+

Category: Magazine



January 15, 2013

Magazine News Ewa Duranc Comments Off

Who is the ‘Enemy’? Cybersecurity explored in Hakin9 OnDemand 01/2013

Dear Hakin9 Readers,   We have survived the end of the world and we are entering the new year with an issue devoted to Cybersecurity. We have done our best to bring you quality articles from our experts and we hope our January edition will provide you with valuable knowledge. This month, William F, Slater, […]

Read more


January 10, 2013

Magazine News Ewa Duranc Comments Off

Hakin9 Box: The Best Of… Get It Today!

Dear Hakin9 Readers, Today we have prepared something extra for you. We have gathered our best issues and prepared a special The Best of Hakin9 Box for you! Inside you can find nearly 1200 pages about the best topics from the past years! Read about: SNORT for Soho and Independent Networks Does Your Blackberry Smartphone […]

Read more


December 27, 2012

Magazine News Redaction Comments Off

How to Protect Your Company Against Intruder with Hakin9 12/2012!

Dear Readers, Companies are the most prone for crackers. Hackers seize this opportunity and try to steal companies’ data. What they want most is the access to companies’ bank accounts. Consider preparing your company for the attack. Learn how to do it from Hakin9 12/2012! You will find here:         DEFENSE PATTERN […]

Read more


December 21, 2012

Magazine News Redaction Comments Off

How to Hack Company’s Network? Hakin9 Digest 12/2012

Dear Readers, Companies are the most prone for crackers. Hackers seize this opportunity and try to steal companies’ data. What they want most is the access to companies’ bank accounts. Consider preparing your company for the attack. Learn how to do it from Hakin9 12/2012! In the incoming issue you will find: How to Secure […]

Read more


December 14, 2012


Wireshark Explored in Hakin9 OnDemand 09/12

Dear Hakin9 Readers, We would like to welcome you all to the new Hakin9 on Demand. This month, we will take another shot at the renown protocol analyzer – Wireshark. For starters, Nitish Mehta will walk you through the tool itself. More advanced users will find RIFEC’s Massimiliano Sembiante focusing on analysis on storage area […]

Read more


December 14, 2012


Hakin9 OnDemand Explores Wireshark Again – Digest 09/12

Dear Hakin9 Readers, The new issue of Hakin9 OnDemand is coming out,  so now, we bring you the free digest. In order to download, you need to create a free account or simply log in if you already have one. This month, we will take another shot at the renown protocol analyzer – Wireshark. For […]

Read more


December 6, 2012


How to Perform a Professional Reverse Engineering? Exploiting Software 10/2012

THE TOOLS How to Analyze Applications With Olly Debugger? By Jaromir Horejsi When you write your own programs and you would like to change or modify some of their functions, you simply open the source code you have, make desired changes, recompile and your work is done. However, you don’t need to have source code […]

Read more


December 6, 2012


How to Reverse the Code? Exploting Software 10/2012 Digest

THE TOOLS How to Analyze Applications With Olly Debugger? By Jaromir Horejsi When you write your own programs and you would like to change or modify some of their functions, you simply open the source code you have, make desired changes, recompile and your work is done. However, you don’t need to have source code […]

Read more


December 5, 2012


Biometrics Security – Hakin9 Extra 11/12

The access has been granted… Biometrics Technologies A Brief Introduction to Gait Recognition By Toby H.W. Lam In general, personal identification mainly uses password or physical key. There is a wide usage of password such as Automatic Teller Machines, desktop computers and electronic mail box. Users are required to provide their own password at the […]

Read more


December 4, 2012


Biometrics Security – Hakin9 Extra Digest 11/12

Dear Readers, Biometric authentication, speaking shortly, is the identification of humans by their characteristics, like irisies, finger or palm prints, voice or facial patterns and DNA. We used to see it more often in the movies, than in the day-to-day life. Although Hollywood productions are still ahead of us, each year we are closer to […]

Read more


November 24, 2012


Hakin9 OnDemand Explores Linux Kernel! 08/12

Explore 11 professional articles written by our experts! All about Kernel security and technical hacking! Defence Pattern KERNEL SECURITY By Vikas Kumar In computing, the kernel is the main component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware level. The kernel’s responsibilities include managing the system’s resources (the communication between hardware and software components).[1] Usually […]

Read more


November 22, 2012


Exploiting Linux Kernel – OnDemand Digest 08/12

Dear Hakin9 Readers, This month’s issue is devoted to Linux Kernel Hacking. As always, we have prepared for you a set of interesting articles provided by experts in Kernel exploiting. Johnatan Levin will teach you about hooking socket API calls, Amr Thabet will walk you through the process of creating your own security tool, and […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa