Tagged With / 'prevent'

March 20, 2014

Free Articles Free Issues Redaction Comments Off

Become a Certified Ethical Hacker with Hakin9 | TEASER

Read a sample of Hakin9 Magazine: Become a Certified Ethical Hacker with Hakin9 You will find there covered topics like: Hacking Techniques Performed in Industrial Environment; No One is Ever Secure: How Hackers Got Hacked – special review about hacking EC-Council Brief summary of full publication: Hakin9 Team is happy to introduce you to upcoming […]

Read more

December 5, 2011

Skype flaw can track users’ location and P2P activity

Security researchers have found a security flaw in Skype. The flaw found several properties of Skype that can track not only a users’ locations over time, but also their P2P file activity. The researchers also found that “even when a user blocks callers or connects from behind a Network Address Translation (NAT), it does not […]

Read more

November 14, 2011

Magazine Redaction No Comments

Hakin9 Extra – Rootkit 06/2011

Rootkits Hidden in Hardware of PC by Anibal Sacco Let’s think like an attacker for a second. There are multiple applications dedicated to find malicious code both in user and in kernel space. So new places have to be found to deploy your code while keeping it stealthy. TDSS aka TDL – Chronology by Eugene […]

Read more

November 10, 2011

EBOOKS Redaction No Comments

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

ISBN: 978-1439860694 RRP: $69.95 The first time that I quickly browsed through this book, I thought that maybe I was reading this in a slightly different language as there were new acronyms and different ways of thinking on how to process information for me to learn By the time I was finished my head was […]

Read more

October 31, 2011

Magazine Redaction 47 Comments

Hacking Data 11/11

Latest News From IT Security World By Schuyler Dorsey, eLearnSecurity i ID Theft Protect As usual specialists from companies eLearn Security and ID Theft protect will share with us latest news from IT security world. Read it to up-date yourself. Secure Log Server With Rsyslog By Leonardo Neves Bernardo This article will discuss how to […]

Read more

October 24, 2011

Magazine Redaction 46 Comments

Exploiting Software 02/11 Exploit format Strings with Python

Cracking Java Applications Using AOP Exploits (part 2) By Daniel Drozdzewski AOP has been used in the domain of Software Security before. Its use was mainly for validation, auditing and authorization purposes, which in turn improve software security as a whole. Those crosscutting concerns are being woven into the existing software after the fully functional […]

Read more

October 20, 2011

Four million people victims of identity fraud in the UK

It’s National Identity Fraud Prevention Week this week in the UK. As part of Julian’s identity fraud awareness push he’d like just go over some old ground. Fellowes a paper-shredding supplier commissioned a report which highlighted that 7 per cent of the UK population (4 million people) have been a victim of identity fraud at […]

Read more

September 25, 2011

EBOOKS Redaction No Comments

Vulnerability Management

Vulnerability Management By Park Foreman August 2009 Publisher: CRC Press http://www.crcpress.com/product/isbn/9781439801505   50% DISCOUNT for Hakin9 SUBSCRIBERS!!! To save 50% enter given below discount code, during checkout at www.crcpress.com. Description As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms […]

Read more

September 14, 2011

Managing Adobe Flash supercookies and the PIE problem

Popular sites such as MSN, Hulu and Flixster have been using supercookies (aka “Flash cookies”) for some time in an attempt to find a way around users deleting normal cookies (which can be up to 4K in size). The regeneration (re-spawning also known as “Zombie cookies”) of regular cookies to prevent deletion is one such […]

Read more

September 8, 2011

Reverse Shell Through DLL Injection

READ THE WHOLE ARTICLE DLL Injection is a popular technique used by attackers to inject an executable file in order to perform a controlled code execution. Several  methods for preventing this has been developed by Operating System’s  creators, but (as we will see) without 100% success. The author presents two methods of a successful attack […]

Read more

August 25, 2011

Articles Redaction No Comments

The DDOS, a New „Old” Type of Attack!

In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers what the mainly motivations pushing hackers to commit criminals act with Botnets and DoS is. You will learn what the DDoS attack structure is and how […]

Read more

August 23, 2011

Magazine Redaction No Comments

Hakin9 StarterKit 2/2011 – DDOS Attacks

The DDOS, a New „Old” Type of Attack! by Orlando Pivi In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers what the mainly motivations pushing hackers to commit criminals act with Botnets and DoS is. […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa