+

Author Archive For / 'Redaction'

April 24, 2014

News Redaction Comments Off
hakin9_2013

Hakin9 Archive 2013

ARCHIVE 2013 Dear Readers, We prepared for our Subscribers Archive of 2013. Full content of 2013. Enjoy reading! Comments

Read more

April 24, 2014

News Redaction Comments Off
hakin9_2012

Hakin9 Archive 2012

ARCHIVE 2012 Dear Readers, We prepared for our Subscribers Archive of 2012. Full content of 2012. Enjoy reading! Comments

Read more

April 24, 2014

News Redaction Comments Off

Article: Introduction to REST

by Vindhya Nagaraj 1. REST Introduction The usage of Twitter, Amazon, Google Maps, e-bay and many other applications has become extensive. The ease of development and access of such applications is due to the implementation of a web service which is simple yet supports complex functionalities; called Representational State Transfer (REST). Before starting with REST […]

Read more

April 23, 2014

Articles News Redaction Comments Off
What is CryptoLocker?

CryptoLocker Ransomware: The crime that can be prevented

This week I received notification from a legal firm (after the fact) who had been infected with CryptoLocker Ransomware and all of their files where encrypted and held for ransom. Since they did not have backup shorter than a week their IT staff had recommend that they pay the ransom. They ended up having to […]

Read more

April 10, 2014

Free Articles Free Issues Redaction Comments Off
Hakin9 Starter Kit - Hacking Social Media - free article to download

Hakin9 Starter Kit – Hacking Social Media – free article to download

Take a look at the table of contents full issue and see what you will learn! 15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5 by Matias R. Iacobuzio This article aims to demonstrate fundamental Social Engineering principles and to present Social Engieneering Attacks techniques, such as Site Cloner. Social Engineering Toolkit […]

Read more

April 4, 2014

News Redaction Comments Off

Article: K0SASP – Hacking with OS X

by Ismael González D. K0sasp is an installation package for Mac OS X systems able to compile and let installed all those programs that are necessary for security audits and ethical hacking . Designed by and for hackers. Introduction Many of the people who use Mac OS X and are dedicated to the world of […]

Read more

April 4, 2014

News Redaction Comments Off

Hacking Social Media. Threats & Vulnerabilities- ” Threats & Anti-threats Strategies for Social Networking Websites”

Dear Readers, Below we present you the beta version of article “Threats & Anti-threats Strategies for Social Networking Websites” by Amir Roknifard. You will also find this article in Hakin9s’ issue devoted to :Starter Kit- Hacking Social Media. Threats & Vulnerabilities” that you can already pre-order “Threats & Anti-threats Strategies for Social Networking Websites” Author:Amir […]

Read more

April 4, 2014

News Redaction Comments Off

Article: Internal networks mapping using Scapy

by Temmar Abdessamad Abstract Scapy is a powerful interactive packet manipulation program which can be used to forge, send and sniff network packets. This capability allows construction of tools that can handle most classical tasks like scanning, tracerouting, probing or attacks. It can be a good an alternative of some tools like hping, arpspoof, arp-sk, […]

Read more

April 3, 2014

Events Redaction Comments Off
CIR_Logo_200x70

Cyber Incident Response

July 21 – 23, 2014 | Chicago, IL   IDGA’s Cyber Incident Response will be the ultimate setting for professionals across industries – finance, health, retail, government and more – to gather and examine the future of cyber security and disaster recovery. With speakers ranging from Chief Information Security Officers to Business Continuity Directors, CIR […]

Read more

April 2, 2014

News Redaction Comments Off

Where security begins… – basic tips from Hakin9

Recently I was interviewed by East-Tec Company. One of the questions they asked me concerned my own advice to people looking for data privacy and security. Since this issue generates a great deal of heated debate, I decided to list few basic tips for our Readers. Password – make it decent. Use both capital letters […]

Read more

April 1, 2014

Pre Order Redaction Comments Off
h9_17

Effective IT Security Team Building | PRE ORDER

Dear Readers, the topic of our incoming issue will be: IT career and team building. How to find the best employer? How to recognize the best IT team? Which skills are necessary? How to make your team work more effectively? You can find out the profile of your dream company and see if you are […]

Read more

April 1, 2014

News Redaction Comments Off

Effective IT Security Team Building

Dear Readers, We are starting a new project and the results of our work you will be visible in magazine! Effective IT Security Team Building. We want to include there the interviews with specialists from HR Departments in IT-Security Companies. Also, we will include the company’s profile and the profile of their dream employee, which […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa