Publisher No Starch Press touts Justin Seitz's new book Gray Hat Python as “the first Python book written for security analysts”. Subtitled “Python Programming for Hackers and Reverse Engineers”, the book explains the intricacies of using Python to assist in security analysis tasks, teaching readers how to design debuggers, create powerful fuzzers, utilize open-source libraries to automate tedious tasks, interface with security tools and more. Gray Hat Python, says No Starch, covers everything from the nuts and bolts of how to use the language for basic code and DLL injection to using Python to analyze binaries and disassemble software. More than anything, however, the book reveals how superior the Python language is when it comes to hacking, reverse engineering, malware analysis and software testing.
The gist behind Black Duck Software's new Black Duck Suite is to give development organizations a comprehensive management platform for taking advantage of open-source components while addressing the associated management, compliance and security challenges. Black Duck says that its new product brings “new levels of automation and efficiency” to these tasks and “enables developers to focus on creating innovative business value instead of 're-inventing the wheel'”. Black Duck Suite is a unified framework of the company's Code Center, Export and Protex enterprise products, plus SDK with Web services API that integrates with other tools and environments. Key product features include a searchable internal catalog, a customizable approval work flow and a comprehensive KnowledgeBase of open-source information.
Rounding out the trio of memorable color + object company names is BlueStripe Software, which recently released version 2.0 of FactFinder, an application for staging, deploying and managing business-critical applications. Now available for Red Hat Enterprise Linux, FactFinder enables “unsurpassed intelligence into the performance and behavior” of applications, allowing users to understand their structure and relationship to each other, efficiently manage them, identify performance issues and perform triage to resolve issues. Key new features include automatic discovery and mapping, health and performance measurement and service-level driven triage.
Please send information about releases of Linux-related products to email@example.com or New Products c/o Linux Journal, PO Box 980985, Houston, TX 77098. Submissions are edited for length and content.
James Gray is Products Editor for Linux Journal.
|Bitcoin on Amazon! Sort of...||Sep 28, 2016|
|Free Today: September Issue of Linux Journal (Retail value: $5.99)||Sep 27, 2016|
|nginx||Sep 27, 2016|
|Epiq Solutions' Sidekiq M.2||Sep 26, 2016|
|Nativ Disc||Sep 23, 2016|
|Android Browser Security--What You Haven't Been Told||Sep 22, 2016|
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Bitcoin on Amazon! Sort of...
- Android Browser Security--What You Haven't Been Told
- Epiq Solutions' Sidekiq M.2
- Nativ Disc
- Identity: Our Last Stand
- The Many Paths to a Solution
- Securing the Programmer
- Tech Tip: Really Simple HTTP Server with Python
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide