mayfrost-guides

Unnamed repository; edit this file 'description' to name the repository.
Log | Files | Refs | README | LICENSE

commit 579ad2b249adcdf901c03204169d277edca94217
parent 472942bf12295ae41e794dd27ca0fc0f19624e55
Author: mayfrost <mayfrost@cock.li>
Date:   Sat, 14 Apr 2018 00:23:03 -0300

Update SECURITY.md
Diffstat:
MSECURITY.md | 4++--
1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/SECURITY.md b/SECURITY.md @@ -51,9 +51,9 @@ Not necessarily meant to be followed step by step, although it is recommended. S * __Level 35__: Use a command line browser like links2 to browse web pages. * __Level 36__: Use Bastille Linux to harden your system. * __Level 37__: Use Lynis to audit your system. -* __Level 38__: Use Arpalert/ArpON (for Man-In-The-Middle -MITM- Detection) and Suricata/Snort (for Network Intrusion Detection). +* __Level 38__: Use Arpalert/ArpON (for Man-In-The-Middle -MITM- Detection), [zapret](https://github.com/bol-van/zapret) (for Deep Packet Inspection -DPI- Block and Circumvention), and Suricata/Snort (for Network Intrusion Detection). * __Level 39__: Use a complete host intrusion detection framework like Tiger, which can work with Samhain (for integrity check), Unhide/Chkrootkit/rkhunter (for rootkit detection), ClamAV/Linux Malware Detect and a system logger like sysklogd. -* __Level 40__: Use RSBAC (for RBAC) with AppArmor (for filesystem ACL). +* __Level 40__: Use [RSBAC](https://www.rsbac.org/) (for RBAC) with AppArmor (for filesystem ACL). * __Level 41__: Compile the kernel yourself and add only necessary features and selected modules. Enable KASLR and Capabilities on kernel configuration. ### Start of deterrent measures