Publisher No Starch Press touts Justin Seitz's new book Gray Hat Python as “the first Python book written for security analysts”. Subtitled “Python Programming for Hackers and Reverse Engineers”, the book explains the intricacies of using Python to assist in security analysis tasks, teaching readers how to design debuggers, create powerful fuzzers, utilize open-source libraries to automate tedious tasks, interface with security tools and more. Gray Hat Python, says No Starch, covers everything from the nuts and bolts of how to use the language for basic code and DLL injection to using Python to analyze binaries and disassemble software. More than anything, however, the book reveals how superior the Python language is when it comes to hacking, reverse engineering, malware analysis and software testing.
The gist behind Black Duck Software's new Black Duck Suite is to give development organizations a comprehensive management platform for taking advantage of open-source components while addressing the associated management, compliance and security challenges. Black Duck says that its new product brings “new levels of automation and efficiency” to these tasks and “enables developers to focus on creating innovative business value instead of 're-inventing the wheel'”. Black Duck Suite is a unified framework of the company's Code Center, Export and Protex enterprise products, plus SDK with Web services API that integrates with other tools and environments. Key product features include a searchable internal catalog, a customizable approval work flow and a comprehensive KnowledgeBase of open-source information.
Rounding out the trio of memorable color + object company names is BlueStripe Software, which recently released version 2.0 of FactFinder, an application for staging, deploying and managing business-critical applications. Now available for Red Hat Enterprise Linux, FactFinder enables “unsurpassed intelligence into the performance and behavior” of applications, allowing users to understand their structure and relationship to each other, efficiently manage them, identify performance issues and perform triage to resolve issues. Key new features include automatic discovery and mapping, health and performance measurement and service-level driven triage.
Please send information about releases of Linux-related products to email@example.com or New Products c/o Linux Journal, PO Box 980985, Houston, TX 77098. Submissions are edited for length and content.
James Gray is Products Editor for Linux Journal
|diff -u: What's New in Kernel Development||Sep 04, 2015|
|Android Candy: Copay—the Next-Generation Bitcoin Wallet||Sep 03, 2015|
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
- diff -u: What's New in Kernel Development
- Using tshark to Watch and Inspect Network Traffic
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- The True Internet of Things
- Android Candy: Copay—the Next-Generation Bitcoin Wallet
- September 2015 Issue of Linux Journal: HOW-TOs
- Firefox Security Exploit Targets Linux Users and Web Developers
- Concerning Containers' Connections: on Docker Networking
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects