- Version
- Download 736
- File Size 4.75 MB
- File Count 1
- Create Date October 2, 2014
- Last Updated August 20, 2021
HAKIN9 MAGAZINE PRACTICAL PROTECTION | TEASER
Hakin9 Team is happy to introduce you to upcoming new issue:
Practical Protection – Less Theory More Practice.
It’s entirely devoted to protection of your data, software and wifi. We will show you step-by-step how to secure what’s important to you.
Content:
Using Amazon AMI for cracking the WPA2 wifi hack
by Bruno Rodrigues
This article is about how we can effectively hack WiFi networks WPA2 protected in an efficient way.
Windows Registry Forensics (WRF) with Volatility Framework. Beginners Guide
by Kapil Soni
This is guide especially for beginners who wants to learn about Windows Registry Forensics. Throughout this book you will learn how to do forensics and investigate Windows Registry.
15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5
by Matias Iacobizio
This article aims to demonstrate fundamental Social Engineering principles and to present Social Engieneering Attacks techniques, such as Site Cloner. Social Engineering Toolkit are presented and. The final phase is to analyze their results.
How to send and receive emails securely?
by Thanglalson Gangte
Your account can get hacked, someone may be sniffing your traffic through MITM attack, or intelligence agencies might be snooping. What can you do?
How to reveal the hidden code behind a Steganography with the help of magic numbers
by Nicks Sarang
Steganography is the art and science of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganography coding inside of a transport layer, such as a document file, image file, program or protocol.
VoIP Hacking Techniques
by Mirko Raimondi
Voice over Internet Protocol (VoIP) is a newer technology that allows phone conversations to be transferred over the computer networks, it transforms analog and digital audio signals in data packets.
Kali Linux Primer
by Chad Oliver
Kali Linux is the latest version of the BackTrack Linux penetration testing, security auditing, and forensics distribution. It is based on Debian and comes ready to go with all the tools you need to begin an information security engagement.
Intricacies of Multi-Threading in Java
by Sumith Kumar Puri
Multi-Threading in Computer Science represents a very intriguing topic, even after years of research and development for high quality, robust and efficient software. With equal emphasis on hardware improvements and the software that runs on it – we have newer paradigms for parallelism. The most important yet basic concepts are the ones which I present here. I then explain the intricacies of multi-threading in the Java Programming Language. Some of these are newer features and supported only from the Java Platform Standard Edition 5.0. Let us start with a quick overview and understanding of the core concepts.
Attached Files
File | |
---|---|
Hakin9_EN_01_2014_teaser1.pdf |