+

Category: Articles

December 1, 2009

Articles Redaction No Comments

Cisco Routers with PPPOE Internet Connection

In this article will be discussed is how TCP MSS (Maximum Segment Size) and MTU (Maximum Transmission Unit) values are of significant importance. A little brief basics about both MSS and MTU that we should consider before implementing PPPOE based internet connections and why the default settings results in your application and internet performance degradation. […]

Read more

December 1, 2009

Articles Redaction No Comments

Evolution of Cisco

Today, Cisco is undoubtedly amongst the world leading providers in network solutions; developing new technologies to contribute towards spreading business beyond geographic boundaries, with diversified product lines for small office home office (also known as SOHO) to enterprise level. In this article, I will briefly outline the history of Cisco, and how it evolved from […]

Read more

December 1, 2009

Articles Redaction No Comments

Cisco Network Device Configuration Course

The information in this article is useful to anyone interested in acquiring basic knowledge of Cisco network device configuration. Author: GRZEGORZ GALEZOWSKI Source: Hakin9  https://hakin9.org   WHAT YOU WILL LEARN the fundamentals of computer networks how to configure Cisco network devices how to use basic Cisco IOS commands WHAT YOU SHOULD KNOW the basics of the MS […]

Read more

December 1, 2009

Articles Redaction No Comments

The Justification for Authentication and Encryption

You will need to understand how to configure and compile Postgres from source code as many of the solutions require that your Postgres server has the necessary libraries and capabilities installed that the typical Linux Distro may be lacking. Author: ROBERT BERNIER Source: Hakin9  https://hakin9.org WHAT YOU WILL LEARN… Confronting the DBA with an unauthorized person obtaining […]

Read more

December 1, 2009

Articles Redaction No Comments

Javascript Obfuscation Part 2

In the first part, we saw how to decode some basic malicious Javascript code, in this part we will introduce some techniques to quickly identify what a shellcode embedded in the Javascript code do and present you some advanced Javascript obfuscation tips used by attacker. Author: DAVID MACIEJAK Source: Hakin9  https://hakin9.org WHAT YOU WILL LEARN… How ActiveX […]

Read more

December 1, 2009

Articles Redaction No Comments

Javascript Obfuscation Part 1

It is common that attackers target victims web client or third party tools like Adobe Flash or Acrobat Reader. Web clients are targeted to exploit either a vulnerability in their code or exploit flaws in third party software that can be loaded through them like ActiveX technologies, script engine in Flash or PDF. Author: DAVID MACIEJAK […]

Read more

December 1, 2009

Articles Redaction No Comments

Oracle Database Server Security

This article is focused on Oracle Database Server Security. It is divided in three main parts. The First is about Oracle history, database products and architecture. The Second part is about basic methods of Oracle Hacking. The last part is about Oracle Defense methods. Author: MIKOLÁŠ PANSKÝ Source: https://hakin9.org WHAT YOU WILL LEARN… General information about Oracle […]

Read more

June 1, 2009

Articles Redaction No Comments

A Look at How the Mobile Phone Opens the Door to Location (LBS) Tracking, Proximity Marketing and Cybercrime

A Brief History of Mobile Time The very first public commercial mobile phone network was ARP network in Finland which was launched as far back as 1971. Then a few years later the first generation mobile cellular network was launched by Bell Labs in Chicago in 1978, with the second generation (2G) appearing in 1991 […]

Read more

June 1, 2009

Articles Redaction No Comments

Simple DLP Verification Using Network Grep

Today, companies have to worry about espionage and battling internal threat of confidential information being stolen or leaked. Author: JOSHUA MORIN Source: Hakin9 6/2009 https://hakin9.org WHAT YOU WILL LEARN… An accessible method of checking any possibility of data loss using a ordinary tool for risk minimization. WHAT SHOULD YOU KNOW… You should have a general understanding of grep […]

Read more

June 1, 2009

Articles Redaction No Comments

Recovering Debugging Symbols From Stripped Static Compiled Binaries

I first started to look into symbol recovery to better solve various war-games with stripped binaries. However, this can be applied to various areas. Author: JUSTIN SUNWOO KIM Source: Hakin9 6/2009 https://hakin9.org Many malware have been stripped to prevent from analyzing them and the method described would enhance the process of debugging those malware and many other stripped […]

Read more

June 1, 2009

Articles Redaction No Comments

Anatomy of Malicious PDF Documents, Part 2

What tools do you need to analyze a malicious PDF document? You could use Acrobat, but then you run the risk of infecting your machine when opening the PDF document with Acrobat. Author: DIDIER STEVENS Source: Hakin9 6/2009 https://hakin9.org WHAT YOU WILL LEARN… Analyzing malicious PDF documents with custom tools WHAT SHOULD YOU KNOW… The structure of PDF […]

Read more

June 1, 2009

Articles Redaction No Comments

Windows Timeline Analysis, Building a Timeline, Part 2

The increase in sophistication of the Microsoft (MS) Windows family of operating systems (Windows 2000, XP, 2003, Vista, 2008, and Windows 7) as well as that of cybercrime has long required a corresponding increase or upgrade in response and analysis techniques. Author: HARLAN CARVEY Source: Hakin9 6/2009 https://hakin9.org WHAT YOU WILL LEARN… What sources of timeline data are […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa