So, okay. If you've read the basic article about security plans,  C-Days - Basic security plan, let's move on to a small example, about securing a home office.

A note, I won't get into specific configurations, but will include links to how to set it up yourself. If I had to include a manual for every software, or every device out there, it will be a veeery long post.
But, as time goes by, I will try to get the specifics into tutorials, and link from here, for those interested :)

So, to kick of this series about security, lets start with some basic discussion. In this article we're going to take a look at what will be coming up, in the series, and some basic notes, thoughts and ideas.

The first thing about this series, is a small disclaimer. No matter what software you buy, what tools you use, there's no such thing as absolute protection.
No matter how good it is, how strong the encryption is, or how expensive the hardware might be, it cant protect in all scenarios. IF people really want to hack you, steal your secrets, or compromise your network, they can and will. If they are determined enough, well funded, working for "a three letter acronym agency", or from foreign government, they will get in, and yes, even well funded criminal syndicates will too.

A small article about setting up the Proxmark3 for the first time.

Setting up the Blueshark PM3 module.

Now we know how to package scripts to deb files, let's have a look at making our own meta-packages for Kali.
It's a quick way of configuring a custom system, or setting up a lot of machines without a lof of work. Simply create a repo, make a couple of meta-packages, and drink coffee while APT takes care of the rest :)

Subcategories