Archive for / 'Free Articles'

January 18, 2013

Free Issues Magazine News admin Comments Off

Hakin9 OPEN: The New Free of Charge Monthly 1/2013

Dear Hakin9 Readers, This month we publish Hakin9 OPEN for the first time. Please have a look at this new-born issue which we want to be a free of charge periodical supporting Hakin9, Hakin9 Extra, Hakin9 OnDemand and Hakin9 Exploiting Software. The idea of creating this additional issue is to present how wide is the […]

Read more

December 19, 2012

Free Articles News admin Comments Off

Vulnerabilities and Exploits

Sorry, but you do not have permission to view this content.

Read more

December 6, 2012

How to Reverse the Code? Exploting Software 10/2012 Digest

THE TOOLS How to Analyze Applications With Olly Debugger? By Jaromir Horejsi When you write your own programs and you would like to change or modify some of their functions, you simply open the source code you have, make desired changes, recompile and your work is done. However, you don’t need to have source code […]

Read more

October 18, 2012

Incapsula Review

If you own or manage a website, two of your biggest concerns are keeping it secure and making it faster. Thanks to Incapsula, a cloud-based service for SME’s, these needs can be fully met with a simple setup and without installing any hardware or software. Incapsula protects and accelerates websites. The service includes a bot […]

Read more

October 15, 2012

Wireshark: Sharks on the Wire – Hakin9 On Demand Digest 02/2012

Hakin9 Followers! We’ve come up with quite a treat for you for the beginning of the week! Look through our Pre-Premiere Hakin9 On Demand issue. What’s in the issue? Wireshark – Sharks on the Wire, that is, Patrick Mark Preuss on capturing packets on hardware. This article will help you finding network related problems and […]

Read more

October 5, 2012

Hacking Oracle – Hakin9 Digest 01/12

Hakin9 Readers! We’ve come up with quite a treat for you for the weekend! Look through our Pre-Premiere Hacking Oracle Issue 10/2012. What’s in the issue? ORACLE DATABASE SECURITY Oracle’s Achilles’ Heel – Attack, Defense and Forensic Response in A Distributed Database Estate By Paul Wright This article will highlight one of the main security […]

Read more

October 5, 2012

8 Must-have Features in Your Web Security Solution

Internet access is a remarkable tool that empowers users in ways nothing else can, but free and open Internet access sometimes comes with a price too high to pay, so companies implement web security solutions to mitigate the risks and protect their data. If you are considering web security software to protect your business, make […]

Read more

September 12, 2012

Wombat’s Security Training Platform gives Security Officers the Educational Tools to Improve Employee Response to Cyber-Attack

Wombat Security Technologies – Thanks to Lorraine Kauffman-Hall Recently named as a finalist of the Pittsburgh Technology Council’s Tech 50 Award as well as a finalist for the Golden Bridge Business Award as a security awareness and training innovator, Wombat Security Technologies is today announcing the launch of its most powerful version of the Security […]

Read more

September 11, 2012

Old Operating Systems Present New Security Challenges

Fortinet Research Shows it’s Smarter (and Safer) to Migrate to a new OS, Rather than Trying to Maintain Legacy Systems By Derek Manky In June 2008, Microsoft officially announced that it planned to discontinue support for its popular but aging Windows XP operating system by April 2014. To many system administrators’ chagrin, the move will […]

Read more

August 23, 2012

Wombat Security Technologies – Why Most Cyber Security Training Doesn’t Work

Why Most Cyber Security Training Doesn’t Work There’s been a lot of debate lately about whether or not cyber security training is worth the investment. To engage in this debate, it is important that all parties have a common definition of cyber security training. If we define cyber security training as the act of herding […]

Read more

July 20, 2012

Hakin9 ForFree 1/12(1)

A thin database access abstraction layer for ADO.NET on .NET / Mono By Moreno Airoldi Later, Microsoft released a successor to ODBC: OLE DB. This new technology was object oriented, based on COM – component object model, and aimed to improve its predecessor in terms of performance, providing a way to write drivers which were less […]

Read more

May 11, 2012

StaffCop – activity monitoring software & network performance monitoring. Remote traffic monitoring tool, employee monitoring software & spying program

The majority of companies out there today are trying their best to use the power of social media and its large user base to their advantage. If your company is utilizing social media websites chances are your employees are allowed to use sites on company time and using company assets. Unfortunately employees inadvertently and occasionally […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa