No Caveat Computer Security at NoCaveat.com  No Caveat Security

 ☰   [ NoCaveat.com ]  → Security Software

NoCaveat.com Software

Depending upon the project requirements, we typically "roll our own" stack of security software on both the client and the server. Although those product configurations are classified, they are based upon a broad mixture of both our own proprietary code, and open source software products that are freely available. This page is a quick overview of the security software tools we use on a daily basis.

Client Software: This stack of software runs on the desktop clients in your network. Because of security vulnerabilities, we do not allow any Microsoft products to connect to our network. We do allow Apple, products to connect, but in untrusted modes in special zones. Apple products are quite secure, but because all of their software is proprietary, we are unable to evaluate the source code for ourselves, and so therefore, we can't support or recommend them. The exception is, of course, all devices of any type are allowed to connect to our web, email, DNS, and similar public ports. Our inner network security perimeter is highly guarded. ;)

Preferred Client Software

Name

Link

Description

Fedora Linux - Workstation GetFedora.org

The Fedora version of Linux is very user-friendly and quite stable. It is our first choice for desktop operating systems. We prefer it over Ubuntu only because of the available "spins" of Fedora that allow users to install a pre-selected set of desktops and applications based on the usage of the workstation.

For example: KDE versus Gnome desktop, or various applications spins.

Ubuntu Linux - Desktop ubuntu.com/desktop The Ubuntu version of Linux is also a fine choice. There are dozens of other alternatives, but we prefer the Ubuntu version for many of our clients because of the commercial support availability, and we maintain our own secure desktop distribution built on top of it.
TOR torproject.org TOR or "The Onion Router" is an essential component for client security and helps provide privacy and anonymity while surfing the net. Whenever possible, web browsers should be replaced with TOR.
SSD at EFF ssd.eff.org

The Surveillance Self-Defense courses by the Electronic Frontier Foundation (EFF) are essential training for all users. Choose your situation, such as Student, Journalist, Activist, and it will walk you through the tools and knowledge you need to protect yourself.

Clever People CleverPeople.com A secure social networking site that is a replacement for Facebook and Twitter. The site is also mobile friendly and an Android application will be released soon.

 

Mobile Software: This stack of software runs on the mobile clients in your network. Those include devices such as cell phones, laptops, tablets, wearables, and automotive software applications.

Preferred Mobile Software

Name

Link

Description

Android OS android.com We use the open-source Android Operating System as the base for our mobile applications.
Guardian Project guardianproject.info The Guardian Project has several great security tools for mobile devices. We like all of them!
SSD at EFF ssd.eff.org The Surveillance Self-Defense courses by the Electronic Frontier Foundation (EFF) are essential training for all users. Choose your situation, such as Student, Journalist, Activist, and it will walk you through the tools and knowledge you need to protect yourself.
Clever People CleverPeople.com A secure social networking site that is a replacement for Facebook and Twitter. The site is mobile friendly and an Android application will be released soon.
Signal whispersystems.org For all secure voice and instant messaging, we prefer to use Signal by Open Whisper Systems.

 

Server Software: This stack of software runs on the servers in your network. Those include servers that provide web hosting, email, database, authentication, media streaming, and other business applications.

Preferred Server Software

Name

Link

Description

Ubuntu Linux ubuntu.com/server The Ubuntu version of Linux is our preferred platform for servers. There are dozens of other alternatives, but we prefer the Ubuntu version for many of our clients because of the commercial support availability, and we also maintain our own secure server distribution built on top of it.
Fedora Linux GetFedora.org The Fedora version of Linux is also a fine choice. It is very user-friendly and quite stable. It is our second choice for server operating systems, but any good distribution of Linux will suffice if properly configured.
Apache HTTPD httpd.apache.org Apache is the most ubiquitous web server, and one of the most scalable and secure when properly configured. It is our first choice as web server for the majority of our applications.
Postfix postfix.org Postfix is our first choice as an email server for SMTP services.
Dovecot dovecot.org Dovecot is our first choice as an email server for IMAPS services.
PHP 7 php.net PHP v7 is our first choice as a server-side programming language because of the speed, scalability, compatibility, and flexibility of the language.
TOR torproject.org TOR or "The Onion Router" is an essential component for client security and helps provide privacy and anonymity while surfing the net. All server web browsers should be replaced with TOR and whenever possible, private TOR Relay Nodes should be provided on the servers.
ownCloud owncloud.org For those who want to run their own private cloud, we find ownCloud with the encryption module enabled and properly configured to be a great open source option.
Dogtag pki.fedoraproject.org The Dogtag Certificate System is open source Certificate Authority software.
Tiger nongnu.org/tiger Used in conjunction with other tools, Tiger runs routine checks or audits on demand.
Snort snort.org For a Network Intrusion Detection System, Snort is a fine choice.
Tripwire tripwire.org The Tripwire system monitors your critical files for any changes in them.
RoughTime Google Code Adam Langley's solution to securing time servers.

 

Drone Software: This stack of software is used as the foundation for our  drone products. Those include security drones (perimeter sentinels and anti-drone drones), cinematic drones, hobby drones, and other drone software applications.

Preferred Drone Software

Name

Link

Description

Raspberry Pi raspberrypi.org We use the open-source Raspberry Pi as the base for our drone applications.
Beta Flight betaflight Flight Controller Firmware forked from Clean Flight
Clean Flight cleanflight.com Flight Controller Firmware
DRL DRL.io Drone Racing League

 

Developer Software: We have worked with anything from vi and notepad to the most complex Integrated Development Environments (IDE) and every developer usually has their own personal preferences. Here are some of our favorite tools for software development:

Preferred Developer Software

Name

Link

Description

NetBeans netbeans.org An open source Integrated Development Environment (IDE) that is free and allows you to write software in multiple programming languages. It is our first choice when it comes to IDEs for those reasons. We use NetBeans for the production of all of our software development tutorials and demonstrations.
Android Studio developer.android.com An Integrated Development Environment (IDE) that is free and allows you to write software for Android mobile devices, wearables, and automotive applications.
Material Design material.google.com The Material Design courses by Google should be part of every software engineering project.
Filezilla filezilla-project.org Many developers prefer the command line to do their SFTP, but for those who prefer using a GUI, we recommend Filezilla.
nmap nmap.org We use the nmap tool for network analysis.

For all of our How-To security tutorials, individual or group training, security assessments, incident response, and consulting information, please visit our Security Services page.