Skip to content

Commit f50a03f

Browse files
committed
working on security resources
1 parent c421682 commit f50a03f

File tree

6 files changed

+105
-85
lines changed

6 files changed

+105
-85
lines changed

all.html

Lines changed: 37 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -3839,17 +3839,12 @@ <h2>Security open source projects</h2>
38393839
securing Linux distributions.</p>
38403840
</li>
38413841
</ul>
3842-
<h2>Security resources</h2>
3842+
<h2>HTTPS resources</h2>
38433843
<ul>
38443844
<li>
3845-
<p>The Open Web Application Security Project (OWASP) has
3846-
<a href="https://www.owasp.org/index.php/Cheat_Sheets">cheat sheets for security</a>
3847-
topics.</p>
3848-
</li>
3849-
<li>
3850-
<p>This page contains a
3851-
<a href="http://dfir.org/?q=node/8/">fantastic currated list of security reading material</a>
3852-
from beginning to advanced topics.</p>
3845+
<p>This question asking <a href="http://security.stackexchange.com/questions/5126/whats-the-difference-between-ssl-tls-and-https">what is the difference between TLS and SSL?</a>
3846+
explains that TLS is a newer version of SSL and should be used because
3847+
SSL through version 3.0 is insecure.</p>
38533848
</li>
38543849
<li>
38553850
<p>If you're having users submit sensitive information to your site you need
@@ -3858,11 +3853,6 @@ <h2>Security resources</h2>
38583853
over some of the nuances of the subject.</p>
38593854
</li>
38603855
<li>
3861-
<p><a href="http://gexos.github.io/Hacking-Tools-Repository/">Hacking Tools Repository</a>
3862-
is a great list of password cracking, scanning, sniffing and other security
3863-
penetration testing tools.</p>
3864-
</li>
3865-
<li>
38663856
<p><a href="https://hynek.me/talks/tls/">The Sorry State of SSL</a> details the
38673857
history and evolution of SSL/TLS. There are important differences between
38683858
the versions and Hynek explains why TLS should always be used. The
@@ -3871,6 +3861,37 @@ <h2>Security resources</h2>
38713861
<a href="https://developer.rackspace.com/blog/the-not-so-sorry-state-of-ssl-in-python/">The not-so-sorry state of SSL in Python</a>.</p>
38723862
</li>
38733863
<li>
3864+
<p><a href="http://blog.hartleybrody.com/https-certificates/">How HTTPS Secures Connections</a>
3865+
is a guide for what HTTPS does and does not secure against.</p>
3866+
</li>
3867+
<li>
3868+
<p><a href="http://erik.io/blog/2013/06/08/a-basic-guide-to-when-and-how-to-deploy-https/">When and How to Deploy HTTPS</a></p>
3869+
</li>
3870+
<li>
3871+
<p><a href="http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html">The first few milliseconds of an HTTPS connection</a>
3872+
provides a detailed look at the SSL handshake process that is implemented
3873+
by browsers based on the <a href="http://tools.ietf.org/html/rfc2818">RFC 2818</a>
3874+
specification.</p>
3875+
</li>
3876+
</ul>
3877+
<h2>General security resources</h2>
3878+
<ul>
3879+
<li>
3880+
<p>The Open Web Application Security Project (OWASP) has
3881+
<a href="https://www.owasp.org/index.php/Cheat_Sheets">cheat sheets for security</a>
3882+
topics.</p>
3883+
</li>
3884+
<li>
3885+
<p>This page contains a
3886+
<a href="http://dfir.org/?q=node/8/">fantastic currated list of security reading material</a>
3887+
from beginning to advanced topics.</p>
3888+
</li>
3889+
<li>
3890+
<p><a href="http://gexos.github.io/Hacking-Tools-Repository/">Hacking Tools Repository</a>
3891+
is a great list of password cracking, scanning, sniffing and other security
3892+
penetration testing tools.</p>
3893+
</li>
3894+
<li>
38743895
<p><a href="http://www.andrewault.net/2010/05/17/securing-an-ubuntu-server/">Securing an Ubuntu Server</a></p>
38753896
</li>
38763897
<li>
@@ -3880,9 +3901,6 @@ <h2>Security resources</h2>
38803901
<p><a href="http://httpd.apache.org/docs/current/misc/security_tips.html">Security Tips from Apache</a></p>
38813902
</li>
38823903
<li>
3883-
<p><a href="http://erik.io/blog/2013/06/08/a-basic-guide-to-when-and-how-to-deploy-https/">When and How to Deploy HTTPS</a></p>
3884-
</li>
3885-
<li>
38863904
<p><a href="http://spenserj.com/blog/2013/07/15/securing-a-linux-server/">Securing a Linux Server</a></p>
38873905
</li>
38883906
<li>
@@ -3894,23 +3912,10 @@ <h2>Security resources</h2>
38943912
<p><a href="http://arstechnica.com/security/2013/02/securing-your-website-a-tough-job-but-someones-got-to-do-it/">Securing Your Website</a></p>
38953913
</li>
38963914
<li>
3897-
<p><a href="http://blog.hartleybrody.com/https-certificates/">How HTTPS Secures Connections: What Every Web Dev Should Know</a></p>
3898-
</li>
3899-
<li>
3900-
<p><a href="http://blog.hartleybrody.com/https-certificates/">How HTTPS Secures Connections</a>
3901-
is a guide for what HTTPS does and does not secure against.</p>
3902-
</li>
3903-
<li>
39043915
<p><a href="https://www.crypto101.io/">Crypto 101</a> is an introductory course on
39053916
cryptography for programmers.</p>
39063917
</li>
39073918
<li>
3908-
<p><a href="http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html">The first few milliseconds of an HTTPS connection</a>
3909-
provides a detailed look at the SSL handshake process that is implemented
3910-
by browsers based on the <a href="http://tools.ietf.org/html/rfc2818">RFC 2818</a>
3911-
specification.</p>
3912-
</li>
3913-
<li>
39143919
<p><a href="http://getprismatic.com/story/1409447605839">An in-depth analysis of SSH attacks on Amazon EC2</a>
39153920
shows how important it is to secure your web servers, especially when they are
39163921
hosted in IP address ranges that are commonly scanned by malicious actors.</p>
@@ -4267,6 +4272,8 @@ <h1>Change Log</h1>
42674272
<h2>2014</h2>
42684273
<h3></h3>
42694274
<ul>
4275+
<li>Adding new security resources and splitting HTTPS resources into their own
4276+
section.</li>
42704277
<li>Split out Djangular resources into a separate section.</li>
42714278
<li>New NoSQL Python client resources.</li>
42724279
<li>Added new API resources for integration and creation.</li>

