+

Archive for / 'Articles'

June 6, 2013

Articles News admin Comments Off

Tool Time: Secunia Online Software Inspector (OSI)

Tool Time: Secunia Online Software Inspector (OSI) Mervyn Heng, CISSP – May 2013 The beauty of running Ubuntu Linux is the ease of maintaining your Operating System (OS) and software using the apt command or Update Manager. Both tools offer a single mechanism of keeping your system patched and up to date. The same cannot […]

Read more

May 22, 2013

Articles News admin Comments Off

eAudit – product innovation

The world technological progress causes changes in the form and ways of data transmission and storing. The importance of digital data carriers, which are capable of collecting great amounts of information in one place, is increasing. However, apart from many advantages of the common life digitization, some dangers, which have to be counteracted, arise. To […]

Read more

April 5, 2013

Articles News admin Comments Off

Interview with a Lawyer

Interview with a Lawyer – Paulina Sroka The continuous growth in the Internet importance causes the growth of problems connected with data and information security… Actually, as lawyers we can observe situations in which the matters connected with information security become subject of strife between corporations or private people. Do you consider this a kind […]

Read more


April 5, 2013

Articles Free Articles News reviews admin Comments Off

Overview of mobile platforms (March 2013)

This article describes hardware and software division on the mobile platform market. “Mobile platform” means mass handheld devices with an autonomous power source designated for solving a large variety of general tasks: entertainment, communications and business. This article does not examine personal desktop computers and their portable versions (notebooks/netbooks/etc.)

Read more


March 16, 2012


SecPoint’s Cloud Penetrator Review

SecPoint® Cloud Penetrator “Online vulnerability assessment scan” Waking up every morning a skeptic is not that difficult. By 10 AM there are usually two or three interactions that prove I was right. I was invited by Hakin9 to do an evaluation of a product called “SecPoint® Penetrator”, a service provided by SecPoint® of Copenhagen Denmark […]

Read more

August 25, 2011


The DDOS, a New „Old” Type of Attack!

In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers what the mainly motivations pushing hackers to commit criminals act with Botnets and DoS is. You will learn what the DDoS attack structure is and how […]

Read more

August 25, 2011


DDOS

When the future comes to your doorstep, you are not sure whether to invite it in or keep it out. And when the future comes crashing in, you are either overwhelmed and mostly feel powerless. This is how one feels when their website or online service crashes. Not sure if this was a spike in […]

Read more

August 25, 2011


Protecting Yourself Against DDOS Attacks

Discussions about denial of service revolve around networks. When someone mentions denial of service, it seems as though it’s common to envision a large flood of traffic of one sort or another. The problem is that there are a number of conditions that might cause a denial of service and not all of them are […]

Read more

August 25, 2011


DDoS Framework. Management of Targeted Attack – Interview with Amir Taaki and Patrick Strateman

The DDoS attacks are used to break the availability of resources and services. Therefore, they have a fundamental role from the perspective of the attackers. Its intrinsic nature of the potential success that possess, allows attackers to obtain a high impact on the infrastructure victim. by Jorge Mieres Comments

Read more

August 25, 2011


Terminating the Internet or DDOS Attacks as a Cyber War Tool

Internet defined as a „web between webs project” was initially a project of DARPA (American Defense Advanced Research Projects Agency) developed and was put in use in order to provide communication between it`s troops after a possible nuclear attack, later on started to be used at universities and subsequently by whole world, seems to be […]

Read more

August 25, 2011


Java Script Botnets – Implementation of Browser-based Malware and DDOS Attacks

Most of the botnets currently used by cybercriminals are imple mented in traditional languages such as C++. More recent example are written in Java, achieving some degree of portability but the basically share the same limitations. All these botnet creators fac the same problems, first they need to create a Command & Contro center, to […]

Read more

August 25, 2011


Security Vulnerabilities of IPv6 Tunnels

This article talks about novel security vulnerabilities of IPv6 tunnel – an important type of migration mechanisms from IPv4 to IPv6 im plemented by all major operating systems and routers. The vulner abilities allow an attacker to form routing loops which can easily pro duce DoS attacks. Gabi will describe the principles of the attack […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa