Download |
|
|
|
5,074 |
8627EF26
|
|
775 |
F82C2AC5
|
|
RAR-files |
jgt-pplssa.rar |
15,000,000 |
60ADA744 |
jgt-pplssa.r00 |
15,000,000 |
D08359F6 |
jgt-pplssa.r01 |
15,000,000 |
13AECC5F |
jgt-pplssa.r02 |
15,000,000 |
F55B5C15 |
jgt-pplssa.r03 |
15,000,000 |
7E5B4ADD |
jgt-pplssa.r04 |
15,000,000 |
4D501F8C |
jgt-pplssa.r05 |
15,000,000 |
6ABF5E2D |
jgt-pplssa.r06 |
15,000,000 |
1E78B90D |
jgt-pplssa.r07 |
15,000,000 |
EC8537C3 |
jgt-pplssa.r08 |
15,000,000 |
18FC8E0A |
jgt-pplssa.r09 |
15,000,000 |
57B0B450 |
jgt-pplssa.r10 |
15,000,000 |
F8207785 |
jgt-pplssa.r11 |
15,000,000 |
ADF38AB3 |
jgt-pplssa.r12 |
15,000,000 |
DCEC8772 |
jgt-pplssa.r13 |
15,000,000 |
50F2D0DC |
jgt-pplssa.r14 |
15,000,000 |
8C92705F |
jgt-pplssa.r15 |
15,000,000 |
40E13518 |
jgt-pplssa.r16 |
15,000,000 |
F4F5209F |
jgt-pplssa.r17 |
15,000,000 |
40ABA729 |
jgt-pplssa.r18 |
15,000,000 |
250FA91E |
jgt-pplssa.r19 |
15,000,000 |
333786E8 |
jgt-pplssa.r20 |
15,000,000 |
6005FE49 |
jgt-pplssa.r21 |
15,000,000 |
30B36B59 |
jgt-pplssa.r22 |
15,000,000 |
549ADC04 |
jgt-pplssa.r23 |
15,000,000 |
7E655122 |
jgt-pplssa.r24 |
15,000,000 |
527FDB54 |
jgt-pplssa.r25 |
15,000,000 |
B3918B92 |
jgt-pplssa.r26 |
15,000,000 |
4BF759B0 |
jgt-pplssa.r27 |
15,000,000 |
CEABF3A6 |
jgt-pplssa.r28 |
15,000,000 |
FE24DC7B |
jgt-pplssa.r29 |
10,911,423 |
CD467880 |
|
Total size: |
460,911,423 |
|
|
Archived
files |
Packt Practical Linux Security Solutions\01.Linux Security Problems\0101.The Course Overview.mp4
[d0df6b09bc23e133]
|
11,782,399 |
3E6A298F |
Packt Practical Linux Security Solutions\01.Linux Security Problems\0102.Introduction.mp4
[fc805ad7c8ba1f65]
|
17,855,303 |
909A650A |
Packt Practical Linux Security Solutions\01.Linux Security Problems\0103.Conducting Integrity Checks.mp4
[e634df1d54b93a8d]
|
10,881,836 |
E856BECC |
Packt Practical Linux Security Solutions\01.Linux Security Problems\0104.Making Use of sudoers.mp4
[4cbe7d2b64b2f7dc]
|
14,095,394 |
BFA7AE46 |
Packt Practical Linux Security Solutions\01.Linux Security Problems\0105.Scanning Hosts with Nmap.mp4
[41f92e8768647807]
|
11,775,465 |
945781EE |
Packt Practical Linux Security Solutions\02.Local Filesystem Security\0201.Viewing Files and Directory Details Using the ls Command.mp4
[599b0a791a2a6b24]
|
8,549,872 |
EB8E3166 |
Packt Practical Linux Security Solutions\02.Local Filesystem Security\0202.Changing File Permissions Using the chmod Command.mp4
[1efb76eb13ae5556]
|
18,423,288 |
BD492D25 |
Packt Practical Linux Security Solutions\02.Local Filesystem Security\0203.Implementing Access Control List (ACL).mp4
[d8d817cbe669445a]
|
13,874,387 |
0BF7BEC1 |
Packt Practical Linux Security Solutions\02.Local Filesystem Security\0204.File Handling Using the mv Command.mp4
[ea216f91349dcd6c]
|
25,311,767 |
7E3833DF |
Packt Practical Linux Security Solutions\03.Local Authentication in Linux\0301.User Authentication and Logging.mp4
[30435cc92d513ab6]
|
9,056,438 |
6C208DB1 |
Packt Practical Linux Security Solutions\03.Local Authentication in Linux\0302.Limiting the Login Capabilities of Users.mp4
[60c9fa6467a1533e]
|
11,999,530 |
22ACBA4D |
Packt Practical Linux Security Solutions\03.Local Authentication in Linux\0303.Monitoring User Activity Using acct.mp4
[566140ab832c0294]
|
7,053,558 |
DB6067BF |
Packt Practical Linux Security Solutions\03.Local Authentication in Linux\0304.Defining User Authorization Controls.mp4
[182f873be6ccd502]
|
13,352,915 |
1B9A0AA5 |
Packt Practical Linux Security Solutions\04.Remote Authentication\0401.Remote ServerHost Access Using SSH.mp4
[628e1a3445c9d9ae]
|
5,962,407 |
E1EE1D62 |
Packt Practical Linux Security Solutions\04.Remote Authentication\0402.Disabling or Enabling SSH Root Login.mp4
[13843ce4f24b29ce]
|
12,623,828 |
1BA139E8 |
