IS DDOS STILL A THREAT?

Download
File
hakin9_05_2010_EN.pdf
    • Pulling Kernel Forensic Data with Python
      Daniel Lohin
      How to proceed with gathering forensic information of Linux machines when a user-level rootkit is suspected to be installed by utilizing Python to automate the process of pulling data.



    • Jailbreaking and Penetrating with the Iphone 3G & 3GS
      Wardell Motley
      Today Smart phones are getting smarter and smarter. They are a far cry away from the Walkie-Talkie like devices from the the early 90’s.



    • Testing Flash Memory Forensic Tools – part two
      Salvatore Fiorillo
      This second part is focused on advanced tests done on flash memory embedded in a Nokia mobile phone. Tests presented in this article are not for all as they require a well furbished lab; even that what we try to demonstrate here is that – when flash mobile forensic will leave its infancy – there are some issues forensic officers should take in consideration.



    • Securing public services using Tariq
      ALI HUSSEIN
      When I first read about the port-knocking concept was really amazed how such service can help us secure other less secure services such as telnet, rsh, etc. But after a while I realized that it was a great solution even to the ground built up secure services such as SSH (Secure Shell)!



    • Beginner’s Guide to Cybercrime
      GARY S. MILIEFSKY, FMDHS, CISSP®
      If you are a regular reader of Hakin9 Magazine, you probably already know a great deal about hacking. But do you know the difference between traditional crime and cybercrime? Do you know where are the cybercrime magnets?



    • Is DDOS Still a Threat?
      MATTHEW JONKMAN



    • More Secure PHP Server Side Source Encryption
      ISRAEL TORRES
      The Internet as we know it is full of mystery, intrigue and obfuscation. One of my favorite curiosities is finding ways to undo things that have been done then automating the process programmatically and retooling the concept entirely. Some may call this building a better mouse trap.



    • Don’t let the zombies take you down
      Ian Kilpatrick
      Over the last year, the incidence of botnet (or zombie) attacks has been growing rapidly. Some service providers around the world have already begun to take action against botnets 1 and there is increased interest from other service providers, and from companies, in dealing with this serious security threat.


Download
File
hakin9_05_2010_EN.pdf

April 19, 2022
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.