
- Version
- Download 232
- File Size 6.37 MB
- File Count 1
- Create Date August 24, 2014
- Last Updated April 19, 2022
SPYWARE SOMEONE IS ALWAYS WATCHING…
-
- Deploying & Utilizing Intrusion Detection Using Snorby
Joshua Morin
Snorby is an advanced Snort IDS front-end. Snorby has two basic fundamental pieces, which are simplicity and power. The project goal is to create a free, open source and highly competitive application for network monitoring in enterprise environments or private use.
- Deploying & Utilizing Intrusion Detection Using Snorby
-
- Malware Incident Response – Outbreak Scenario
Rajdeep Chakraborty
This article applies to Microsoft OS on Intel Platform. With the ongoing threat of the Conficker Virus, which is still hanging like the sword of Damocles, it becomes very important to know and understand, what exactly needs to be done during a possible Virus Outbreak.
- Malware Incident Response – Outbreak Scenario
-
- TDSS botnet – full disclosure
Andrey Rassokhin and Dmitry Oleksyuk
>What is a botnet? A botnet is not merely an army of infected computers. First of all, a botnet is an externally managed complex structure. While the malware side is studied pretty well in most known botnets, the management side is often underestimated. The latter usually involves hacking and vulnerability exploitation, because server side scripts of a centralized botnet are hidden from public.
- TDSS botnet – full disclosure
-
- When XOR is your friend…
Israel Torres
Using a random enough input stream may sound like outright blasphemy to many if not all reading this; however in this article I will demonstrate when using it makes sense. One of my hobbies include creating crypto challenges where I hide an English message string in a block of numbers and letters. The first challenger that can correctly find what the message exactly states and demonstrate the algorithm used (usually in a programmatic fashion) they win a cash prize. I’ve learned over this year that in the past I had been making it far too difficult…
- When XOR is your friend…
-
- Proactive Defenses and Free Tools
Gary S. Miliefsky
In my last article, I described the greatest breach in cyber history and made some suggestions on how it could have been avoided – enabling strong wireless encryption, testing your wireless routers for vulnerabilities, visiting https://nvd.nist.gov, limiting the number of trusted devices allowed
on your wired and wireless networks and hardening your systems.
- Proactive Defenses and Free Tools
-
- Wuala – Secure Online Storage
Michael Munt
- Wuala – Secure Online Storage
-
- Book review: A beginners Guide to Ethical Hacking
Shyaam Sundhar
- Book review: A beginners Guide to Ethical Hacking
-
- An analysis of the spyware threat and how to protect a PC
Julian Evans
- An analysis of the spyware threat and how to protect a PC
-
- Electronic Cold War
Matthew Jonkman
- Electronic Cold War
Attached Files
File | |
---|---|
Spyware_Hakin9_10_2010.pdf |
(1 views)
Subscribe
0 Comments
Newest