+

Archive for / 'Articles'

April 29, 2011

Articles admin Comments Off

IPv6 Secure Transition Network Architecture

IPv6 has the capability to handle an astronomically large address space. IPv6 deployment, although, has been marginal and several less drastic solutions have been used to expand the address space of IPv4. The non-drastic solutions have reached the limit of what they are able to handle. The transition to IPv6 is imminent. [hidepost=1] [/hidepost] Comments

Read more

April 1, 2011

Articles admin Comments Off

Death Knell Sounds For Traditional Tokens ANDREW KEMSHALL

There is an often used phrase that the stars have aligned but, in 2011, it is the technology that has come together to hammer the final nail into the physical tokens’ coffin. The cynical among you would argue that this statement has been made before and yes, I concede that tokens have survived and are […]

Read more

April 1, 2011

Articles admin Comments Off

Why are Zero-Days Such a Big Deal? MATTHEW JONKMAN

Sounds like a stupid question at first. They’re a big deal because they’re vulnerabilities, and vulnerabilities are bad. Right? So why do we freak out about zero-days? Comments

Read more

April 1, 2011

Articles admin Comments Off

April 1, 2011

Articles admin Comments Off

Special report: My RSA Conference 2011 Trip Report GARY S. MILIEFSKY, FMDHS, CISSP®

Annual Trek to the Greatest INFOSEC Show on Earth. What’s New and Exciting Under the Big Top of Network Security. Comments

Read more

April 1, 2011

Articles admin Comments Off

Defending Cell Phones and PDA’s GARY S. MILIEFSKY, FMDHS, CISSP®

We’re at the very early stages of Cell Phone and PDA exploitation through ‘trusted’ application downloads, Bluetooth attacks and social engineering. With so many corporations allowing these devices on their networks or not knowing how to block their gaining access to corporate and government network resources, it’s a very high risk situation. Comments

Read more

April 1, 2011

Articles admin Comments Off

Smartphones Security and Privacy REBECCA WYNN

All the threats that attack your enterprise computer centers and personal computer systems are quickly encompassing mobile devices. Comments

Read more

April 1, 2011

Articles admin Comments Off

The Backroom Message That’s Stolen Your Deal YURY CHEMERKIN

Do you want to learn more about bigwig? Is someone keeping secrets from you? Need to silently record text messages, GPS locations and call info of your child or employee? Catch everybody at whatever you like with our unique service. Comments

Read more

April 1, 2011

Articles admin Comments Off

Security – Objectives, Process and Tips RAHUL KUMAR GUPTA

In a world where business is moving towards e-commerce and happening over the Internet, B2B, B2C, and C2C applications have always been an area of major security concern due to the pitfalls of HTTP security and the number of integration points. Comments

Read more

April 1, 2011

Articles admin Comments Off

How to use Netcat – MOHSEN MOSTAFA JOKAR

Netcat is a network utillity for reading and writing network connections that support TCP and UDP protocol. Netcat is a Trojan that opens TCP or UDP ports on a target system and hackers use it with telnet to gain shell access to the target system. Comments

Read more

November 1, 2010


Cyber State-Bullying

We know offensive cyber tools can be effective, and we’re all unprepared, and all building the capabilities to attack and defend. Will we actually go through with a full-scale conflict, or will we just use these to intimidate each other and expand defense budgets? Author: MATTHEW JONKMAN Source: Hakin9 11/2010 https://hakin9.org Stuxnet has changed the game and brought […]

Read more

November 1, 2010


A Brief Analysis of the Cyber Security Threat

A definition of cyber security Cyber security can be broadly described as protecting personal/business or government digital assets from cyber attack from individuals, organised criminals or foreign governments. Cyber security encompasses three threat vectors; cyber warfare; cyber terrorism and cyber attacks. Each of these threat vectors’will need to be addressed by a country’s citizens, its […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa