+

Tagged With / 'Traditional'

November 21, 2011

Password, What Password?

Exploiting Software 03/11Password, What Password?

Malware Analisys for Windows Systems Administrators Using Sysinternal Tools By Dennis Distler Today administrators deal with malware infections almost daily. Often malware is customized for specific organizations, departments in an organization, and even individuals in the organization. This type of malware typically is not identified by anti-virus products, and it is up to the administrator […]

Read more

September 19, 2011


Cyber Security: SCADA Systems

Event: Cyber Security: SCADA Systems A technical exploration of protecting SCADA, smart grid and real-time systems Date: 2 December 2011 Venue: IET London: Savoy Place www.theiet.org/scada Join us at our exciting Cyber Security: SCADA Systems seminar to explore the technical world of protecting SCADA, Smart Grid and Real Time Systems, plus demonstration workshops and a […]

Read more

August 25, 2011


Java Script Botnets – Implementation of Browser-based Malware and DDOS Attacks

Most of the botnets currently used by cybercriminals are imple mented in traditional languages such as C++. More recent example are written in Java, achieving some degree of portability but the basically share the same limitations. All these botnet creators fac the same problems, first they need to create a Command & Contro center, to […]

Read more

August 23, 2011

DDOS Attacks

Hakin9 StarterKit 2/2011 – DDOS Attacks

The DDOS, a New „Old” Type of Attack! by Orlando Pivi In this article, Orlando presents the DDoS attack structure and the Botnet structure . He will explore DDoS attack, the Botnet prevention and the DoS defense systems. He discovers what the mainly motivations pushing hackers to commit criminals act with Botnets and DoS is. […]

Read more

July 8, 2011

Online Banking Security Magazine 2/2011

Analyzing the Biggest Bank Robbery in History: Lessons in OSSTMM Analysis

DOWNLOAD THE FREE ISSUE AND READ THE WHOLE ARTICLE! Many banks have no idea what a powerful weapon against attacks they have in the OSSTMM. The Open Source Security Testing Methodology Manual is a free, collaborative project by the international, non-profit ISECOM that is years ahead of traditional security methods. The power and elegance of […]

Read more

July 2, 2011

9781597496049

Review of Web Application Obfuscation

Review of Web Application Obfuscation By Aby Rao, MS, CISSP, Security+, ITIL-F, ISO/IEC 20000, Project+ Principal, Verve Security (http://www.vervesecurity.com) www.syngress.com   Obfuscation – the act or an instance of making something obscure, dark, or difficult to understand It’s quite uncommon for a technical book to have such a “heavy” word in its title. Please don’t […]

Read more

June 15, 2011

ninja cover

Ninja Hacking

Ninja Hacking By Thomas Wilhelm, Jason Andress Publisher: Syngress October 2010 U.S., November 2011 EMEA www.syngress.com Description Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your […]

Read more

June 2, 2011

Articles admin Comments Off

VoIP Access Control

Access control is a means by which we determine whether an agent is allowed to gain entry to a particular resource. In the case of physical security or even traditional network security, this may seem straightforward. For example, if you trust someone to gain access to a room where critical resources are kept, you provide […]

Read more

June 1, 2011

Magazine admin Comments Off
Insceure Acces Control

Insecure Access Control 06/2011

Latest News From the IT Security World by Armando Romeo, eLearnSecurity ID Theft Protect A Hole in Your Access Control! by Ali Al-Shemery A couple of days ago I was called out to a do a security audit on a company’s internal network security and its access control. The audit was asked to be done […]

Read more

April 1, 2011

Free Issues Magazine admin Comments Off
Mobile Security - Hakin9 04/2011

Mobile Security – Hakin9 04/2011

Passware Forensic Kit 10.3 – reviewMICHAEL MUNT SpyShelter Application – reviewDAVID KNIFE How to use NetcatMOHSEN MOSTAFA JOKARNetcat is a network utillity for reading and writing network connections that support TCP and UDP protocol. Netcat is a Trojan that opens TCP or UDP ports on a target system and hackers use it with telnet to […]

Read more

April 1, 2011

Articles admin Comments Off

Death Knell Sounds For Traditional Tokens ANDREW KEMSHALL

There is an often used phrase that the stars have aligned but, in 2011, it is the technology that has come together to hammer the final nail into the physical tokens’ coffin. The cynical among you would argue that this statement has been made before and yes, I concede that tokens have survived and are […]

Read more

November 1, 2010


Cyber State-Bullying

We know offensive cyber tools can be effective, and we’re all unprepared, and all building the capabilities to attack and defend. Will we actually go through with a full-scale conflict, or will we just use these to intimidate each other and expand defense budgets? Author: MATTHEW JONKMAN Source: Hakin9 11/2010 https://hakin9.org Stuxnet has changed the game and brought […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa