CyberSecurity part 28
After 27 parts, this series is now coming to an end.
The BASH series is going to be given a new home. In order to facilitate this, it is being re-written and will form part of a larger project.
As this is now taking up my time, it makes sense to end the and focus on the new format that it will be presented in. I am also getting some help from a few very capable young hackers with this.
Nevertheless, the new format will look better and be more useful than a video and a list of commands that are just a summary of the video.
In other news, the Tuxiversity forum and website (below) are also going to be overhauled.
If you wish to ask questions about the current series, I am available via Internet Relay Chat (zleap), as are other members of the team behind this project.
To chat on IRC, please click the link below, enter a new nickname and press start. You should be then taken to the chatroom.
CyberSecurity part 27
Build Your Own Linux
This looks like a really useful tutorial for anyone wanting to build their own GNU/Linux system from scratch. So this also ties in to this series as being able to build robust, secure systems is essential. A good way to do this is build your own.
CyberSecurity part 26 Supplemental
Just a quick post to update the article index to include latest article(s).
CyberSecurity part 3 – BASH Basics 1
CyberSecurity part 4 – BASH Basics 2
CyberSecurity part 5 – BASH Basics 3
CyberSecurity part 6 – BASH Basics 4
CyberSecurity part 7 – BASH Basics 5
CyberSecurity part 8 – BASH Basics 6
CyberSecurity part 9 – BASH Basics 7
CyberSecurity part 10 – BASH Basics 8
CyberSecurity part 10-1
CyberSecurity part 11 – Nano Editor
CyberSecurity part 12 – Shell Scripting
CyberSecurity part 13 – Sed,Grep & Cron
CyberSecurity part 14 – System D Bsics
CyberSecurity part 15 – Networking Basics
CyberSecurity part 16– Day off- A few useful links
CyberSecurity part 17 – OpenSSh
CyberSecurity part 18 – Git & Github
CyberSecurity part 19 – Virtual Machines
CyberSecurity part 20 – Computer Misuse Act
CyberSecurity part 21 – Python Intro
CyberSecurity part 22 – Pen testing tools
CyberSecurity part 23 – CyberSecurity Courses
CyberSecurity part 24 – Functional Programming in Coq
CyberSecurity-part-25 – Open Source vs Free Software
CyberSecurity-part-26 – Self hosting
CyberSecurity-part-27 – Build your own Linux
CyberSecurity part 26
A guide to self hosting
AndewYu has produced a really useful guide, detailing how you can set up your own website and host this yourself, from obtaining a domain, setting up DNS and obtaining a SSL Certificate,
There is a lot of really useful information here, and it ties in nicely with this series of posts and perhaps learning about writing websites with HTML / CSS for example.
CyberSecurity part 25
Open Source vs Free Software
There seems to be confusion around the terms Free software and Open Source Software.
To briefly clarify this.
The primary difference is philosophy – The free software movement says we're here doing all this because proprietary software is unethical. Wrong. Unjust.
The open source movement says we're here doing all of this because we can get technically better software.
Free software, does not simply mean the software is free as in cost, it refers to Free as in Freedom and a free software license such as the GPL  grants a user 4 freedoms.
- Freedom to use for any purpose
- Freedom to study the software
- Freedom to modify
- Freedom to copy and share the software with others
The freesoftware movement is also therefore about philosophy.
CyberSecurity part 24
Functional Programming in Coq
Staying on the theme of programming and cybersecurity, this course is about Functional Programming in Coq and was mentioned on the Libreplanet discuss mailing list. It may be useful generally as a way to learn skills that can be applied to other languages or just generally.
CyberSecurity part 23
Courses and further reading:-
Courses related to Kali Linux
Learning how to use these and the associated tools is way beyond the scope of what I am doing here. I would therefore suggest you look in to other learning options.
There are many other providers, not sure about any in Torbay, we do seem to be in the dark ages down here. But Tech Learning Collective do several courses.
Tech Learning Collective
I have listed some providers below, and would hope that the forum may, eventually be a good source of information too.
CyberSecurity part 22
Penetration testing tools
I am now sharing a link to some information that I found on the 9 best tools for penetration (or pen) testing.
9 best pentesting tools
- John the Ripper
- Burp Suite
This list is from February 2022.
CyberSecurity part 21
Python, is a very useful and powerful programming language which can be used for a wide variety of tasks, including those relating networking and cybersecurity, pen testing etc. Therefore having a good knowledge will be very beneficial going forward. To this end there are a few links below.
Python is also pre-installed on the Raspberry Pi, however you can also experiment via Replit. FreeCodeCamp have a number of python courses, one or two are related to cybersecurity. Vfsync which we are using as a virtual GNU / Linux machine, comes with Python 2.7 and Python 3.8.3
Python 2.7.18 (default, Apr 21 2020, 01:56:54)
[GCC 9.3.0] on linux2
Type "help", "copyright", "credits" or "license" for more information.
CyberSecurity part 20
Over the past 20 days, we have covered a wide range of topics. Given that we are heading towards discussing cyber security, then it is time we started to look at the legal framework behind this.
The United Kingdom has a piece of legislation called the Computer Misuse act, that was introduced in 1990. There is a video below about this.
I am sharing so that it is clear that what you learn and undertake with systems such as Kali Linux has to be within the law.