Packt Practical Linux Security Solutions\04.Remote Authentication\0403.Restricting Remote Access with Key-based Login into SSH.mp4
[a3420242cee9dde2]
|
10,041,496 |
C102AF7C |
Packt Practical Linux Security Solutions\05.Network Security\0501.Managing the TCPIP Network.mp4
[f8f1d524eec426a0]
|
14,219,014 |
C17C2CF8 |
Packt Practical Linux Security Solutions\05.Network Security\0502.Using Iptables to Configure a Firewall.mp4
[ab0e8deeabcf8aed]
|
20,292,049 |
728007B9 |
Packt Practical Linux Security Solutions\05.Network Security\0503.Blocking Spoofed Addresses.mp4
[415579c665ffa3e3]
|
13,781,919 |
5FF9A435 |
Packt Practical Linux Security Solutions\05.Network Security\0504.Blocking Incoming Traffic.mp4
[9a66d0b9949a9363]
|
12,054,921 |
EC7FE7E7 |
Packt Practical Linux Security Solutions\06.Security Tools and Security Distros\0601.Linux sXID.mp4
[e32dad9b6e21432d]
|
12,906,147 |
3C61CF90 |
Packt Practical Linux Security Solutions\06.Security Tools and Security Distros\0602.PortSentry.mp4
[51c691e60329e7d8]
|
13,667,269 |
29FFB869 |
Packt Practical Linux Security Solutions\06.Security Tools and Security Distros\0603.OpenSSL Server.mp4
[61006e04668d39f9]
|
15,341,168 |
FEE4B22C |
Packt Practical Linux Security Solutions\06.Security Tools and Security Distros\0604.Tripwire.mp4
[28d2c293731919a5]
|
11,234,574 |
EE31B512 |
Packt Practical Linux Security Solutions\06.Security Tools and Security Distros\0605.Kali Linux.mp4
[3d383283e55dda2d]
|
14,561,078 |
A81A1011 |
Packt Practical Linux Security Solutions\06.Security Tools and Security Distros\0606.DEFT – Digital Evidence and Forensic Toolkit.mp4
[92cab5f8a85a5898]
|
13,018,611 |
C7054EC3 |
Packt Practical Linux Security Solutions\07.Patching a Bash Vulnerability\0701.Understanding the Bash Vulnerability Through Shellshock.mp4
[4f067cb1c1155717]
|
17,905,022 |
D1E53E9F |
Packt Practical Linux Security Solutions\07.Patching a Bash Vulnerability\0702.Applying Patches on the Linux Systems.mp4
[a1b7dced5540fc32]
|
15,956,880 |
16DE3FEE |
Packt Practical Linux Security Solutions\08.Security Monitoring and Logging\0801.Viewing and Managing Log Files Using Logcheck.mp4
[e883fbf81446f417]
|
11,808,808 |
9D90ADAE |
Packt Practical Linux Security Solutions\08.Security Monitoring and Logging\0802.Monitoring a Network Using Nmap.mp4
[e0690d62f75c71c4]
|
12,548,041 |
3C96396B |
Packt Practical Linux Security Solutions\08.Security Monitoring and Logging\0803.Using Glances for System Monitoring.mp4
[faeaa338d399384b]
|
12,490,873 |
4CC0E8DC |
Packt Practical Linux Security Solutions\08.Security Monitoring and Logging\0804.Using System Tools – stat.mp4
[45d6f81a5c06dc71]
|
13,780,117 |
0BBC6491 |
Packt Practical Linux Security Solutions\08.Security Monitoring and Logging\0805.Using System Tools – strace.mp4
[8198287eb0bc2727]
|
12,680,282 |
BF260D98 |
Packt Practical Linux Security Solutions\08.Security Monitoring and Logging\0806.Using Lynis.mp4
[132b1e39c86512c3]
|
15,444,028 |
CB970216 |
Packt Practical Linux Security Solutions\01.Linux Security Problems |
0 |
00000000 |
Packt Practical Linux Security Solutions\02.Local Filesystem Security |
0 |
00000000 |
Packt Practical Linux Security Solutions\03.Local Authentication in Linux |
0 |
00000000 |
Packt Practical Linux Security Solutions\04.Remote Authentication |
0 |
00000000 |
Packt Practical Linux Security Solutions\05.Network Security |
0 |
00000000 |
Packt Practical Linux Security Solutions\06.Security Tools and Security Distros |
0 |
00000000 |
Packt Practical Linux Security Solutions\07.Patching a Bash Vulnerability |
0 |
00000000 |
Packt Practical Linux Security Solutions\08.Security Monitoring and Logging |
0 |
00000000 |
Packt Practical Linux Security Solutions |
0 |
00000000 |
|
Total size: |
456,330,684 |
|
|
RAR Recovery |
Present (Protect+) |
4,567,388 |
|
|
Labels
|
APPS |