Category Archives: Security

Penetration Testing best practice

Testing Methodologies OWASP – Open Web Application Security Project OSSTMM – Open Source Security Testing Methodology Manual NIST SP 800-42 CISSP and SSCP Open Study Guides Web Site The Professional Security Testers Warehouse   Certifications OPSA – OSSTMM Professional Security … Continue reading

Posted in Security | Leave a comment

Tor – How to blacklist

Tor An anonymous Internet communication system is used to surf quiet anonymously through the net. Because of it’s anonymity it is also abused for illegal activity. Below you will find information about how you can denied access from Tor to … Continue reading

Posted in Security | Leave a comment