阿里云安全专家,主要负责阿里云云产品安全。
http://www.procdot.com/
https://digital-forensics.sans.org/community/summits http://cert.
http://blog.beyondtrust.com/the-delicate-art-of-remote-checks-a-glance-into-ms15-034 ...
http://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.
http://cuckoo-droid.readthedocs.org/en/latest/
http://morris.guru/detecting-kippo-ssh-honeypots/ Background I have a lot of honeypots configured around the Internet.
https://www.youtube.com/watch?v=JxJaCIzzFzg
https://www.kernel.org/doc/Documentation/cgroups/
https://cansecwest.com/csw15archive.html https://cansecwest.
http://www.concise-courses.com/learn/about-endpoint-protection/ ...
http://www.securitytube-training.com/online-courses/securitytube-ios-security-expert/index.
https://www.mnot.net/cache_docs/
https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.
https://www.fireeye.com/blog/threat-research/2015/04/analysis_of_kriptovo.
http://bitblaze.cs.berkeley.edu/hookfinder.html https://iseclab.
http://www.cso.com.au/whitepaper/370196/how-google-tackles-security-webcast/?type=other&arg=0&l...
https://www.youtube.com/watch?v=2-c3luyS6Ms
http://support.microsoft.com/en-us/kb/2458544
https://www.sans.org/critical-security-controls/
DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD http://www.
端口转发 https://technet.microsoft.com/en-us/library/cc731068%28v=ws.
http://www.toolswatch.org/2011/04/gfi-sandbox%E2%84%A2-formerly-cwsandbox-the-malware-analysis-tool-v3-2-released/ http://www.
http://www.christian-rossow.de/publications/downloaders-dimva12.
http://www.patterndiagnostics.com/training-reference-products#MDAAV7 ...
http://kennel209.gitbooks.io/owasp-testing-guide-v4/content/zh/ ...
https://mile2.com/mile2-online-estore/training-videos.
http://www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack-target.
https://www.sans.org/webcasts/cyberthreat-intelligence-how-1-definitions-tools-standards-99052 https://www.
https://remnux.org/docs/containers/run-apps/
https://www.sans.org/webcasts/archive/2015 http://digital-forensics.
登陆日志 4624 谁从哪里登陆,什么时间登陆 4627 管理员 5140 从哪里发起了共享连接 计划任务 106 - jobname,who,time 200 - st...
http://www.securitytube.net/video/12541
https://github.com/GDSSecurity/Docker-Secure-Deployment-Guidelines Docker Secure Deployment G...
http://blog.gdssecurity.com/labs/2015/2/25/jetleak-vulnerability-remote-leakage-of-shared-buffers-in-je.
https://technet.microsoft.com/en-us/library/cc162846.aspx
logminer verity data block examiner cadfile listener.
http://www.securitytube.net/video/12402 http://www.
https://technet.microsoft.com/en-us/library/ee844118(WS.
https://www.youtube.com/watch?v=yJl4TTdnVpw
https://www.virusbtn.com/virusbulletin/archive/index https://www.
https://www.youtube.com/user/virusbtn
https://www.brighttalk.com/webcast/574/136917
http://open.163.com/movie/2011/9/A/B/M8CCJHF2G_M8CCM0SAB.
https://disconnect.me/ https://github.com/mozilla/lightbeam https://www.
mandingo https://code.google.com/p/mandingo/w/list
If you’re reading this then you’ve probably seen all the media coverage over the last couple of days surrounding MS15-011 and MS15-014.
http://www.springer.com/computer/security+and+cryptology?SGWID=8-40160-66-653429-0&sba=INCLUDE...
http://www.securitytube.net/video/12388 https://code.
http://www.networksecuritytoolkit.org/nst/index.
https://www.youtube.com/user/OpenSecurityTraining/playlists https://www.