• LOGIN
    • No products in the cart.

Login

Retrieve Password
Back to login/register

April 2014

30

Apr'14

AusCert 2014 Trusting Security

Dear Readers, We would like to advice you the conference AusCERT 2014 Trusting Security.     About the conference In …

Read More

30

Apr'14

Ingenious Things with Kali Linux

Ingenious Things with Kali Linux by Raheel Ahmad Backtracking Kali Linux will end up in the last release of Backtrack …

Read More

29

Apr'14

HackMiami Hackers Conference

Dear Readers, We would like to advice you the HackMiami Hackers Conference.      The HackMiami 2014 Hackers Conference seeks …

Read More

29

Apr'14

Interview with Care Direct SA Greece

Dear Readers, We want to introduce you the interview with Andreas Venieris- IT Director of Care Direct SA – a …

Read More

29

Apr'14

Using Social Media Threats for benefits

Dear Readers, New article connected with the issue Social Media- “Using Social Media Threats for benefits” Enjoy reading! Author: Gokula …

Read More

28

Apr'14

Logic Breaks Logic

The Logic Breaks Logic by Raheel Ahmad People – Process – Technology, your Internet industry is based on these three …

Read More

28

Apr'14

Reversing Cracking

Reversing Cracking by Andreas Venieris Everything published in this article is just for educational purposes and for “white” knowledge, that …

Read More

28

Apr'14

Cloud for dummies

Dear Readers, We want to introduce you new article “Cloud for Dummies” Enjoy reading! Author: Antonio Ierano “Cloud for dummies” …

Read More

24

Apr'14

Knowing the Heartbleed Bug

Knowing the Heartbleed Bug by Mirko Raimondi The Secure Sockets Layer (SSL) is a protocol described in RFC 6101, it’s …

Read More

23

Apr'14

CryptoLocker Ransomware: The Crime That Can Be Prevented

CryptoLocker Ransomware: The Crime That Can Be Prevented by Dr. Rebecca Wynn This week I received notification from a legal …

Read More