Thursday, February 2, 2012

BGPlay @ Route Views

This displays animated graphs of the routing activity of a certain prefix within a specified time interval. Its graphical nature makes it much easier to understand how BGP updates affect the routing of a specific prefix than by analyzing the updates themselves.

Tuesday, January 31, 2012

Open Source PKI Management Software

Click here to download Open CA

List of Trusted Root Certificate Authorities

In cryptography, a certificate authority, or certification authority, (CA) is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others (relying parties) to rely upon signatures or assertions made by the private key that corresponds to the public key that is certified. In this model of trust relationships, a CA is a trusted third party that is trusted by both the subject (owner) of the certificate and the party relying upon the certificate. CAs are characteristic of many public key infrastructure (PKI) schemes. (http://en.wikipedia.org/wiki/Certificate_authority)

To See List of Trusted Root Certificate Authorities click here (2/10/2010.)



Cisco Security and IPC Solutions (24 Season 4)


Monday, January 30, 2012

Man in the middle attacks on LAN

Ettercap is a suite for man in the middle attacks on LAN. It features sniffing
of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols (even ciphered ones) and includes
many feature for network and host analysis.

Sunday, January 29, 2012

Caps lock must die

Use this to remap the caps lock key to another key in Windows. Select the key to map to. Click dowload to download the .reg file. Double click it to apply to your system registry. You must reboot for the changes to take effect.