• Deploying & Utilizing Intrusion Detection Using Snorby
      Joshua Morin
      Snorby is an advanced Snort IDS front-end. Snorby has two basic fundamental pieces, which are simplicity and power. The project goal is to create a free, open source and highly competitive application for network monitoring in enterprise environments or private use.

    • Malware Incident Response – Outbreak Scenario
      Rajdeep Chakraborty
      This article applies to Microsoft OS on Intel Platform. With the ongoing threat of the Conficker Virus, which is still hanging like the sword of Damocles, it becomes very important to know and understand, what exactly needs to be done during a possible Virus Outbreak.

    • TDSS botnet – full disclosure
      Andrey Rassokhin and Dmitry Oleksyuk
      >What is a botnet? A botnet is not merely an army of infected computers. First of all, a botnet is an externally managed complex structure. While the malware side is studied pretty well in most known botnets, the management side is often underestimated. The latter usually involves hacking and vulnerability exploitation, because server side scripts of a centralized botnet are hidden from public.

    • When XOR is your friend…
      Israel Torres 
      Using a random enough input stream may sound like outright blasphemy to many if not all reading this; however in this article I will demonstrate when using it makes sense. One of my hobbies include creating crypto challenges where I hide an English message string in a block of numbers and letters. The first challenger that can correctly find what the message exactly states and demonstrate the algorithm used (usually in a programmatic fashion) they win a cash prize. I’ve learned over this year that in the past I had been making it far too difficult…

    • Proactive Defenses and Free Tools
      Gary S. Miliefsky
      In my last article, I described the greatest breach in cyber history and made some suggestions on how it could have been avoided – enabling strong wireless encryption, testing your wireless routers for vulnerabilities, visiting https://nvd.nist.gov, limiting the number of trusted devices allowed
      on your wired and wireless networks and hardening your systems.

    • Wuala – Secure Online Storage
      Michael Munt

    • Book review: A beginners Guide to Ethical Hacking
      Shyaam Sundhar

    • An analysis of the spyware threat and how to protect a PC
      Julian Evans

    • Electronic Cold War
      Matthew Jonkman


April 19, 2022
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.