hack

9781597495745

Managed Code Rootkits

Managed Code Rootkits By Erez Metula Publisher: Syngress November 2010 U.S.,  December EMEA www.syngress.com Description Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code…

9781597496117

Review of Practical Lock Picking

Review of Practical Lock Picking A Physical Penetration Tester’s Training Guide By Michael Munty www.syngress.com   Some of you are likely to be thinking what does Lock Picking have to do with IT Security but you need to think from…

CryptoTutorials: Part 2

By Israel Torres, a hacker at large with interests in the hacking realm and an author of crypto challenge: http://hakin9.israeltorres.org   PART 2 Cryptography Fundamentals: You can’t hide what isn’t there As previously discussed in part 1 of this series…

logo2_escala_bigger

Iniqua.com – Blog Designed as a Meeting Place for Security Enthusiasts

Iniqua.com born time ago, a small blog designed as a meeting place for a group of security enthusiast. At that time we composed the Hacking team Telefonica R & D. Now only part of the blog contributors are in the group. Iniqua.com information related to security in different protocols like DNS and IPv6.  In addition to treating some interesting news, and analyze tools. In the “Lab” section we publish small tools developed by group…

CryptoTutorials: Part 1

By Israel Torres, a hacker at large with interests in the hacking realm and an author of crypto challenge: http://hakin9.israeltorres.org CryptoTutorials is a new Hakin9 multi-part series focusing on the aspects cryptology, cryptography, cryptanalysis and steganography. Each short and easy…

web app obfuscation

Web Application Obfuscation

Web Application Obfuscation By Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay Publisher: Syngress December 2010 U.S.,  January 2011 EMEA www.syngress.com Description Web applications are used every day by millions of users, which is why they are one…

Mummies still walk among us!

Imagine all the great sources of information on the Internet today such as: news groups, blogs, websites and forums, and you still see networks, and websites being hacked and torn down using old hacking techniques. For God sake, isn’t that…

Web App Security

Web App Security 7/2011

Latest News From the IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Mummies still walk among us! By Ali Al-Shemery Imagine all the great sources of information on the Internet today such as: news groups, blogs, websites…

9781597496377

Cyber Warfare

Cyber Warfare By Jason Andress, Steve Winterfeld Publisher: Syngress June U.S. 2011,  July EMEA www.syngress.com Description Cyber Warfare explores the battlefields, participants and the tools and techniques used during today’s digital conflicts. The concepts discussed in this book will give…