+

Tagged With / 'passwords'

June 15, 2011

Articles Redaction No Comments

Why Is Password Protection a Fallacy – a Point of View?

Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it – never write it down. And, oh yes, change it every few months. These instructions are supposed to protect us. But they don’t. A password is a secret word or string of characters that is used for authentication, […]

Read more


June 15, 2011

Magazine Redaction 3 Comments

Hakin9 Extra 1/2011 – Exploiting Software

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow by Chris Hadnagy Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach […]

Read more

June 4, 2011

News Carlos A. Ayala Comments Off

Believe It or Not: Hackers Hit Sony Networks Again

Sony just can not catch a break. After repeated network breach events over the last two months that have exposed the account details of millions of Sony customers, the hacker collective known as LulzSec claims to have done it yet again. “We are looking into these claims,” Jim Kennedy, executive vice president of Global Communications […]

Read more

April 6, 2011

News Redaction Comments Off

Security firm RSA Security breached

RSA Security is one of the biggest players in the enterprise security landscape, featuring advanced authentication, access control and data loss prevention products. The hype about the breach occurred to the company spread to almost every security news website. Company’s CEO announced, in a “urgent” message, that the breach is to be considered an APT […]

Read more


March 1, 2011

Magazine Redaction Comments Off

ID Theft – Hakin9 03/2011

The best way, to learn and apply cryptography ARKADIUS C. LITWINCZUK The CrypTool project is about making the sometimes daunting subject of cryptography more accessible and easy to understand. It is the most comprehensive cryptography learning tool worldwide. Analysis of a Scam RICH HOGGAN It’s all to often that we hear about being scammed on […]

Read more


January 1, 2011

Magazine Redaction Comments Off

Cybercrime and Cyberwar Predictions for 2011 – Hakin9 01/2011

Pros and cons of partial passwords in web applicationsDarek ŁysyszynAlmost every web application requires some kind of authorization. Most of them use user password authorization. And most of time one is forced to type full password. Is this solution convenient Probably yes. Is it secure? Not quite. There are few solutions of authorization by password. […]

Read more

November 1, 2010

Articles Redaction No Comments

The Spyware Within You

Yes, today’s spyware though resides in your computer or mobile but it’s pretty much inside you. Whatever we do, wherever we go it’s stored in a computer or an embedded device like mobile phone. Author: RAJAT KHARE Source: Hakin9 11/2010 https://hakin9.org What you will learn… The new trendy Spear spyware About honeypots of spyware What you should know… […]

Read more

October 1, 2010

Articles Redaction No Comments

A Beginners Guide to Ethical Hacking

A beginners guide to Ethical Hacking is a great book from beginners to intermediate users who are interested in learning more about ethical hacking. Author: SHYAAM SUNDHAR Source: Hakin9 10/2010 https://hakin9.org   A beginners guide to Ethical Hacking is a great book from beginners to intermediate users who are interested in learning more about ethical hacking. Some say […]

Read more

October 1, 2010

Articles Redaction No Comments

Wuala – Secure Online Storage

There are a lot of online storage/backup solutions available nowadays and it is hard to find differences between them, but I think Wuala from LACIE may have something unique in the way their solution works. Author: Michael Munt Source: Hakin9 10/2010 https://hakin9.org Trading You start off with 1GB free and you can either purchase more space or trade […]

Read more

October 1, 2010

Articles Redaction No Comments

An Analysis of the Spyware Threat and how to Protect a PC

A Brief History of Spyware Spyware has been around since approximately the midlate nineties but it wasn’t until the millennium that Zone Labs founder Gregor Freund coined the name Spyware. Spyware can be clearly defined as invasive (monitoring your browser habits through adware and user tracking software) and malicious (installing keyloggers and other spyware related […]

Read more

September 1, 2010

Articles Redaction No Comments

Hardware Keylogger – A Serious Threat

Keyloggers are a serious threat for both companies and individuals. Their goal is to log all input made by a user and to then make it available for the attacker. Author: MICHAEL R. HEINZL Source: Hakin9 9/2010 https://hakin9.org   The input collected may contain information such as user credentials, e-mails, bank details and other sensitive data […]

Read more


August 18, 2010

Magazine Redaction Comments Off

Mobile Malware – the new cyber threat

Botnet:The Six Laws And Immerging Command & Control Vectors Richard C. Batka New BotNet communication vectors are emerging. The industry is not prepared. For the next 20 years, BotNets will be what viruses were for the last 20. Hacking Trust Relationships Part II Thomas Wilhelm This is the second article in a series of six […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa