List of references for Volume I - Hackers Exposed!

Welcome and Introduction to the Instructor!
Nathan’s Twitter #GotoNathan
https://twitter.com/gotonathan
Nathan’s Cyber Security Blog
https://www.stationx.net/nathan-house/

Why You Need Security – The Value Of A Hack
Norse threat map

Krebs on Security

Krebs on Security

Security Bugs and Vulnerabilities - The Vulnerability Landscape
Exploit pack updates

CVE details
https://www.cvedetails.com/

Malware, viruses, rootkits and RATs
Malware stats

7 most common RATs

The state of Ransomware in 2015

Chef Jamie Oliver’s hacked for the third time

Norse threat map

Spyware, Adware, Scareware, PUPs & Browser hijacking
7Millions of computers may be compromised by US spyware
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/11416985/Millions-of-computers-may-be-compromised-by-US-spyware-Reports:.html
Lenovo Superfish Scandal
http://www.slate.com/articles/technology/bitwise/2015/02/lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html
IT threat evolution in Q3 2015
https://securelist.com/analysis/quarterly-malware-_Reports:_s/72493/it-threat-evolution-in-q3-2015/
McAfee Labs Threats Reports: February 2015
http://www.mcafee.com/us/resources/_Reports:_s/rp-quarterly-threat-q4-2014.pdf

What is Phishing, Vishing and SMShing
Live phishing links
https://www.openphish.com/
XSS example vulnerability
https://www.stationx.net/gossamer-threads-links-sql-login-xss-vulnerability/
Homograph attack using internationalized domain name

Spamming & Doxing
Spam stats

Spam stats
http://www.consumerfraud_Reports:_ing.org/spamexamples/OnlinePharmacy-spamexample.php

Social engineering - Scams, cons, tricks and fraud
Top 10 scams
http://www.consumerfraud_Reports:_ing.org/current_top_10_scam_list.php
Consumer Fraud _Reports:_ing
http://www.consumerfraud_Reports:_ing.org/
Types of Fraud
http://www.actionfraud.police.uk/types_of_fraud

Governments, spies and secret stuff part II
NSA Playset

NSA ANT Catalog
https://nsa.gov1.info/dni/nsa-ant-catalog/
NSA Codenames
https://cryptome.org/2014/01/nsa-codenames.htm
Through a PRISM, Darkly - Everything we know about NSA spying [30c3]

Regulating encryption, mandating insecurity & legalizing spying

UK data communications bill

WhatsApp was Banned for 48 Hours in Brazil

How India Regulates Encryption
http://cis-india.org/internet-governance/blog/how-india-regulates-encryption
Kazakhstans new encryption law

Clipper chip

NSA Admits It Collects Too MUCH Info to Stop Terror Attacks
http://www.washingtonsblog.com/2015/05/nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html
Matt Blaze Speaking to a US congressional committee

Reports:
Keys Under Doormats: Mandating insecurity by requiring government access to all data and communication

The Case against Regulating Encryption Technology

A Worldwide Survey of Encryption Products

A Worldwide Survey of Encryption Products
https://www.schneier.com/academic/paperfiles/worldwide-encryption-product-survey-data.xls
Encryption Technology and Possible US Policy Responses
http://www.crypto.com/papers/governmentreform-blaze2015.pdf

Trust & Backdoors
Formal methods

Examples of backdoors
https://www.gnu.org/proprietary/proprietary-back-doors.en.html
Apple removes malware infected apps from the app store

Apple backdoor order

On the Juniper backdoor

Reproducible builds
https://reproducible-builds.org/
Deterministic Builds Part One: Cyberwar and Global Compromise
https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise
How to make your software build reproducibly

Censorship
Google Censorship Ruling in Canada Has Worldwide Implications

European privacy requests for search removals
https://www.google.com/transparency_Reports:/removals/europeprivacy/?hl=en
Government requests to remove content
https://www.google.com/transparency_Reports:
/removals/government/?hl=en

Security News and Alerts – Stay Informed
Security News and Alerts
https://www.stationx.net/research/security-alerts/

Hash Functions
Example hashes
https://defuse.ca/truecrypt-7.1a-hashes.htm

Digital Signatures
Symantec Code Signing Certificates
https://www.symantec.com/en/uk/code-signing/
Microsoft’s Device Guard locks down Windows 10 so it can only run trusted apps

Secure Sockets Layer (SSL) and Transport layer security (TLS)
Wikipedia Transport Layer Security (TLS) page

Mozilla Cipher Suite Recommendations
https://wiki.mozilla.org/Security/Server_Side_TLS
Weakdh Cipher Suite Recommendations
https://weakdh.org/sysadmin.html
Steve Gibson’s Cipher Suite Recommendations
https://www.grc.com/miscfiles/SChannel_Cipher_Suites.txt

SSL Stripping
Intro to Sniffers
http://www.irongeek.com/i.php?page=security/AQuickIntrotoSniffers
Software
SSL Strip tool By Moxie Marlinspike
https://moxie.org/software/sslstrip/
Cain & Abel
http://www.oxid.it/cain.html
Arpwatch Tool to Monitor Ethernet Activity in Linux

sniffdet - Remote Sniffer Detection Tool/Library
http://sniffdet.sourceforge.net/
WIFI Pineapple

HTTPS (HTTP Secure)

Server Name Indication (SNI) Wiki

Certificate Authorities and HTTPS
CA Ecosystem
https://notary.icsi.berkeley.edu/trust-tree/
CA example mistake

Cert Fingerprints
https://www.grc.com/fingerprints.htm
SSL Sniff
https://moxie.org/software/sslsniff/
Certificate patrol
https://addons.mozilla.org/en-GB/firefox/addon/certificate-patrol/

Steganography
List of Steg Tools
http://www.jjtc.com/Steganography/tools.html
spammimic
http://www.spammimic.com
OpenPuff
https://embeddedsw.net/OpenPuff_Steganography_Home.html
OpenPuff Manual

How Security and Encryption is Really Attacked
Security Pitfalls
https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html

Introduction to Setting up a Testing Environment Using Virtual Machines
Comparison of platform virtualization software

Hypervisor

Vmware Virtual Appliance Marketplace
https://solutionexchange.vmware.com/store/category_groups/19
How to attach/configure image with VirtualBox?
http://www.osboxes.org/guide/#!
Virtual Machine - IT Community
http://virtual-machine.org/
Vmware Network Adapter Settings
https://pubs.vmware.com/workstation-9/index.jsp?topic=%2Fcom.vmware.ws.using.doc%2FGUID-D9B0A52D-38A2-45D7-A9EB-987ACE77F93C.html
Virtualbox Network Adapter Settings
https://www.virtualbox.org/manual/ch06.html
VMware Images
http://www.osboxes.org/vmware-images/
VirtualBox Images
http://www.osboxes.org/virtualbox-images/
VirtualBoxes – Free VirtualBox® Images
http://virtualboxes.org/images/
Windows VMs here
https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/

Vmware
VMware Workstation Player
http://www.vmware.com/products/player/faqs/faqs.html
Workstation Player or Workstation Pro - Choose the Right Version for You
http://www.vmware.com/products/workstation/compare.html

Virtual box
VirtualBox
https://www.virtualbox.org/

Kali Linux
Kali Linux
http://www.osboxes.org/kali-linux/
Vmware and virtualbox Kali 2016 official images (Use as preferance)
https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/
Kali 2016 official ISO images
https://www.kali.org/downloads/

Security Bugs and Vulnerabilities
Top 50 products vs security bugs
https://www.cvedetails.com/top-50-products.php?year=0
Reports:
Buying Into the Bias: Why Vulnerability Statistics Suck
https://media.blackhat.com/us-13/US-13-Martin-Buying-Into-The-Bias-Why-Vulnerability-Statistics-Suck-WP.pdf

Usage Share
OS usage share
https://en.m.wikipedia.org/wiki/Usage_share_of_operating_systems

Windows 10 - Privacy & Tracking
Cortana privacy faq
https://privacy.microsoft.com/en-US/windows-10-cortana-and-privacy
Microsoft Privacy Statement
https://privacy.microsoft.com/en-us/privacystatement/
Microsoft Service Agreement
https://www.microsoft.com/en-gb/servicesagreement/default.aspx
With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy: A Deep Dive
https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive

Windows 10 - Disable tracking automatically
DisableWinTracking
https://github.com/10se1ucgo/DisableWinTracking/releases

Windows 10 - Tool : Disable Windows 10 Tracking
DisableWinTracking
https://github.com/10se1ucgo/DisableWinTracking/releases

Windows 10 – Cortana
Cortana privacy faq
https://privacy.microsoft.com/en-US/windows-10-cortana-and-privacy
How to Disable Cortana in Windows 10’s Anniversary Update
http://www.howtogeek.com/265027/how-to-disable-cortana-in-windows-10/
How to Disable Cortana on Windows 10
https://gadgets.ndtv.com/laptops/features/how-to-disable-cortana-on-windows-10-1683223

Windows 10 – Privacy Settings
SmartScreen Filter: FAQ
https://support.microsoft.com/en-us/help/17443/windows-internet-explorer-smartscreen-filter-faq#ie=ie-11
Complete guide windows 10 privacy settings
https://www.makeuseof.com/tag/complete-guide-windows-10-privacy-settings/

**Windows 10 - WiFi Sense
Wi-Fi Sense in Windows 10 Insider Preview Build 14342
https://blogs.windows.com/windowsexperience/2016/05/10/announcing-windows-10-insider-preview-build-14342/#31Zq2yELkheC9HyV.99

Windows 7, 8 and 8.1 - Privacy & Tracking
Microsoft - How to manage Windows 10 notification and upgrade options
https://support.microsoft.com/en-us/kb/3080351
How to block Windows 10 upgrades on your business network (and at home, too)
http://www.zdnet.com/article/how-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too/
Software
GWX Control Panel
http://ultimateoutsider.com/downloads/
Never 10 by Steve Gibson (Use this!)
https://www.grc.com/never10.htm

Mac OS X - Privacy & Tracking
Fix Mac OS X
https://fix-macosx.com/
macOS-home-call-drop
https://github.com/karek314/macOS-home-call-drop
Yosemite Phone Home?
https://github.com/fix-macosx/yosemite-phone-home
Net-monitor
https://github.com/fix-macosx/net-monitor
The Washington Post - How Apples OS X Yosemite tracks you
https://www.washingtonpost.com/posttv/business/technology/how-apples-os-x-yosemite-tracks-you/2014/10/22/66df4386-59f1-11e4-9d6c-756a229d8b18_video.html

Linux and Unix “like” Operating systems
DistroWatch
http://distrowatch.com/
Debian
https://www.debian.org/
OpenBSD
https://www.openbsd.org/
ArchLinux
https://www.archlinux.org/

** General Use Operating Systems (Windows, MacOS and Linux)**
Manjaro
https://manjaro.org/
Ubuntu
https://www.ubuntu.com/
Linux Mint
https://linuxmint.com/

** General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)**
Debian
https://www.debian.org/
Archlinux
https://www.archlinux.org/
OpenBSD
https://www.openbsd.org/

** Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)**
Qubes OS
https://www.qubes-os.org/
Subgraph OS
https://subgraph.com/sgos/
Trisquel OS
https://trisquel.info/
Hardened Gentoo Linux
https://wiki.gentoo.org/wiki/Project:Hardened
PureOS
https://www.pureos.net/
Astra Linux
http://astralinux.ru/
Security-Enhanced Linux (SELinux)
https://github.com/SELinuxProject

** Anonymity Focused Operating Systems (Tails and Whonix OS)**
Tails OS
https://tails.boum.org/
Whonix
https://www.whonix.org/
Qubes OS
https://www.qubes-os.org/

** Penetration Testing and Ethical Hacking Focused Operating Systems**
Kali Linux
https://www.kali.org/
Parrot GNU/Linux
https://www.parrotsec.org/
BlackArch Linux
https://blackarch.org/
BackBox Linux
https://backbox.org/
Pentoo
https://www.pentoo.ch/

** Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)**
Android
https://www.android.com/
iOS
https://developer.apple.com/ios/
LineageOS
https://lineageos.org/
Replicant
https://www.replicant.us/
OmniROM
https://www.omnirom.org/
MicroG
https://microg.org/
PureOS Librem 5
https://puri.sm/shop/librem-5/

** Linux - Debian 8 Jessie - Virtual box guest additions Issue**
Debian Live CD/DVD
https://www.debian.org/CD/live/
Download Debian
https://www.debian.org/CD/live/
Free Debian Books and Guides
https://www.debian.org/doc/books

Windows - Criticality and Patch Tuesday
Microsoft Security Bulletins
https://technet.microsoft.com/en-us/security/bulletin/dn602597.aspx
Common Vulnerabilities and Exposures
http://www.cve.mitre.org/
National vulnerability database
https://nvd.nist.gov/
Windows 10 Ditches Patch Tuesday for Security’s Sake
http://uk.pcmag.com/operating-systems-and-platforms/41681/feature/windows-10-ditches-patch-tuesday-for-securitys-sake
Patch Tuesday may be dead, but Microsoft’s not confessing to the crime
http://www.computerworld.com/article/2920181/microsoft-windows/patch-tuesday-may-be-dead-but-microsofts-not-confessing-to-the-crime.html

Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
Flexera Personal Software Inspector - Previously Secunia PSI
http://www.flexerasoftware.com/enterprise/products/software-vulnerability-management/personal-software-inspector/

Linux - Debian – Patching
Debian Security Page
https://www.debian.org/security/
Automatic Security Updates
https://help.ubuntu.com/community/AutomaticSecurityUpdates
Software distributions based on Debian
https://www.debian.org/misc/children-distros

Mac OS X – Patching
Apple security updates
https://support.apple.com/en-us/HT201222
igeekblogs - How to enable updates
https://www.igeeksblog.com/how-to-enable-or-disable-mac-os-x-auto-updates/
Mac Update
https://www.macupdate.com/
Homebrew - The missing package manager for macOS

Information Disclosure and Identity Strategies for Social Media
Facebook terms and conditions: why you don’t own your online life
http://www.telegraph.co.uk/technology/social-media/9780565/Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html
Terms of Service Didn’t Read

Welcome to diaspora* The online social world where you are in control
https://diasporafoundation.org/
The Friendica Project is a decentralised social platforms and technology for the coming post-Facebook world.
http://friendica.com/
Federated social web servers
https://gnu.io/social/try/
The complete guide to facebook privacy settings
http://www.techlicious.com/tip/complete-guide-to-facebook-privacy-settings/
Twitter Privacy Settings
http://www.fightcyberstalking.org/privacy-settings-twitter/
List of Personally Identifiable Information (PII)
https://www.stationx.net/list-of-personally-identifiable-information-pii/
Reports:
Who Has Your Back? 2015: Protecting Your Data From Government Requests
https://www.eff.org/who-has-your-back-government-data-requests-2015

Identify Verification and Registration
ow to Get Email Headers
https://mxtoolbox.com/Public/Content/EmailHeaders/
BugMeNot: find and share logins
http://bugmenot.com/
Mailinator is Free, Public, Email system
https://mailinator.com/
Guerrilla Mail - Disposable Temporary E-Mail Address
https://www.guerrillamail.com/
Anonymous email service
http://www.mytrashmail.com/
Free, receive only, temporary, throwaway, e-mail accounts.
http://www.tempinbox.com
Disposable email service
https://www.trash-mail.com/en/
Disposable random email address
http://www.dispostable.com/
Free, completely anonymous one-time email address
https://anonbox.net/
Disposable Temporary E-Mail Address
http://freemail.ms/
Temporary mail address
http://10minutemail.com/10MinuteMail/index.html
Free temporary email service
http://getairmail.com/
Disposable mailbox
http://dontmail.net/
Temporary e-mail without registering
http://www.migmail.net/
Example SMS recieve online site
http://www.receive-sms-online.info/
Top 10 sites receive sms online without phone
https://www.raymond.cc/blog/top-10-sites-receive-sms-online-without-phone/

Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
Reputation Checker Tool
http://www.urlvoid.com/

Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
External parsing tool for emails
https://www.parsemail.org/
Whois Record for Blob.com
https://whois.domaintools.com/blob.com
Whois Record for BBC.co.uk
https://whois.domaintools.com/bbc.co.uk
Upload files via email and receive the scan results in your mailbox
https://www.virustotal.com/en/documentation/email-submissions/

Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
How to Freeze or Block Access to Your Credit!
http://www.consumerfraud_Reports:_ing.org/credit_freeze_summary.php
National Fraud and Cyber Crime _Reports:_ing Centre
http://www.actionfraud.police.uk/types_of_fraud
Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?
http://www.scambusters.org/

Physical and Hardware: Isolation - How to change the Mac Address
Linux - How to use macchanger
https://linuxconfig.org/change-mac-address-with-macchanger-linux-command
Mac OS X - How to change the mac address
http://www.howtogeek.com/220462/how-to-find-and-change-your-mac-address-on-os-x/
Diagram
Diagram of Mac
https://upload.wikimedia.org/wikipedia/commons/9/94/MAC-48_Address.svg
Windows - Tmac
https://technitium.com/tmac/
Mac OS X - Macdaddyx
https://www.macupdate.com/app/mac/25729/macdaddyx
Mac OS X - Wifispoof
https://wifispoof.com/

Physical and Hardware: Isolation - Hardware: Serials
Windows - CPU Z
http://www.cpuid.com/softwares/cpu-z.html
Linux - i-nex
https://launchpad.net/i-nex
Mac OS X - Mac Cupid
https://software.intel.com/en-us/articles/download-maccpuid
Windows - dmidecode
http://gnuwin32.sourceforge.net/packages/dmidecode.htm
Linux and Mac OS X - dmidecode
http://www.nongnu.org/dmidecode/
Mac OS X - Installing dmidecode with brew
http://cavaliercoder.com/blog/dmidecode-for-apple-osx.html
Secure your digital life whit physical USB key.

USB authentication key
https://www.yubico.com/

Virtual Isolation
Portable Apps
http://portableapps.com/
Pen Drive Apps
http://www.pendriveapps.com/
Authentic8
https://www.authentic8.com/overview/
Maxthon
http://www.maxthon.com/
Spikes
https://cyberinc.com/
Spoons.net
https://turbo.net/browsers
Aegis Secure Key - USB 2.0 Flash Drive
https://www.apricorn.com/aegis-secure-key.html

Dual Boot
Dual Booting explained
http://www.howtogeek.com/187789/dual-booting-explained-how-you-can-have-multiple-operating-systems-on-your-computer/

Built-in Sandboxes and Application Isolation
Chromium sandbox design
https://www.chromium.org/developers/design-documents/sandbox
Mozilla Sandbox design
https://wiki.mozilla.org/Security/Sandbox

Windows - Sandboxes and Application Isolation
BufferZone
http://bufferzonesecurity.com/product/how-it-works/
Shadowdefender
http://www.shadowdefender.com/
Deepfreeze Standard
http://www.faronics.com/en-uk/products/deep-freeze/standard/
Deepfreeze Cloud Browser and Desktop
http://www.faronics.com/en-uk/deep-freeze-cloud-browser-and-desktop/
Comodo
https://help.comodo.com/topic-72-1-451-4739-.html
f-sandbox
https://www.avast.com/f-sandbox

Windows - Sandboxes and Application Isolation – Sandboxie
Introduction and quick guide sandboxie
http://www.techsupportalert.com/content/introduction-and-quick-guide-sandboxie.htm
Sandboxie guide
http://www.jimopi.net/PDFs/Word%20Pro%20-%20Sandboxie.pdf
Sandboxie forum
http://forums.sandboxie.com/phpBB3/
Sandboxie How it Works
http://www.sandboxie.com/index.php?HowItWorks

Linux - Sandboxes and Application Isolation
Apparmor
http://wiki.apparmor.net/index.php/Main_Page
Script Sandfox
https://igurublog.wordpress.com/downloads/script-sandfox/
Linux Sandbox
https://linux.die.net/man/8/sandbox
Firejail
https://firejail.wordpress.com/
Trusted BSD
http://www.trustedbsd.org/

Mac OS X - Sandboxes and Application Isolation
Mac OS X - App Sandbox
https://developer.apple.com/library/content/documentation/Security/Conceptual/AppSandboxDesignGuide/AboutAppSandbox/AboutAppSandbox.html
Sandbox Man page
https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man1/sandbox-exec.1.html
Apple Sandbox Guide
https://reverse.put.as/wp-content/uploads/2011/09/Apple-Sandbox-Guide-v1.0.pdf
How to run your applications in a mac os x sandbox to enhance security
https://paolozaino.wordpress.com/2015/08/04/how-to-run-your-applications-in-a-mac-os-x-sandbox-to-enhance-security/
OSX-Sandbox–Seatbelt–Profiles
https://github.com/s7ephen/OSX-Sandbox--Seatbelt--Profiles
Firefox profile
https://github.com/pansen/macos-sandbox-profiles/blob/master/firefox.sb
Buckle Up
https://github.com/hellais/Buckle-Up
SuperDuper
http://www.shirt-pocket.com/SuperDuper/SuperDuperDescription.html

Virtual Machines
Wikipedia - Hypervisor

Wikipedia - Kernel-based Virtual Machine
https://en.wikipedia.org/wiki/Kernel-based_Virtual_Machine
Wikipedia - Comparison of platform virtualization software

KVM
http://www.linux-kvm.org/page/Main_Page
Virt Manager
https://virt-manager.org/
KVM Debian Jessie
https://wiki.debian.org/KVM
OpenVZ
https://openvz.org/Main_Page
Turnkey Linux - Openvpn
https://www.turnkeylinux.org/openvpn

Virtual Machine Weaknesses
Venom
http://venom.crowdstrike.com/
Example VMware security bug
https://www.vmware.com/security/advisories/VMSA-2016-0001.html
A look at malware with VM detection
https://blog.malwarebytes.com/threat-analysis/2014/02/a-look-at-malware-with-virtual-machine-detection/
Timing channel
https://en.wikipedia.org/wiki/Timing_channel
Covert channel
https://en.wikipedia.org/wiki/Covert_channel
x86 virtualization
https://en.wikipedia.org/wiki/X86_virtualization
Exploiting dram rowhammer (Could be used on VMs in the future)
https://googleprojectzero.blogspot.rs/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
Cross-VM Side Channels and Their Use to Extract Private Keys
http://www.cs.unc.edu/~reiter/papers/2012/CCS.pdf

Virtual Machine Hardening
Convert VM to ISO
https://www.turnkeylinux.org/blog/convert-vm-iso

Whonix OS - Anonymous Operating system
Whonix and virtualbox
https://www.whonix.org/wiki/VirtualBox
Whonix Stream Isolation
https://www.whonix.org/wiki/Stream_Isolation
How to implement physical isolation
https://www.whonix.org/wiki/Dev/Build_Documentation/Physical_Isolation
Whonix Features
https://www.whonix.org/wiki/Features
Whonix VM snapshots
https://www.whonix.org/wiki/Security_Guide#VM_Snapshots
If setting up your own workstations - MUST READ
https://www.whonix.org/wiki/Other_Operating_Systems
Privacy and Anonymity OS
https://www.whonix.org/
ARM - Anonymizing relay monitor
https://www.torproject.org/projects/arm.html.en
Whonix Check
https://www.whonix.org/wiki/Whonixcheck

Whonix OS – Weaknesses
Whonix - Warnings
https://www.whonix.org/wiki/Warning
Whonix’s lack of an Amnesic feature
https://www.whonix.org/wiki/FAQ#Is_there_a_substitute_for_Whonix.27s_lack_of_an_Amnesic_feature_.2F_Live_CD.2FDVD.3F_Forensics.3F

Qubes OS
Disposable VMs (DispVMs)
https://www.qubes-os.org/doc/dispvm/
Qubes docs
https://www.qubes-os.org/doc/
Split GPG
https://www.qubes-os.org/doc/split-gpg/
Compatibility List (HCL)
https://www.qubes-os.org/hcl/
Qubes Download
https://www.qubes-os.org/downloads/
Debian template(s)
https://www.qubes-os.org/doc/templates/debian/
Windows templates
https://www.qubes-os.org/doc/windows-template-customization/
Whonix templates
https://www.qubes-os.org/doc/whonix/
Librem 13 laptop
https://www.crowdsupply.com/purism/librem-13
Video Tour of Qubes
https://www.qubes-os.org/tour/

Security Domains, Isolation and Compartmentalization
Partitioning my digital life into security domains
http://theinvisiblethings.blogspot.rs/2011/03/partitioning-my-digital-life-into.html

3 Likes

Don’t know if this has been mentioned yet but I went to the VmWare site, and found this item.

VMware Workspace ONE UEM - Getting Started Hands-on Lab