On the DVD
On the DVD
This month's DVD features two great distributions, Fedora 19 Security Spin and Kali Linux.
On the DVD
Fedora 19 Security Spin, 64-bit
The Fedora 19 Security Spin  is meant to provide "a safe test environment to work on security auditing, forensics, system rescue, and teaching security testing methodologies." The Security Spin uses the lightweight LXDE desktop with a customized menu containing all the tools you'll need to perform security testing or to rescue compromised systems. Run from a Live disc or from a USB stick, Fedora's Security Lab sets up a safe environment for your tests.
Kali Linux 1.0.4, 64-bit
BackTrack Linux has been reborn as Kali Linux, "The most advanced penetration testing distribution, ever" . Kali has transformed from a Live Linux distro to an installed distro and has moved from an Ubuntu to a Debian basis, with the lightweight Xfce desktop, if you prefer a GUI. This move gives Kali access to the exceptional Debian repositories. Now a Filesystem Hierarchy Standard (FHS)-compliant system, Kali lets you start any application anywhere, rather than navigating through
/pentest. The Offensive Security team is putting extra effort into making sure their tools are Debian compliant and completely up to date.
Defective discs will be replaced. Please send an email to mailto:email@example.com.
- Fedora Security Spin: http://spins.fedoraproject.org/security/
- Fedora downloads: http://spins.fedoraproject.org/security/#downloads
- Fedora forums: http://www.fedoraforum.org/
- Kali Linux: http://www.kali.org/
- Kali Linux downloads: http://www.kali.org/downloads/
- Kali Linux documentation: http://docs.kali.org/
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm