+

Archive for / 'News'

December 10, 2012


ZeroNights hacking conference featured a guide to hijacking a plane, a car, or kidnapping a child

On November 19 and 20, the international ZeroNights conference, organized by ERPScan, was held in Moscow, where security researchers shared their news about the security issues of computers and everything related to them. Digital technologies are far from just personals computers now, and electronics are used virtually everywhere, so the attention of researchers and cybercriminals […]

Read more

December 6, 2012

News Ewa Duranc No Comments

Open Letter to Our Readers!

Hakin9 in 2012. Accomplishments and statistics. Dear Hakin9 Readers,  2012 is nearly over. As usual, we have prepared something extraordinary for you. Some of you are new to our magazine and some are with us for months, even years. The end of the world approaches rapidly, so we decided that in exchange for your unmeasurable […]

Read more


December 6, 2012


How to Perform a Professional Reverse Engineering? Exploiting Software 10/2012

THE TOOLS How to Analyze Applications With Olly Debugger? By Jaromir Horejsi When you write your own programs and you would like to change or modify some of their functions, you simply open the source code you have, make desired changes, recompile and your work is done. However, you don’t need to have source code […]

Read more


December 6, 2012


How to Reverse the Code? Exploting Software 10/2012 Digest

THE TOOLS How to Analyze Applications With Olly Debugger? By Jaromir Horejsi When you write your own programs and you would like to change or modify some of their functions, you simply open the source code you have, make desired changes, recompile and your work is done. However, you don’t need to have source code […]

Read more

December 6, 2012


MACCONEXT LAUNCH AFRICAN HARD COPY EDITION OF HAKIN9

MACCONEXT INFORMATION SECURITY LIMITED FORGES STRATEGIC ALLIANCE WITH HAKIN9 MEDIA SP.Z.O.O TO LAUNCH THE AFRICAN EDITION OF HAKIN9 MAGAZINE Macconext Information Security Limited, Nigerian IT Company signed a strategic alliance with Hakin9 Media to publish the Hakin9 IT Security Magazine in Africa. Macconext, in partnership with Hakin9 Media will launch Hakin9 in Africa on the […]

Read more


December 5, 2012


Biometrics Security – Hakin9 Extra 11/12

The access has been granted… Biometrics Technologies A Brief Introduction to Gait Recognition By Toby H.W. Lam In general, personal identification mainly uses password or physical key. There is a wide usage of password such as Automatic Teller Machines, desktop computers and electronic mail box. Users are required to provide their own password at the […]

Read more


December 4, 2012


Biometrics Security – Hakin9 Extra Digest 11/12

Dear Readers, Biometric authentication, speaking shortly, is the identification of humans by their characteristics, like irisies, finger or palm prints, voice or facial patterns and DNA. We used to see it more often in the movies, than in the day-to-day life. Although Hollywood productions are still ahead of us, each year we are closer to […]

Read more


November 27, 2012

Events News Ewa Duranc No Comments

Nullcon International Security Conference, Goa 2013

It is a great honor and pleasure for us to host the “Nullcon’s 5th International Security Conference”, on 1 – 2 March 2013 @ Bogmallo Beach Resort, Goa (http://nullcon.net).   We at nullcon feel proud to be at the forefront of the IT Security arena in the Asian IT Industry. With the fifth event in the […]

Read more


November 24, 2012


Hakin9 OnDemand Explores Linux Kernel! 08/12

Explore 11 professional articles written by our experts! All about Kernel security and technical hacking! Defence Pattern KERNEL SECURITY By Vikas Kumar In computing, the kernel is the main component of most computer operating systems; it is a bridge between applications and the actual data processing done at the hardware level. The kernel’s responsibilities include managing the system’s resources (the communication between hardware and software components).[1] Usually […]

Read more

November 22, 2012

News Ewa Duranc No Comments

William F. Slater, III gives brief speech on Cyberwarfare!

Dear Hakin9 Readers! Today we have something extraordinary for you! William F. Slater III, whom you already know, made a video presentation for you! He is deeply concerned about the recent unfolding events of cyberattacks and cyberwarfare in cyberspace. He is also deeply concerned that the United States, with all its wealth, technology, and leadership […]

Read more


November 22, 2012


Exploiting Linux Kernel – OnDemand Digest 08/12

Dear Hakin9 Readers, This month’s issue is devoted to Linux Kernel Hacking. As always, we have prepared for you a set of interesting articles provided by experts in Kernel exploiting. Johnatan Levin will teach you about hooking socket API calls, Amr Thabet will walk you through the process of creating your own security tool, and […]

Read more

November 15, 2012

News Ewa Duranc No Comments

New Contest! Get Press Pass to the Conference in Central London!

Dear Hakin9 Readers! Today we have another great contest for you! What you should do: write a short review of our issue on Wireshark (Hakin9 OnDemand – Wireshark: Sharks on the Wire). It should be short and informative. Submissions: Send your reviews to ewa.duranc@hakin9.org Prizes: 1 grand prize: Press Pass: Binding Corporate Rules Masterclass 2013 […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa