- Version
- Download 241
- File Size 7.00 MB
- File Count 1
- Create Date August 23, 2014
- Last Updated April 19, 2022
FLASH MEMORY MOBILE FORENSIC
-
- Firewalls for Beginners
Antonio Fanelli
Firewalls are often overlooked, but are actually one of the best deterrents against unauthorized accesses. Learn how to build a low-cost firewall with iptables. Whenever people ask me how they can be sure no one can have unauthorized remote access to their PC, my first answer is: disconnect your PC!
- Firewalls for Beginners
-
- Pwning Embedded ADSL Routers
Aditya K Sood
This paper sheds light on the hierarchical approach of pen testing and finding security related issues in the small embedded devices that are used for local area networks. The paper is restricted to not only testing but also discusses the kinds of software and firmware used and incessant vulnerabilities that should be scrutinized while setting up a local network.
- Pwning Embedded ADSL Routers
-
- Writing WIN32 shellcode with a C-compiler
Didier Stevens
Shellcode is hard to write. That is why I worked out the method presented here to generate WIN32 shellcode with a C-compiler. To fully benefit from the content of this article, you should have some experience writing WIN32 programs in C/C++ and WIN32 shellcode, and understand the differences between both approaches.
- Writing WIN32 shellcode with a C-compiler
-
- Flash Memory Mobile Forensic
Salvatore Fiorillo
This paper is an introduction to flash memory forensic with a special focus on completeness of evidences acquired from mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to forensic investigators.
- Flash Memory Mobile Forensic
-
- Threat Modeling Basics
Timothy Kulp
In the world of software, security is thrown into a system somewhere at the end of the project. For many developers adding security to a system is using a login with SSL/TLS; but sadly, these two are not the security silver bullet developers are led to believe.
- Threat Modeling Basics
-
- ID fraud expert says…
Julian Evans
Identity Theft Protection Services – a new industry is born
- ID fraud expert says…
-
- Interview
Hakin9 team
Interview with Victor Julien, lead coder for the Open Information Security Foundation
- Interview
Attached Files
File | |
---|---|
hakin9_04_2010_EN.pdf |
(1 views)
Good