prevent

DefenseWall HIPS

Quick Start. Installing DefenseWall HIPS is a very simple and straightforward process. I did not experience any problems at all while installing and configuring…

Print Your Shell

In every company network, which is based on Microsoft Windows, there are printers connected to print servers that have been shared over the network…

N-Stalker

It doesn’t take much investigation to conclude that Web Applications are one of the fastest growing aspects of the new Web 2.0 internet. As…

A New Era for Buffer Overflow

This article describes a few modern techniques for buffer overflow exploitation. There are just as many ways to prevent BOF with defensive mechanisms as…

Analyzing Malware

This article is an introduction to analyzing malware. I will take you through the basic steps you need to perform in order to understand…

Emerging Threats Episode 14

Crime happens every day on this grand old Internet we call home. Daily, hourly, minute by minute. I’d venture that there are easily several…

HTTP Tunnel

Most of all companies only provide a very restrictive environment. While Network and Security Adminstrators do their job, securing the enterprise network from intruders,…

BPMTK

Security issues arise from the fact that a limited user has full control over his own processes on the Windows platform. Security mechanisms implemented…