change-log.html

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,8 @@ <h1>Change Log</h1>
4646
<h2>2014</h2>
4747
<h3></h3>
4848
<ul>
49+
<li>Adding new security resources and splitting HTTPS resources into their own
50+
section.</li>
4951
<li>Split out Djangular resources into a separate section.</li>
5052
<li>New NoSQL Python client resources.</li>
5153
<li>Added new API resources for integration and creation.</li>

feeds/all.atom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
<?xml version="1.0" encoding="utf-8"?>
2-
<feed xmlns="http://www.w3.org/2005/Atom"><title>Matt Makai</title><link href="http://www.fullstackpython.com/" rel="alternate"></link><link href="http://www.fullstackpython.com/feeds/all.atom.xml" rel="self"></link><id>http://www.fullstackpython.com/</id><updated>2014-12-21T17:28:03Z</updated></feed>
2+
<feed xmlns="http://www.w3.org/2005/Atom"><title>Matt Makai</title><link href="http://www.fullstackpython.com/" rel="alternate"></link><link href="http://www.fullstackpython.com/feeds/all.atom.xml" rel="self"></link><id>http://www.fullstackpython.com/</id><updated>2014-12-22T08:11:00Z</updated></feed>

source/content/pages/10-security/1001-web-security.markdown

Lines changed: 28 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -30,39 +30,53 @@ request forgery and usage of public-private keypairs.
3030
securing Linux distributions.
3131

3232

33-
## Security resources
34-
* The Open Web Application Security Project (OWASP) has
35-
[cheat sheets for security](https://www.owasp.org/index.php/Cheat_Sheets)
36-
topics.
37-
38-
* This page contains a
39-
[fantastic currated list of security reading material](http://dfir.org/?q=node/8/)
40-
from beginning to advanced topics.
33+
## HTTPS resources
34+
* This question asking [what is the difference between TLS and SSL?](http://security.stackexchange.com/questions/5126/whats-the-difference-between-ssl-tls-and-https)
35+
explains that TLS is a newer version of SSL and should be used because
36+
SSL through version 3.0 is insecure.
4137

4238
* If you're having users submit sensitive information to your site you need
4339
to use SSL/TLS. Anything before TLS is now insecure. Check out this
4440
[handy guide](http://wingolog.org/archives/2014/10/17/ffs-ssl) that goes
4541
over some of the nuances of the subject.
4642

47-
* [Hacking Tools Repository](http://gexos.github.io/Hacking-Tools-Repository/)
48-
is a great list of password cracking, scanning, sniffing and other security
49-
penetration testing tools.
50-
5143
* [The Sorry State of SSL](https://hynek.me/talks/tls/) details the
5244
history and evolution of SSL/TLS. There are important differences between
5345
the versions and Hynek explains why TLS should always be used. The
5446
talk prompted work to improve Python's SSL in 2.7.9 based on the upgrades
5547
in Python 3 outlined in
5648
[The not-so-sorry state of SSL in Python](https://developer.rackspace.com/blog/the-not-so-sorry-state-of-ssl-in-python/).
5749

50+
* [How HTTPS Secures Connections](http://blog.hartleybrody.com/https-certificates/)
51+
is a guide for what HTTPS does and does not secure against.
52+
53+
* [When and How to Deploy HTTPS](http://erik.io/blog/2013/06/08/a-basic-guide-to-when-and-how-to-deploy-https/)
54+
55+
* [The first few milliseconds of an HTTPS connection](http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html)
56+
provides a detailed look at the SSL handshake process that is implemented
57+
by browsers based on the [RFC 2818](http://tools.ietf.org/html/rfc2818)
58+
specification.
59+
60+
61+
## General security resources
62+
* The Open Web Application Security Project (OWASP) has
63+
[cheat sheets for security](https://www.owasp.org/index.php/Cheat_Sheets)
64+
topics.
65+
66+
* This page contains a
67+
[fantastic currated list of security reading material](http://dfir.org/?q=node/8/)
68+
from beginning to advanced topics.
69+
70+
* [Hacking Tools Repository](http://gexos.github.io/Hacking-Tools-Repository/)
71+
is a great list of password cracking, scanning, sniffing and other security
72+
penetration testing tools.
73+
5874
* [Securing an Ubuntu Server](http://www.andrewault.net/2010/05/17/securing-an-ubuntu-server/)
5975

6076
* [Securing Ubuntu](http://joshrendek.com/2013/01/securing-ubuntu/)
6177

6278
* [Security Tips from Apache](http://httpd.apache.org/docs/current/misc/security_tips.html)
6379

64-
* [When and How to Deploy HTTPS](http://erik.io/blog/2013/06/08/a-basic-guide-to-when-and-how-to-deploy-https/)
65-
6680
* [Securing a Linux Server](http://spenserj.com/blog/2013/07/15/securing-a-linux-server/)
6781

6882
* The EFF has a well written overview on
@@ -71,19 +85,9 @@ securing Linux distributions.
7185

7286
* [Securing Your Website](http://arstechnica.com/security/2013/02/securing-your-website-a-tough-job-but-someones-got-to-do-it/)
7387

74-
* [How HTTPS Secures Connections: What Every Web Dev Should Know](http://blog.hartleybrody.com/https-certificates/)
75-
76-
* [How HTTPS Secures Connections](http://blog.hartleybrody.com/https-certificates/)
77-
is a guide for what HTTPS does and does not secure against.
78-
7988
* [Crypto 101](https://www.crypto101.io/) is an introductory course on
8089
cryptography for programmers.
8190

82-
* [The first few milliseconds of an HTTPS connection](http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html)
83-
provides a detailed look at the SSL handshake process that is implemented
84-
by browsers based on the [RFC 2818](http://tools.ietf.org/html/rfc2818)
85-
specification.
86-
8791
* [An in-depth analysis of SSH attacks on Amazon EC2](http://getprismatic.com/story/1409447605839)
8892
shows how important it is to secure your web servers, especially when they are
8993
hosted in IP address ranges that are commonly scanned by malicious actors.

source/content/pages/11-misc/1104-change-log.markdown

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ the
2424

2525
## 2014
2626
###
27+
* Adding new security resources and splitting HTTPS resources into their own
28+
section.
2729
* Split out Djangular resources into a separate section.
2830
* New NoSQL Python client resources.
2931
* Added new API resources for integration and creation.

web-application-security.html

Lines changed: 35 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -53,17 +53,12 @@ <h2>Security open source projects</h2>
5353
securing Linux distributions.</p>
5454
</li>
5555
</ul>
56-
<h2>Security resources</h2>
56+
<h2>HTTPS resources</h2>
5757
<ul>
5858
<li>
59-
<p>The Open Web Application Security Project (OWASP) has
60-
<a href="https://www.owasp.org/index.php/Cheat_Sheets">cheat sheets for security</a>
61-
topics.</p>
62-
</li>
63-
<li>
64-
<p>This page contains a
65-
<a href="http://dfir.org/?q=node/8/">fantastic currated list of security reading material</a>
66-
from beginning to advanced topics.</p>
59+
<p>This question asking <a href="http://security.stackexchange.com/questions/5126/whats-the-difference-between-ssl-tls-and-https">what is the difference between TLS and SSL?</a>
60+
explains that TLS is a newer version of SSL and should be used because
61+
SSL through version 3.0 is insecure.</p>
6762
</li>
6863
<li>
6964
<p>If you're having users submit sensitive information to your site you need
@@ -72,11 +67,6 @@ <h2>Security resources</h2>
7267
over some of the nuances of the subject.</p>
7368
</li>
7469
<li>
75-
<p><a href="http://gexos.github.io/Hacking-Tools-Repository/">Hacking Tools Repository</a>
76-
is a great list of password cracking, scanning, sniffing and other security
77-
penetration testing tools.</p>
78-
</li>
79-
<li>
8070
<p><a href="https://hynek.me/talks/tls/">The Sorry State of SSL</a> details the
8171
history and evolution of SSL/TLS. There are important differences between
8272
the versions and Hynek explains why TLS should always be used. The
@@ -85,6 +75,37 @@ <h2>Security resources</h2>
8575
<a href="https://developer.rackspace.com/blog/the-not-so-sorry-state-of-ssl-in-python/">The not-so-sorry state of SSL in Python</a>.</p>
8676
</li>
8777
<li>
78+
<p><a href="http://blog.hartleybrody.com/https-certificates/">How HTTPS Secures Connections</a>
79+
is a guide for what HTTPS does and does not secure against.</p>
80+
</li>
81+
<li>
82+
<p><a href="http://erik.io/blog/2013/06/08/a-basic-guide-to-when-and-how-to-deploy-https/">When and How to Deploy HTTPS</a></p>
83+
</li>
84+
<li>
85+
<p><a href="http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html">The first few milliseconds of an HTTPS connection</a>
86+
provides a detailed look at the SSL handshake process that is implemented
87+
by browsers based on the <a href="http://tools.ietf.org/html/rfc2818">RFC 2818</a>
88+
specification.</p>
89+
</li>
90+
</ul>
91+
<h2>General security resources</h2>
92+
<ul>
93+
<li>
94+
<p>The Open Web Application Security Project (OWASP) has
95+
<a href="https://www.owasp.org/index.php/Cheat_Sheets">cheat sheets for security</a>
96+
topics.</p>
97+
</li>
98+
<li>
99+
<p>This page contains a
100+
<a href="http://dfir.org/?q=node/8/">fantastic currated list of security reading material</a>
101+
from beginning to advanced topics.</p>
102+
</li>
103+
<li>
104+
<p><a href="http://gexos.github.io/Hacking-Tools-Repository/">Hacking Tools Repository</a>
105+
is a great list of password cracking, scanning, sniffing and other security
106+
penetration testing tools.</p>
107+
</li>
108+
<li>
88109
<p><a href="http://www.andrewault.net/2010/05/17/securing-an-ubuntu-server/">Securing an Ubuntu Server</a></p>
89110
</li>
90111
<li>
@@ -94,9 +115,6 @@ <h2>Security resources</h2>
94115
<p><a href="http://httpd.apache.org/docs/current/misc/security_tips.html">Security Tips from Apache</a></p>
95116
</li>
96117
<li>
97-
<p><a href="http://erik.io/blog/2013/06/08/a-basic-guide-to-when-and-how-to-deploy-https/">When and How to Deploy HTTPS</a></p>
98-
</li>
99-
<li>
100118
<p><a href="http://spenserj.com/blog/2013/07/15/securing-a-linux-server/">Securing a Linux Server</a></p>
101119
</li>
102120
<li>
@@ -108,23 +126,10 @@ <h2>Security resources</h2>
108126
<p><a href="http://arstechnica.com/security/2013/02/securing-your-website-a-tough-job-but-someones-got-to-do-it/">Securing Your Website</a></p>
109127
</li>
110128
<li>
111-
<p><a href="http://blog.hartleybrody.com/https-certificates/">How HTTPS Secures Connections: What Every Web Dev Should Know</a></p>
112-
</li>
113-
<li>
114-
<p><a href="http://blog.hartleybrody.com/https-certificates/">How HTTPS Secures Connections</a>
115-
is a guide for what HTTPS does and does not secure against.</p>
116-
</li>
117-
<li>
118129
<p><a href="https://www.crypto101.io/">Crypto 101</a> is an introductory course on
119130
cryptography for programmers.</p>
120131
</li>
121132
<li>
122-
<p><a href="http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html">The first few milliseconds of an HTTPS connection</a>
123-
provides a detailed look at the SSL handshake process that is implemented
124-
by browsers based on the <a href="http://tools.ietf.org/html/rfc2818">RFC 2818</a>
125-
specification.</p>
126-
</li>
127-
<li>
128133
<p><a href="http://getprismatic.com/story/1409447605839">An in-depth analysis of SSH attacks on Amazon EC2</a>
129134
shows how important it is to secure your web servers, especially when they are
130135
hosted in IP address ranges that are commonly scanned by malicious actors.</p>

0 commit comments

Comments
 (0)