• Skip to main content
  • Skip to primary sidebar

crackthe.net

since 2010

  • Crypto
  • Hacking
  • Security
Hide your IP address with a VPN
crackthe.net / IT Security

IT Security

Was ist ein VPN?

10 Best Computer Networking Books for Beginners & Experts

10 Best IT Security Books for Beginners & Experts

10 Best Ethical Hacking Books for Beginners & Experts

10 Best Cloud Security Books for Beginners & Experts

10 Best OT, ICS, SCADA Security Books for Beginners & Experts

10 Best Web Security Books for Beginners & Experts

10 Best Cryptocurrency Books for Beginners & Experts

The Best Password Managers to Secure Your Digital Life

USB Sticks with Built-in PIN Keypad

How To Prepare for CEH and OSCP Exam – Books & Courses

How To Prepare for CISA, CISM and CRISC Exam – Books & Courses

Top 20 Network Security Tools

Wireshark Metasploit Nessus Aircrack Snort Cain and Abel BackTrack Netcat tcpdump John the Ripper Kismet OpenSSH/PuTTY/SSH Burp Suite Nikto Hping Ettercap Sysinternals w3af OpenVAS Scapy Source: sectools.org

List of Proxies (HTTP/S, SOCKS4/5 & Rotating)

HTTP/S, SOCKS4/5 rainproxy.io proxiware.com intenseproxy.com truesocks.net proxyscrape.com Rotating Proxy smartproxy.com zenscrape.com stormproxies.com luminati.io netnut.io oxylabs.io geosurf.com

OT Security Certifications (GICSP, GRID, GCIP)

Global Industrial Cyber Security Professional (GICSP) The GICSP bridges together IT, engineering and cyber security to achieve security for industrial control systems from design through retirement. This unique vendor-neutral, practitioner focused industrial control system certification is a collaborative effort between GIAC and representatives from a global industry consortium involving organizations that design, deploy, operate and/or […]

Top 5 WordPress Security Plugins

Network Switch – Layer 2 Security Controls

Secure Shell Protocol (SSH): SSH to secure incoming/outgoing Telnet connections; support of SSHv1 and v2 Secure Sockets Layer (SSL): SSL to encrypt HTTP connections; advanced security for browser-based configuration via web interface IEEE 802.1X: IEEE 802.1X access control on all ports; RADIUS for authentication, authorization and accounting with MD5 hashing; guest VLAN; dynamic VLAN assignment […]

VPN Providers that Accept Cryptocurreny

Introduction to Operational Technology Security (OTSEC)

How To Secure Linux, Nginx, MariaDB, PHP (LEMP stack) on Debian

IT Security Online Courses for Beginners and Professionals

How To Prepare for Certified Information Systems Security Professional (CISSP) Exam – Books & Courses

Online Courses CISSP Complete Video Course by Sari Greene CISSP Complete Video Course by Sari Greene contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you […]

OSI Model: Data Link and Network Layer Security Controls

Intrusion Prevention: Monitoring and blocking of login attempts and port scans IP Spoofing: Source IP address check on all interfaces: only IP addresses belonging to the defined IP networks are allowed Access control lists (ACLs): Filtering of IP or MAC addresses and preset protocols for configuration access and LANCAPI Denial of Service protection: Protection from […]

How to Secure Your WordPress Website From Hackers

Plugins

How to Stay Anonymous Online

You can not stay totally anonymous online but you can try to hide your traces.

Best VPN Service Provider

https://amiunique.org/ expressvpn.com privateinternetaccess.com nordvpn.com ProtonVPN Doublehop BlackVPN BolehVPN Trust.Zone NordVPN

Intrusion Detection and Prevention Systems (HIDS, HIDP, NIDS, NIDP)

Classification Network-based intrusion prevention system (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity. Wireless intrusion prevention system (WIPS): monitor a wireless network for suspicious traffic by analyzing wireless networking protocols. Network behavior analysis (NBA): examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service […]

Least privilege and Need-to

Need-to-know Need-to-have Need-to-see

Factors of Authentication

Something you know (such as a password) Something you have (such as a smart card) Something you are (such as a fingerprint or other biometric method) Somewhere you are (such as a geolocation or geotagging system) Something you do (such as voice patterns, handwriting analysis …)

Identity and Access Management

AAA Identity and Authentication Authorization Accountability

What Is the CIA Triad? (Information Security)

Confidentiality Integrity Availability

CDN Providers for Your WordPress Website

CloudFlare Sucuri CDN KeyCDN

Primary Sidebar

Crypto

  • How to Buy Bitcoin?
  • Metaverse
  • Play to Earn (P2E) Games
  • Non-Fungible Tokens (NFTs)

Security

  • IT Security Online Courses
  • Best VPN Service Provider
  • WordPress Security
  • IT Security Books

Hacking

  • Ethical Hacking Online Courses
  • Ethical Hacker Forums
  • Ethical Hacking Books

450+ Follower

Follow crackthe.net on Twitter

© 2010 - 2022 crackthe.net • Site Notice • Privacy Policy