+

Tagged With / 'best practices'

October 31, 2011

Hacking Data

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

October 6, 2011


Application Security Forum – Western Switzerland conference, October 2011

The city of Yverdon-les-Bains will host by end of October the 2011 edition of the Application Security Forum – Western Switzerland conference. For this second edition, an exceptional lineup consisting of: 19 speakers and trainers, both locally and internationally recognized, will share their knowledge, best practices and experience on all sensitive topics  related to application […]

Read more

August 31, 2011

Secure Coding

Secure Coding 9/11

In Brief By Armando Romeo, eLearnSecurity and ID Theft Protect The Bug Story By Ali Hadi Despite the fact that our Networks gardens are full of beautiful/gorgeous things, at same time they’re full of bugs. The problem is that the Internet serves as connection between these gardens, which makes it easy for bugs to travel […]

Read more

August 23, 2011

Enterprise IT Security Magazine 1/2011

Enterprise IT Security Magazine 1/2011

Defining Best Practices for IT Security Within a Cloudy World by Chris Poulin Cloud Computing – Is it Worth the Move? by Gary S. Miliefsky Coud Computing and Its Security Benefits by Ajay Porus Cloud Security Advancement and Its Effects on Data-Centric Persistence Layer by Stephen Mallik Evaluating the Security of Multi-Tenant Cloud Architecture by […]

Read more

August 17, 2011


Best Practices in InfoSec Forensics – Proactively Preparing For and Executing Network Forensic Analysis

This article is meant to give you a quick overview of the best practices for Information Security (INFOSEC) forensics. To get started, let? first define this subject and then dig into the tools used in this field of computer and criminal justice sciences. by Gary S. Miliefsky Comments

Read more

August 17, 2011

Hakin9 Extra 3/2011 - Forensics

Hakin9 Extra 3/2011 – Forensics

Basic Forensics Analysis by Marc-Andre Meloche Digital Forensics is mostly like the movies, the main aspect is to gather evidence or digital footprints which will help you understand any digital crimes that might have occurred inside your organization. This is used in most cases related to computer crimes. New crime vectors are now implicating the […]

Read more

July 1, 2011


Firestarter: Starter to your Firewall

The firewall is the first line of defense on the network perimeter and end points. Firewalls are the gatekeepers to facilitate the flow of necessary traffic to and from assets. The author in his article focuses on the best practices when setting up a host-based firewall on a Ubuntu 10.4 LTS laptop. He describes how […]

Read more

July 1, 2011

Web App Security

Web App Security 7/2011

Latest News From the IT Security World By Armando Romeo, eLearnSecurity and ID Theft Protect Mummies still walk among us! By Ali Al-Shemery Imagine all the great sources of information on the Internet today such as: news groups, blogs, websites and forums, and you still see networks, and websites being hacked and torn down using […]

Read more

March 1, 2011

Magazine admin Comments Off
ID Theft - Hakin9 03/2011

ID Theft – Hakin9 03/2011

The best way, to learn and apply cryptography ARKADIUS C. LITWINCZUK The CrypTool project is about making the sometimes daunting subject of cryptography more accessible and easy to understand. It is the most comprehensive cryptography learning tool worldwide. Analysis of a Scam RICH HOGGAN It’s all to often that we hear about being scammed on […]

Read more

March 1, 2010

Articles admin Comments Off

Hacking Trust Relationships

This article is the first in a series of six, which covers the topic of hacking trust relationships. This first article focuses specifically on Information Gathering against a target system, in order to identify potential trust relationships. Author: THOMAS WILHELM Source: Hakin9 3/2010 https://hakin9.org Over the last decade, there has been a visibly increase in interest […]

Read more

December 1, 2009


AppliCure dotDefender and dotDefender Monitor

Applicure’s freeware tool dotDefender Monitor was highlighted in the latest SANS Top 20 Internet Security Risks as a tool to detect the latest emerging threat of vulnerabilities in web applications. Together with Applicure dotDefender it monitors and protects against internal and external attacks on web servers and web applications. Author: Einat Adar Source: Hakin9  https://hakin9.org Quick start. […]

Read more

December 1, 2009


Secure Switching with Cisco Platforms

This article provides a detailed account of the operation of three highly effective abuses possible in a default-state switched network and how to mitigate them with Cisco platforms. At the end of the article a Top 10 security checklist is provided. Author: ADAM BLACK Source: Hakin9  https://hakin9.org WHAT YOU SHOULD KNOW… You should have a basic understanding […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa