Top

Category: Library

2020
9 May

FireEye released the Mandiant® Security Effectiveness Report 2020 which reveals data about how well organizations are protecting themselves against cyber threats and the overall effectiveness of their security infrastructure. The report summarizes the results of thousands of tests performed by experts from the Mandiant Security[…]

2018
12 Mar

Basic rate-limiting middleware for Express. Use to limit repeated requests to public APIs and/or endpoints such as password reset. A brute-force protection middleware for express routes that rate-limits incoming requests, increasing the delay with each request in a fibonacci-like sequence[…]

2017
24 Aug

[pdfviewer width=”600px” height=”849px” beta=”true/false”]https://www.naushad.co.uk/pdf/library/EUR_0616_ezine_19pp.pdf[/pdfviewer]

21 Aug

[pdfviewer width=”600px” height=”849px” beta=”true/false”]https://www.naushad.co.uk/pdf/library/CCISO-Table-of-Contents.pdf[/pdfviewer]

2016
27 Oct

DDoS attacks are making the headlines but if you architect your infrastructure right at the DNS layer, you can significantly reduce or mitigate their impact altogether. Read this whitepaper on building redundancy with a multi DNS strategy. Whether you run[…]

15 Oct

Hackers are hijacking internet routers used in small to large businesses and homes to become a huge Botnet that they can use to launch Distributed Denial of Service (DDoS) attacks against targets from. The attacks were all coming from compromised routers[…]

9 Oct

Features grab banner, detect ssh1 protocol and zlib compression; gather key-exchange, host-key, encryption and message authentication code algorithms; output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc); analyze SSH version compatibility based on algorithm information; historical information from OpenSSH and Dropbear[…]

9 Oct

A Penetration Testing Framework ______ ______ (_____ \ (____ \ _____) ) ____ ____ ____) ) ___ _ _ | ____/ / _ )| _ \ | __ ( / _ \ ( \ / ) | | ( (/[…]

9 Oct

FastNetMon – A high performance DoS/DDoS load analyser built on top of multiple packet capture engines (NetFlow, IPFIX, sFLOW, SnabbSwitch, netmap, PF_RING, PCAP).  What can we do? We can detect hosts in our networks sending or receiving large volumes of[…]

End
Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

What are cookies?

Cookies are small pieces of text stored on your computer when you visit almost any website. Companies use them to:

  • Verify your identity, to ensure your security and privacy
  • Determine the browser and settings you are using to provide optimised content
  • Understand the way you navigate through websites, so firms can make improvements
  • Help site owners and third-party advertisers tailor content to your preferences

We also use social media buttons and/or plugins on this site that allow you to connect with your social network in various ways. For these to work the following social media sites including;

    • Linked In
    • Twitter
    • YouTube

will set cookies through our site, which may be used to enhance your profile on their site or contribute to the data they hold for various purposes outlined in their respective privacy policies.

GOOGLE CHROME
There are multiple levels of cookie enablement in Chrome. For more information, click here.

INTERNETEXPLORE
There are multiple levels of cookie enablement in Internet Explorer. For more information, click here.

MICROSOFT EDGE
There are multiple levels of cookie enablement in Edge. For more information, click here.

MOZILLA FIREFOX
There are multiple levels of cookie enablement in Firefox. For more informaiton, click here.

OPERA
There are multiple levels of cookie enablement in Opera. For more information, click here

SAFARI
For more information, see the Safari user guide.