gets tremendous traction as it is used by many organizations across the globe and as containers gain in popularity and become complex, it’s necessary for OpenStack to provide various infrastructure resources for containers, such as compute, network, and storage.
Containers in OpenStack answers the question, how can OpenStack keep ahead of the increasing challenges of container technology? You will start by getting familiar with container and OpenStack basics, so that you understand how the container ecosystem and OpenStack work together. To understand networking, managing application services and deployment tools, the book has dedicated chapters for different OpenStack projects: Magnum, Zun, Kuryr, Murano, and Kolla.
Towards the end, you will be introduced to some best practices to secure your containers and COE on OpenStack, with an overview of using each OpenStack projects for different use cases.
-----------------------------
2018 | EPUB | 176 pages | 1,18 MB
-------------------------
@iranopensource🐧
------------------------------
Containers are one of the most talked about technologies of recent times. They have become increasingly popular as they are changing the way we develop, deploy, and run software applications. OpenStack gets tremendous traction as it is used by many organizations across the globe and as containers gain in popularity and become complex, it’s necessary for OpenStack to provide various infrastructure resources for containers, such as compute, network, and storage.
Containers in OpenStack answers the question, how can OpenStack keep ahead of the increasing challenges of container technology? You will start by getting familiar with container and OpenStack basics, so that you understand how the container ecosystem and OpenStack work together. To understand networking, managing application services and deployment tools, the book has dedicated chapters for different OpenStack projects: Magnum, Zun, Kuryr, Murano, and Kolla.
Towards the end, you will be introduced to some best practices to secure your containers and COE on OpenStack, with an overview of using each OpenStack projects for different use cases.
-----------------------------
2018 | EPUB | 176 pages | 1,18 MB
-------------------------
@iranopensource🐧
💎 بررسی برخی قابلیت های جدید در Wireshark 3.0
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
Iran Open Source (IOS)
💎 بررسی برخی قابلیت های جدید در Wireshark 3.0 💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
💎 قابلیت Npcap Loopback Capture: ما در Wireshark 2 یکسری کتابخانه یا اصطلاحاً liberary داشتیم که به آنها WinPcap می گفتیم که در Wireshark 3 با Npcap جایگزین شده است. در واقع Npcap کتابخانه Nmap Project packet sniffing برای سیستم عامل های ویندوزیست که خودش هم می توان گفت forkی از WinPcap و Libpacp می باشد اما پیشرفت هایی در سرعت اجرا، امنیت و portability و... داشته است. Npcap کاربردهای مختلفی از جمله: قابلیت capture کردن ترافیک و پکت های اینترفیس های Loopback که اصطلاحاً به نام Loopback Packet Capture شناخته می شود، قابلیت Loopback Packet Injection (این قابلیت توسط تکنیکی به نام WinSock Kernel یا به اختصار WSK می تواند پکت های اینترفیس Loopback شما را ارسال کند) و... را دارا می باشد. بطور کلی می توانید توسط این feature پکت های اینترفیس (های) loopback تان را توسط مکانیزیمی به نام Windows Filtering Platform یا به اختصار WFP، شنود یا sniff نمایید. بعد از نصب Wireshark 3 کتابخانه Npcap یه اینترفیس به اسم Npcap Loopback Adapter برای شما ایجاد کرده و می توانید از آن استفاده کنید.
💎 قابلیت USBPacp: ابزار USBPacp هم یک ابزار Packet Capture از نوع Open Sourceی برای ویندوز می باشد که در Wireshark 3 آن را embed کرده اند (پیشتر این ابزار را می توانستیم بطور جداگونه دانلود و نصب نماییم و در Wireshark از آن استفاده کرد) و می توانید از آن برای capture و آنالیز کردن ترافیک پورت های USB تان استفاده نمایید.
💎 قابلیت Random Packet Generator هم یک utility کوچک است و یک اینترفیس ایجاد می کند که کارش ایجاد پکت های رندم با استفاده ابزار randpkt است. طوریکه می توانید خودتان تعداد پکت های تولید شده را کنترل کنید، یا maximum size پکت ها را مشخص نموده و حتی نوع پکت ها را تعیین نمایید. به این طریق می توانید با Wireshark به عنوان یک packet sniffer، پکت های malforme شده را از پکت های استاندارد تشخیص دهید.
💎 قابلیت SSH Remote Capture نیز یک utility دیگر است که در Wireshark 3 آن را embed کرده اند و در واقع همان ابزار sshdump است که اینترفیس هایی را برای Capture کردن ترافیک از طریق پروتکل SSH از روی یک remote host برایتان فراهم می کند. در واقع همان کار capture را انجام می دهد، منتها از طریق یک SSH Connection.
💎 قابلیت UDP Listener Capture نیز از در واقع حاصل insert کرد Utilityی به نام udpdump در Wireshark می باشد که یک UDP receiver جهت دریافت پکت ها از network deviceها و export کردن آنها به PCAP را برای شما فراهم می کند.
💎 قابلیت Cisco Remote Capture در Wireshark توسط ابزاری به نام ciscodump از قابلیتی به نام Remote Packet Capture استفاده می کند. قابلیت Remote Packet Capture شما را قادر می سازد تا یک remote port را به عنوان destination برای packet capturing مشخص نمایید. این قابلیت می تواند پکت های capture شده را از طریق یک TCP connection به Wireshark و البته از طریق پروتکل SSH ارسال کند.
📌 در صورت تمایل به اطلاع بیشتر از سایر قابلیت های جدید ارائه شده در Wireshark 3 می توانید release noteهای آن را در آدرس زیر مطالعه فرمایید:
https://www.wireshark.org/docs/relnotes/wireshark-3.0.0.html
میثم ناظمی
💎 قابلیت USBPacp: ابزار USBPacp هم یک ابزار Packet Capture از نوع Open Sourceی برای ویندوز می باشد که در Wireshark 3 آن را embed کرده اند (پیشتر این ابزار را می توانستیم بطور جداگونه دانلود و نصب نماییم و در Wireshark از آن استفاده کرد) و می توانید از آن برای capture و آنالیز کردن ترافیک پورت های USB تان استفاده نمایید.
💎 قابلیت Random Packet Generator هم یک utility کوچک است و یک اینترفیس ایجاد می کند که کارش ایجاد پکت های رندم با استفاده ابزار randpkt است. طوریکه می توانید خودتان تعداد پکت های تولید شده را کنترل کنید، یا maximum size پکت ها را مشخص نموده و حتی نوع پکت ها را تعیین نمایید. به این طریق می توانید با Wireshark به عنوان یک packet sniffer، پکت های malforme شده را از پکت های استاندارد تشخیص دهید.
💎 قابلیت SSH Remote Capture نیز یک utility دیگر است که در Wireshark 3 آن را embed کرده اند و در واقع همان ابزار sshdump است که اینترفیس هایی را برای Capture کردن ترافیک از طریق پروتکل SSH از روی یک remote host برایتان فراهم می کند. در واقع همان کار capture را انجام می دهد، منتها از طریق یک SSH Connection.
💎 قابلیت UDP Listener Capture نیز از در واقع حاصل insert کرد Utilityی به نام udpdump در Wireshark می باشد که یک UDP receiver جهت دریافت پکت ها از network deviceها و export کردن آنها به PCAP را برای شما فراهم می کند.
💎 قابلیت Cisco Remote Capture در Wireshark توسط ابزاری به نام ciscodump از قابلیتی به نام Remote Packet Capture استفاده می کند. قابلیت Remote Packet Capture شما را قادر می سازد تا یک remote port را به عنوان destination برای packet capturing مشخص نمایید. این قابلیت می تواند پکت های capture شده را از طریق یک TCP connection به Wireshark و البته از طریق پروتکل SSH ارسال کند.
📌 در صورت تمایل به اطلاع بیشتر از سایر قابلیت های جدید ارائه شده در Wireshark 3 می توانید release noteهای آن را در آدرس زیر مطالعه فرمایید:
https://www.wireshark.org/docs/relnotes/wireshark-3.0.0.html
میثم ناظمی