+

Archive for / 'Articles'

August 25, 2011


Social Media

Twitter, Facebook, Gmail, LinkedIn, Skype, the list goes on and on and a majority of the one billion people that use these social net working sites consistently use them while at work. This unchecked flow of data is a new source of sensitive information and creates se curity loopholes for serious cyber attacks. From a […]

Read more

August 25, 2011


Secure Out-of-band Management of Critical Infrastructure at The Enterprise Branch Office

As the enterprise pushes into the cloud, it is important to remain mindful of the distributed IT and communications assets that ar fundamental to day-to-day operations. The widespread adoption of IaaS solutions to virtualize back office infrastructure has allevi ated some of the management and maintenance headaches as sociated with physical IT infrastructure, however it […]

Read more

August 17, 2011


Basic Forensics Analysis

Digital Forensics is mostly like the movies, the main aspect is to gather evidence or digital footprints which will help you understand any digital crimes that might have occurred inside your organization. This is used in most cases related to computer crimes. New crime vectors are now implicating the use of computers mostly. It is […]

Read more

August 17, 2011


Mobile Digital Forensics Cover Your ASSets (CYA)

Contrary to what we wish, mobile digital forensics is made easy because we as individual like to think that no one is ease dropping, shoulder surfing, watching us type in our passwords, taking out our SIM card and copying it while we are with the boss/in the bathroom/heating up lunch, etc. This article goal is […]

Read more

August 17, 2011


Are We Ready For Digital Evidence?

Are we ready for digital evidence? It’s a question that we need to ask more often as crimes will inevitably include forensic evidence gathered from a computer or other digital device on a more consistent basis. Similarly, we still live in a world where we think the computer and what we do on it or […]

Read more

August 17, 2011


Forensic Improvisation

Forensic Improvisation is the concept to capture important intelligence using the available tools at hand and not necessarily the desired toolset. Think of it as guerrilla forensics without the idea of warfare. There is a myriad of ready to burn LiveCD/DVD/USB forensic toolsets that suit the job nicely but that would require training, planning and […]

Read more

August 17, 2011


Ask The Social-Engineer: Neuro-Linguistic Hacking-The New Age of Social Engineering

Social engineering is nothing new. From some of the oldest stories recorded in mankind? history till today, social engineering has been used. The interesting part about social engineering is that the methods used have not changed much. Sure there is new technology and a deeper understanding of humans and psychology, but the underlining principles of […]

Read more

August 17, 2011


Best Practices in InfoSec Forensics – Proactively Preparing For and Executing Network Forensic Analysis

This article is meant to give you a quick overview of the best practices for Information Security (INFOSEC) forensics. To get started, let? first define this subject and then dig into the tools used in this field of computer and criminal justice sciences. by Gary S. Miliefsky Comments

Read more

August 5, 2011


BitCoin A Secure Coin

In this article we will know where bitcoins come from, their future, how to get them, what can we do with them, and most importantly, how to protect them. by David Montero SUBSCRIPTION FOR INDIVIDUAL SUBSCRIBERS Comments

Read more

August 5, 2011


BitCoin – how it works

BitCoins are a fascinating experiment in economics – a field that generally doesn’t have much room for real world experimentation. Whether it succeeds in the marketplace or not isn’t as important as the kinds of lessons that we can learn from it. by Jeremy Lichtman SUBSCRIPTION FOR INDIVIDUAL SUBSCRIBERS Comments

Read more

August 5, 2011


Mining – tutorial for rookies miners

One of the most desirable aspect of internet’s currency, Bitcoin, is the way it is produced. Very differently from most currencies, where the power and decision to make more money are held on the hands of central and commercial banks along with governmental interests, the bitcoin system has a very open and decentralized production where […]

Read more

August 5, 2011


How to secure Bitcoin

We can create a Flash Drive with Linux based operating system to keep our Bitcoin’s safe. To create that, we need a Flash Drive with a minimum capacity of 1GB(but I recommend a bigger one, for example 16GB, we must remember , in this system will download block content of approximately 300MB and block index […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa