Archive for / 'Free Articles'

May 10, 2012

What can a network scanner do for you?

When it comes to network security there are a lot of choices as to what software you actually use. You can apply firewalls, antivirus software, internet access controls and network scanners. Seeing where the network scanner fits into this security puzzle can be a little difficult. However, a network scanner can actually perform a multitude […]

Read more

April 3, 2012

7 Reasons to Use a Network Scanner

7 Reasons to Use a Network Scanner Two pieces of advice I was given long ago by a security guru are “Know your enemy” and “Know yourself”. ‘Your enemy’ is the malicious attacker who is scanning your network for vulnerabilities, and you ‘yourself’ can use the same tools the enemy does. A network scanner is […]

Read more

February 14, 2012

How to Deploy Patch Management

How to Deploy Patch Management Keeping up with patches is one of the most important things you can do to protect your company from security issues. But if you are staying up late on a Saturday night, logging on to server after server to patch by hand, and sending out emails to users instructing them […]

Read more

February 2, 2012

Interview with Richard Johnson

Richard Johnson is a computer security specialist who spends his time playing in the realm of software vulnerability analysis. Richard currently fills the role of principal research engineer on Sourcefire’s Vulnerability Research Team, offering 10 years of expertise in the software security industry. Current responsibilities include research on exploitation technologies and automation of the vulnerability […]

Read more

January 19, 2012

Kyrion Digital Securities

Company Profile Introduction The idea of Kyrion Digital Securities was born in 2009. It is a brainchild of an IIT Delhi Alumni. There was an acute shortage of trained security experts and a dearth of information security solutions in the market, which meant the industry was forced to heavily invest in foreign security solutions and […]

Read more

January 10, 2012

Interview with Gord Boyce

READ THE WHOLE INTERVIEW! The early Network Access Control (NAC) market did see a lot of consolidation and failures. Early vendors promised more than they delivered in terms of functionality and deployment ease. Many of those products required managing different components and replacing infrastructure, with results sometimes disrupting users from doing work. So the cost […]

Read more

December 23, 2011

9 Reasons to Enforce Web Security within the Organization

Considering the wide range of malicious content threatening your users, implementing strong web security within the organization is a crucial part of any defense-in-depth strategy. Web security doesn’t have to mean blocking your users’ access to the Internet, but it does mean protecting them from the types of threats they will encounter every day. Here’s […]

Read more

November 24, 2011

MacX DVDRipper Pro

I’m sure I’m not the only one that is tired of booting up a Windows machine or VM whenever you want to rip a disc. Ripping in Linux is still a little cumbersome and usually there is about a 50/50 chance it will work out nicely, so Windows is what most folks use to rip. […]

Read more

November 24, 2011

Hakin9 Special Issue – Get Rid of Spam!

DOWNLOAD FOR FREE! Inside this issue you will find articles on anti-spam, email filtering and archiving. You will also get familiar with Roaring Penguin’s producs, sources of company creation and its founder itself. CONTENTS: March of the Roaring Penguin By Sophia Li Founded about a dozen years ago as a consulting firm in Ottawa, Ontario, […]

Read more

September 28, 2011

Apple OS X and iOS Hacking News

READ THE WHOLE ARTICLE This month’s article focuses on Apple technology hacking that has been identified thus far in 2011. Here you will find a compilation of some high profile media reports and research from the Web on the hacking of Apple technology. There are two sections – Mac OS X and iOS (iPad; iPod […]

Read more

September 15, 2011

Analysis of Zitmo

READ THE WHOLE ARTICLE by Dhawal Desai Over the time security space has seen a number of versions and variants of banking malware. With the increase in popularity and usage of smart phones, mobile attacks are becoming more frequent. Android platforms have been one of the most favorite targets of malware writers. To read the […]

Read more

September 8, 2011

Reverse Shell Through DLL Injection

READ THE WHOLE ARTICLE DLL Injection is a popular technique used by attackers to inject an executable file in order to perform a controlled code execution. Several  methods for preventing this has been developed by Operating System’s  creators, but (as we will see) without 100% success. The author presents two methods of a successful attack […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa