RAR-files |
pmlsah-710c-xqzt.rar |
50,000,000 |
C8A35B15 |
pmlsah-710c-xqzt.r00 |
50,000,000 |
0270F180 |
pmlsah-710c-xqzt.r01 |
50,000,000 |
2A00982C |
pmlsah-710c-xqzt.r02 |
50,000,000 |
FCC8916B |
pmlsah-710c-xqzt.r03 |
50,000,000 |
7EE09C6B |
pmlsah-710c-xqzt.r04 |
50,000,000 |
C61FEC95 |
pmlsah-710c-xqzt.r05 |
50,000,000 |
7CB9476F |
pmlsah-710c-xqzt.r06 |
50,000,000 |
278A17CF |
pmlsah-710c-xqzt.r07 |
50,000,000 |
BD48780F |
pmlsah-710c-xqzt.r08 |
50,000,000 |
CFF1568A |
pmlsah-710c-xqzt.r09 |
50,000,000 |
05229B19 |
pmlsah-710c-xqzt.r10 |
50,000,000 |
417351DE |
pmlsah-710c-xqzt.r11 |
50,000,000 |
E8E74116 |
pmlsah-710c-xqzt.r12 |
50,000,000 |
CF6FF31F |
pmlsah-710c-xqzt.r13 |
50,000,000 |
4B500048 |
pmlsah-710c-xqzt.r14 |
50,000,000 |
D557C5C3 |
pmlsah-710c-xqzt.r15 |
50,000,000 |
40AF8104 |
pmlsah-710c-xqzt.r16 |
50,000,000 |
1FD3EA43 |
pmlsah-710c-xqzt.r17 |
50,000,000 |
AC9DEAAE |
pmlsah-710c-xqzt.r18 |
50,000,000 |
26F92760 |
pmlsah-710c-xqzt.r19 |
47,727,099 |
4EC9BA31 |
|
Total size: |
1,047,727,099 |
|
|
Archived
files |
Mastering Linux Security and Hardening [Video]\8.Scanning, Auditing, and Hardening\42.SELinux Considerations.mp4
[73fb851f86c1a58c]
|
12,495,339 |
3E4A9391 |
Mastering Linux Security and Hardening [Video]\8.Scanning, Auditing, and Hardening\40.Installing and Updating ClamAV and maldet.mp4
[dc3e8fed59e6f1ba]
|
23,672,084 |
A2A93CF6 |
Mastering Linux Security and Hardening [Video]\8.Scanning, Auditing, and Hardening\45.Using ausearch and aureport.mp4
[a3d0fab70904144a]
|
28,179,364 |
AA7CE77A |
Mastering Linux Security and Hardening [Video]\8.Scanning, Auditing, and Hardening\46.Scanning and Hardening with Lynis.mp4
[fb580946190a7ed2]
|
14,288,077 |
66D90913 |
Mastering Linux Security and Hardening [Video]\8.Scanning, Auditing, and Hardening\44.Controlling the auditd Daemon and Creating Audit Rule.mp4
[aae6bb2309059ce9]
|
32,616,042 |
A10F8415 |
Mastering Linux Security and Hardening [Video]\8.Scanning, Auditing, and Hardening\43.Scanning for Rootkits with Rootkit Hunter.mp4
[95f8e89e41c19335]
|
16,512,178 |
B787A615 |
Mastering Linux Security and Hardening [Video]\8.Scanning, Auditing, and Hardening\41.Scanning with ClamAV and maldet.mp4
[8fea070e14ce0d70]
|
54,374,452 |
904F8D3C |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts\05.Setting Up sudo for Users with Only Certain Delegated Privileges.mp4
[9816ce71e88cb6ad]
|
12,337,710 |
7DB92A92 |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts\07.Locking Down Users' Home Directories the Red Hat_CentOS and Debian_Ubuntu Way.mp4
[338187e6f8ca8828]
|
17,711,293 |
46840868 |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts\04.Setting Up sudo Privileges for Full Administrative Users.mp4
[4423c79aa47e425b]
|
21,766,083 |
53A112BA |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts\06.Advanced Tips and Tricks for Using sudo.mp4
[8e851fa3e8c088b0]
|
13,144,761 |
E2EB5D77 |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts\11.Locking User Accounts.mp4
[867c9b90aff77ba]
|
19,633,873 |
12E25481 |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts\09.Setting and Enforcing Password and Account Expiration.mp4
[d6586bddf9e8e76d]
|
40,338,015 |
C1749D55 |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts\10.Preventing Brute-Force Password Attacks.mp4
[326841505da78dff]
|
24,558,088 |
CE51B182 |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts\08.Enforcing Strong Password Criteria.mp4
[b6e06cc10a2df8e]
|
18,945,151 |
F675B487 |
Mastering Linux Security and Hardening [Video]\5.Mastering Discretionary Access Control\23.Changing Ownership of Files and Directories.mp4
[afc3fbd3b8339388]
|
71,585,505 |
FD980708 |
Mastering Linux Security and Hardening [Video]\5.Mastering Discretionary Access Control\26.Protecting Sensitive Files.mp4
[6be577f5c6c5c40c]
|
7,189,439 |
C5A18010 |
Mastering Linux Security and Hardening [Video]\5.Mastering Discretionary Access Control\24.Setting Permissions Values.mp4
[65811699e991682a]
|
5,621,057 |
1E104870 |
Mastering Linux Security and Hardening [Video]\5.Mastering Discretionary Access Control\25.Using SUID and SGID.mp4
[7ef6126ae8e37374]
|
46,479,525 |
FC95FEB0 |
Mastering Linux Security and Hardening [Video]\6.Access Control Lists and Shared Directory Management\28.Creating an Inherited Access Control List.mp4
[ccbff4930d62c2b6]
|
3,580,550 |
3C7290EB |
Mastering Linux Security and Hardening [Video]\6.Access Control Lists and Shared Directory Management\27.Creating an Access Control List.mp4
[ebc27c77ad7d3573]
|
5,736,951 |
1037B28D |
Mastering Linux Security and Hardening [Video]\6.Access Control Lists and Shared Directory Management\29.Removing a Specific Permission.mp4
[521c824b747b1165]
|
6,010,896 |
84C12130 |
Mastering Linux Security and Hardening [Video]\6.Access Control Lists and Shared Directory Management\30.Preventing Loss of ACLs.mp4
[709e7ac512f95e0d]
|
8,515,016 |
E10BD39D |
Mastering Linux Security and Hardening [Video]\6.Access Control Lists and Shared Directory Management\32.Setting the SGID Bit and the Sticky Bit.mp4
[a16f70a24d2ce9cb]
|
14,402,335 |
E86F0072 |
Mastering Linux Security and Hardening [Video]\6.Access Control Lists and Shared Directory Management\31.Creating a User Group and Adding Members to It.mp4
[6cef2bbda14564a]
|
8,341,377 |
C6CA4A57 |
Mastering Linux Security and Hardening [Video]\6.Access Control Lists and Shared Directory Management\33.Accessing Files in the Shared Directory.mp4
[da29ff931289c4fa]
|
4,079,881 |
C9BDCDF8 |
Mastering Linux Security and Hardening [Video]\3.Securing Your Server with a Firewall\12.An Overview of iptables.mp4
[1ab299d6efa73877]
|
40,403,991 |
5299B190 |
Mastering Linux Security and Hardening [Video]\3.Securing Your Server with a Firewall\13.Uncomplicated Firewall for Ubuntu Systems.mp4
[f712a92c251cd320]
|
11,944,439 |
71E8BE65 |
Mastering Linux Security and Hardening [Video]\3.Securing Your Server with a Firewall\15.nftables – A |
24,173,611 |
123DDADB |
Mastering Linux Security and Hardening [Video]\3.Securing Your Server with a Firewall\14.firewalld for Red Hat Systems.mp4
[8374837882251086]
|
44,943,643 |
CC548C5A |
Mastering Linux Security and Hardening [Video]\7.Implementing Mandatory Access Control with SELinux and AppArmor\36.Troubleshooting with setroubleshoot.mp4
[28af2b1c3b2d6c2e]
|
7,002,019 |
F91DCA2D |
Mastering Linux Security and Hardening [Video]\7.Implementing Mandatory Access Control with SELinux and AppArmor\35.Setting Security Contexts for Files and Directories.mp4
[ee73781213e2e333]
|
26,543,889 |
1AC636A2 |
Mastering Linux Security and Hardening [Video]\7.Implementing Mandatory Access Control with SELinux and AppArmor\34.How SELinux Can Benefit a Systems Administrator.mp4
