Article Search...
Uncategorised Article Count: 20
Downloads Article Count: 0
Downloadable content, software and other information provided free of charge and in some cases under the GNU/GPL License agreement. Please note that some of the content herein may accompany source code within it's respective language for modification, or fine-tuning.
Please note that if changes are made to code and redistributed you MUST resubmit the information to Network Defense Solutions, Inc. to re-port the changes and provide credit to the contributing author.
Linux Hacking Programs Article Count: 3
Linux Software Article Count: 2
Microsoft Windows Software Article Count: 1
Microsoft Windows Hacking Programs Article Count: 5
Perimeter Defenses Article Count: 2
A collection of articles, tips and how-tos regarding the maintenance of security surrounding your location in both the physical and digital sense. Articles range from Linux, OS X and Windows defenses as well as server-side technologies.
Structured Security Article Count: 18
The approach for layering security measures based on the OSI Model, and network design diagrams.
Server Security Article Count: 7
A collection of articles, how-tos and tips revolving around server security. These articles will include apache web server, ssh servers and other technologies utilized server-side. Operating systems may include Linux, OS X, server 2003, and server 2012.
Internal Security Article Count: 4
A collection of papers and, policies which dictate how internal security can be governed. This may include destruction of hard drives, paper and other materials to many other security topics within the office space.
Information Leakage Article Count: 1
Various methods information may be leaked out of your network without proper knowledge, and how to limit the information that is leaked.
Secure Programming Article Count: 1
Various articles dedicated to better programming practices. These articles may include C/C++, .NET, C#, Visual Basic, VB.NET and PHP / ASP. These articles may include ethical hacking material or reference ethical hacking material which may provide a better understanding of the security measure and it's respective counter-measure if available.
Linux / OS X Hardening Article Count: 6
Methods and white papers showing you how to secure your *NIX installation, servers or desktop.
Windows OS Hardening Article Count: 4
Examples and papers demonstrating the proper methods to harden windows installations from XP, Vista, 7, server 2003, 2012 and the dreaded and horrible windows 8.
Penetration Testing & Hacking Article Count: 0
Various articles with *hands-on methods of bending the rules of security to fit the needs of a penetration tester, or hacker. These materials describe scanning, exploitation, web application hacking and other methods to procure access to a remote and or end-point. Each segment accompanies it's respective counter-measure and examples of how and why the method operates and or, works.
Information Gathering Article Count: 6
Scanning Article Count: 10
Enumeration Article Count: 9
Firewall Testing & IDS Avoidance Article Count: 10
Network Hacking Article Count: 6
System Exploitation Article Count: 33
Windows Hacking Article Count: 5
Password Hacking Article Count: 17
Web Application Hacking Article Count: 20
Identity Theft Article Count: 2
Human Hacking & Social Engineering Article Count: 9
Forensics Article Count: 8
Methods for providing system, and computer forensics on windows, and Unix operating systems.
Linux Forensics Article Count: 1
A set of tools, tutorials and other information that detail how to conduct a forensics from and against a Linux / Unix operating system.
Data Recovery Article Count: 3
Detailed instructions providing methods to procure, and pilfer information from a failing or dead hard drive utilizing cloning (dd) / mirroring and the usage of hardware or forensic tools (Encase, Pro Discover).
White Papers Article Count: 3
Business Impact Analysis Article Count: 2
Blog Article Count: 10
Software Development Article Count: 0
Articles and code examples for software development in an assortment of languages for multiple operating systems. This segment will contain articles for C/C++, VB 2010, Python and PHP. Articles will be written each Friday and posted. These segments will contain both code examples (downloadable, too with binaries) and examples how to run them.
Windows Development Article Count: 0
A collection of source code examples for Microsoft Windows Operating systems. Code examples will contain information to whether they work on Win 9X, or NT (From 95 - Windows 10). It is strongly advised that you run from source code, or examine the source code before compiling executable applications. Alternative methods would be to work on these applications or source code from within virtual machines to add a layer of safety. To download a virtual machine please see the following locations: <a href="http://www.virtualbox.org">Oracle Virtualbox</a> or <a href="http://www.vmware.com">VMware</a>. <b><font color="red">Although we will strive to provide code examples that WILL NOT harm your system, it is an added level of security to run development applications, or source code once compiled within a virtual machine before testing on your own system.</b></font>. We will strive to do our best regarding software development and code examples.
Microsoft Windows C/C++ Article Count: 2
This area will be dedicated to Windows Software development, and source code examples in C/C++. The examples here will be marked for which operating systems they currently work, and how to execute the applications (require administrator, or run from local user.) If you would like to work along with the source code examples, or build your own software please download and utilize one of the following C/C++ Development Environments. <a href="https://netbeans.org/">NetBeans Development Environment.</a>, or <a href="http://www.bloodshed.net/download.html">BloodShed C++</a>, or <a href="http://codeblocks.org/downloads/26">Code::Blocks</a> or, <a href="https://www.visualstudio.com/">Micro$oft Vi$ual $tudio (CHECK THE FREE ONE)</a>.
Products Article Count: 2
Here you will find information regarding any products we produce to help keep your systems and web locations safe. Network Defense Solutions, Inc. is launching a new product line that will enable small business owners to protect their assets and information from breaches, and manage an investigation. You can choose any of the products below for more information.
Server & Web Security Article Count: 11
A collection of tools that scan, read, parse, track and report on attacks in system logs. These tools are designed for both Linux and Windows to operate server side, and desktop side. Tool protections range from attack detection to blocking and analysis.
Windows Desktop & Server Services Article Count: 6
A collection of services and software applications to assist with maintaining microsoft windows and the microsoft windows server family of products.
Linux Desktop Services Article Count: 3
A collection of scripts, applications and services that assist in running, maintaining and securing a Linux environment.
Virtualization Services Article Count: 1
Service for desktop virtualization for legacy software and setup of virtual servers utilizing ESXi. Virtualization also includes remote virtualization for DR purposes as well as VirtualBox, VMWare and Parallels. Virtualization covers Windows, Linux and OS X / MacOS.
Data Recovery Services Article Count: 2
Need data recovered after it's been deleted? Or, need a recovery method if your system has crashed? We offer multiple options to recover your data. From remote recovery and mail-in-services. We also provide storage for mirrored hard disks where if you encounter an issue, we can ship you a hard disk with your environment already running! Once we receive your old hard disk we'll make your data available for download only to you so you can continue where you last left off.