{"id":254,"date":"2005-04-12T00:13:28","date_gmt":"2005-04-12T05:13:28","guid":{"rendered":"https:\/\/www.suramya.com\/blog\/2005\/04\/12\/ethical-hackingcomputer-security-tutorials\/"},"modified":"2022-06-16T15:18:11","modified_gmt":"2022-06-16T09:48:11","slug":"ethical-hackingcomputer-security-tutorials","status":"publish","type":"post","link":"https:\/\/www.suramya.com\/blog\/2005\/04\/ethical-hackingcomputer-security-tutorials\/","title":{"rendered":"Ethical Hacking\/Computer Security Tutorial&#8217;s"},"content":{"rendered":"\n<p>Have a look at these sites especially the guides and tutorials. You can use their links to find other sites and so on.<\/p>\n<ul>\n<li><a href='http:\/\/www.antionline.com'>http:\/\/www.antionline.com<\/a>: Has excellent tutorials section in the forums.\n\t<\/li>\n<li><a href='http:\/\/www.hackthissite.org'>http:\/\/www.hackthissite.org<\/a>: Lots of challenges with tutorials and lectures\n\t<\/li>\n<li><a href='http:\/\/www.tgs-security.com'>http:\/\/www.tgs-security.com<\/a>: Has forums, tutorials, tools\n\t<\/li>\n<li><a href='http:\/\/securityfocus.com\/library'>http:\/\/securityfocus.com\/library<\/a>: Has a lot of very good articles on how to secure computer systems\n\t<\/li>\n<li><a href='http:\/\/www.isecom.org\/osstmm\/'>Open Source Security Testing Methodology Manual<\/a>: It is is a peer-reviewed methodology for performing security tests and metrics.\n\t<\/li>\n<li><a href='http:\/\/www.security-forums.com\/forum\/index.php'>Security Forums<\/a>: Has really good discussions on security related topics.\n<\/li>\n<\/ul>\n<p>More to be added soon (As and when I go through my bookmark collection to find them)<\/p>\n<p>&#8211; Suramya<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have a look at these sites especially the guides and tutorials. You can use their links to find other sites and so on. http:\/\/www.antionline.com: Has excellent tutorials section in the forums. http:\/\/www.hackthissite.org: Lots of challenges with tutorials and lectures http:\/\/www.tgs-security.com: Has forums, tutorials, tools http:\/\/securityfocus.com\/library: Has a lot of very good articles on how to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"","activitypub_status":"","footnotes":""},"categories":[17,2],"tags":[],"class_list":["post-254","post","type-post","status-publish","format-standard","hentry","category-security-tutorials","category-techie-stuff"],"_links":{"self":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":1,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/254\/revisions"}],"predecessor-version":[{"id":5046,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/254\/revisions\/5046"}],"wp:attachment":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/media?parent=254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/categories?post=254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/tags?post=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}