Information Security Links

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Backup    Basics   Passwords   Encryption  Miscellaneous   Phone Security  OS Security    Hardware Security

 

A bunch of links to help educate individuals and small non-profits so they can remain secure in the digital age.

 

The Apostle Paul, the Apostle John and Information Security

 

Backups

 

Why Backup?

 

https://www.dropmyemail.com/business/why_backup

http://www.riscitsolutions.com/news/archived-news/why-you-should-backup

 

The Beginner's Guide to PC Backup

http://www.pcmag.com/article2/0,2817,2363057,00.asp

http://www.debianhelp.co.uk/backupbasics.htm

 

Basics

 

Top Ten Safe Computing Tips

https://ist.mit.edu/security/tips

 

Digital Safety for Journalists

http://akademie.dw.de/digitalsafety/

http://en.rsf.org/IMG/pdf/guide_journaliste_rsf_2015_en.pdf  see ch. 4

 

Basics - Passwords

 

Choosing Secure Passwords

https://en.wikipedia.org/wiki/Password_strength#Guidelines_for_strong_passwords

https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html

 

Don't use these passwords

https://blog.kaspersky.com/10-worst-password-ideas-as-seen-in-the-adobe-hack/3198/

http://lifehacker.com/5937303/your-clever-password-tricks-arent-protecting-you-from-todays-hackers

 

Random Password Generator

https://www.random.org/passwords/

 

Random Passphrase Generator

http://world.std.com/~reinhold/diceware.html

 

Use a password safe

Lastpass  https://lastpass.com/simpledownload.php

Keepass  http://keepass.info/

Password Safe  https://pwsafe.org/

 

How Your Passwords Are Stored on the Internet (and When Your Password Strength Doesn't Matter)

http://lifehacker.com/5919918/how-your-passwords-are-stored-on-the-internet-and-when-your-password-strength-doesnt-matter

 

 

Encryption

 

Encrypting hard drives

 

http://www.pcworld.com/article/2858642/you-can-encrypt-your-hard-drive-but-the-protection-may-not-be-worth-the-hassle.html

https://answers.syr.edu/display/software/Encrypting+your+external+hard+drive+on+Windows+and+OSX

http://lifehacker.com/a-beginners-guide-to-encryption-what-it-is-and-how-to-1508196946

VeraCrypt  https://veracrypt.codeplex.com/ also does hidden volumes

GNU Privacy Guard  https://www.gnupg.org/  does external and USB devices

 

 

Encrypting files

 

Five Best File Encryption Tools: http://lifehacker.com/five-best-file-encryption-tools-5677725

 

7-Zip  http://www.7-zip.org/

 

 

Encrypting email

http://lifehacker.com/how-to-encrypt-your-email-and-keep-your-conversations-p-1133495744

 

http://akademie.dw.de/digitalsafety/is-encryption-still-worth-the-trouble-you-bet-it-is/

Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance https://freedom.press/encryption-works

GPG  https://www.gpg4win.org/

 

 

Miscellaneous

 

Anonomous browsing

Tor  https://tor.eff.org/

 

Wordpress

 

When you should NOT use WordPress for your Website? http://webhostingmedia.net/when-not-use-wordpress/

http://wordpress.stackexchange.com/questions/10594/when-should-we-not-recommend-a-client-use-wordpress

 

 

Phone Security

 

http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm

 

Personal Smartphone Security Best Practices: https://www.securedatarecovery.com/resources/guide-to-personal-smartphone-security

http://money.usnews.com/money/personal-finance/articles/2015/01/13/10-ways-to-keep-your-phone-safe

http://www.verizonwireless.com/mobile-living/network-and-plans/security-app-tips-to-keep-your-smartphone-secure/

The Best Mobile Security Apps:  http://www.pcmag.com/article2/0,2817,2402099,00.asp

 

 

Securing Your Operating System

 

Securing Windows

 

http://blogs.microsoft.com/cybertrust/2012/07/31/microsofts-free-security-tools-series-introduction/

 

https://blogs.microsoft.com/cybertrust/2013/01/15/microsofts-free-security-tools-microsoft-security-compliance-manager-tool-scm/

 

Norton Security Scan  https://security.symantec.com/nss/getnss.aspx?

 

AVG antivirus  http://www.avg.com/us-en/free-antivirus-download

 

http://www.superantispyware.com/

 

http://www.mcafee.com/us/resources/white-papers/foundstone/wp-low-hanging-fruits.pdf

 

 

Securing Redhat and Centos Linux (300 pages)

 

https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/pdf/Security_Guide/Red_Hat_Enterprise_Linux-7-Security_Guide-en-US.pdf

 

 

Securing Hardware

 

Vulnerability Scanners

On line port scanner  http://www.t1shopper.com/tools/port-scan/

http://www.cio.com/article/2683235/security0/how-to-choose-the-best-vulnerability-scanning-tool-for-your-business.html

 

http://akademie.dw.de/digitalsafety/how-to-protect-yourself-from-hackers/#more-932

 

https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play

 

Metasploit:  http://www.metasploit.com/

Armitage:   http://www.fastandeasyhacking.com/

OpenVAS:   http://www.openvas.org/

 

 

Securing ports

http://lifehacker.com/198946/how-to-portscan-your-computer-for-security-holes

http://www.techradar.com/us/news/networking/how-to-secure-your-tcp-ip-ports-633089

http://www.techrepublic.com/article/lock-it-down-develop-a-strategy-for-securing-ports-on-your-servers/

Shields Up: https://www.grc.com/default.htm

 

 

Securing Routers

http://security.stackexchange.com/questions/77112/danger-of-default-router-password

http://www.acunetix.com/blog/web-security-zone/the-email-that-hacks-you/

http://www.howtogeek.com/173921/secure-your-wireless-router-8-things-you-can-do-right-now/