[b2a28451f0dcd4eb]
|
6,036,394 |
FF192EF0 |
Mastering Linux Security and Hardening [Video]\7.Implementing Mandatory Access Control with SELinux and AppArmor\38.Looking at AppArmor Profiles.mp4
[67c1070a317f1874]
|
9,113,380 |
748BAAEA |
Mastering Linux Security and Hardening [Video]\7.Implementing Mandatory Access Control with SELinux and AppArmor\39.Working with AppArmor Command-Line Utilities.mp4
[2cb8bee6c655a1b1]
|
7,062,138 |
BF524863 |
Mastering Linux Security and Hardening [Video]\7.Implementing Mandatory Access Control with SELinux and AppArmor\37.Working with SELinux Policies.mp4
[5f9dae58f08a586f]
|
30,914,151 |
15BB7FD0 |
Mastering Linux Security and Hardening [Video]\4.Encrypting and SSH Hardening\20.Ensuring that SSH Protocol 1 Is Disabled.mp4
[d33d33c6b0d8da0]
|
32,783,571 |
C778A470 |
Mastering Linux Security and Hardening [Video]\4.Encrypting and SSH Hardening\21.Creating a User’s |
20,298,571 |
A5628C2C |
Mastering Linux Security and Hardening [Video]\4.Encrypting and SSH Hardening\22.Disabling Username_Password Logins.mp4
[c5041c79499dc18e]
|
33,282,614 |
14CD6D4F |
Mastering Linux Security and Hardening [Video]\4.Encrypting and SSH Hardening\18.Encrypting Directories with eCryptfs.mp4
[32a431c8e8b8cd6d]
|
18,217,784 |
D59D1F8F |
Mastering Linux Security and Hardening [Video]\4.Encrypting and SSH Hardening\19.Using VeraCrypt for Cross-Platform Sharing of Encrypted Containers.mp4
[60ac1adb471e512d]
|
57,036,247 |
F415642C |
Mastering Linux Security and Hardening [Video]\4.Encrypting and SSH Hardening\17.Encrypting Partitions with Linux Unified Key Setup – |
27,233,910 |
5D8EAFA8 |
Mastering Linux Security and Hardening [Video]\4.Encrypting and SSH Hardening\16.GNU Privacy Guard.mp4
[c7033627a5c3b891]
|
31,007,909 |
97EB6577 |
Mastering Linux Security and Hardening [Video]\1.Running Linux in a Virtual Environment\01.The Course Overview.mp4
[78bc460ff02f64f3]
|
18,755,504 |
144C4443 |
Mastering Linux Security and Hardening [Video]\1.Running Linux in a Virtual Environment\02.The Threat Landscape and Keeping Up with Security News.mp4
[82ce0c72d2f8fb62]
|
16,809,370 |
A8F32103 |
Mastering Linux Security and Hardening [Video]\1.Running Linux in a Virtual Environment\03.Introduction to VirtualBox and Cygwin.mp4
[c83649dd6ffff92e]
|
52,035,979 |
2807053A |
Mastering Linux Security and Hardening [Video]\8.Scanning, Auditing, and Hardening |
0 |
00000000 |
Mastering Linux Security and Hardening [Video]\2.Securing User Accounts |
0 |
00000000 |
Mastering Linux Security and Hardening [Video]\5.Mastering Discretionary Access Control |
0 |
00000000 |
Mastering Linux Security and Hardening [Video]\6.Access Control Lists and Shared Directory Management |
0 |
00000000 |
Mastering Linux Security and Hardening [Video]\3.Securing Your Server with a Firewall |
0 |
00000000 |
Mastering Linux Security and Hardening [Video]\7.Implementing Mandatory Access Control with SELinux and AppArmor |
0 |
00000000 |
Mastering Linux Security and Hardening [Video]\4.Encrypting and SSH Hardening |
0 |
00000000 |
Mastering Linux Security and Hardening [Video]\1.Running Linux in a Virtual Environment |
0 |
00000000 |
Mastering Linux Security and Hardening [Video] |
0 |
00000000 |
|
Total size: |
1,047,714,156 |
|
|