http://p42.us/ http://sirdarckcat.blogspot.com/ http://ha.ckers.org/ http://php-ids.org/ http://pentestmonkey.net/blog/ http://kuza55.blogspot.co
In the last years I have been working on my PHP Scanner (now called RIPS) which has been released recently during the Month Of PHP Security and was awarded as the 2nd best external submission. RI
1.http://grey-corner.blogspot.com/2010/01/beginning-stack-based-buffer-overflow.html2.http://grey-corner.blogspot.com/2010/01/seh-stack-based-windows-buffer-overflow.html3.http://grey-corner.blogspot.
http://www.question-defense.com/2010/06/01/backtrack-4-information-gathering-route-netenum-produce-lists-of-hosts-for-other-programs
BackTrack 5 将在2011年2月,届时BackTrack 4将不再支持BackTrack 4 Development Roadmap June 2010 Freeze kernel and driver developmentImport new toolsImport security fixes July 2010 Freeze the desktop environme
警告:以下命令可能引起cisco路由器崩溃nmap -sU -sV -p 161-162 -iL target_file.txt(target_file.txt 目标清单)原文链接:http://www.h-online.com/security/news/item/Please-scan-softly-your-router-could-crash-1032725.h
1.http://lists.grok.org.uk/pipermail/full-disclosure/powered by http://secunia.com/2.http://seclists.org/
cs litefirebugheader spynoscriptserver spyshow ipskipscreenhttps-everywhereAdBlockThunder,QQDownload,FlashGet Files Downloadereset key finderremove cookies for siteclick&clean
什么是加密文件系统1.加密文件系统通过将加密服务集成到文件系统 2.基于块设备的系统级加密方案加密文件系统的分类1.面向网络存储服务(nfs)或称为网络加密文件系统2.本地加密文件系统(1).在原有的普通文件系统上直接加入加密功能(2).堆叠式加密文件系统(Stackable Cryptographic File System)加密文件系统比较Waycryptic 是一个堆叠式加密文件系统,通过
Data Loss Prevention
1.http://searchsecurity.techtarget.in/guide/securitySchool/0,296293,sid204_gci1367218,00.html2.http://searchsecurity.bitpipe.com/rlist/term/Data-Loss-Prevention-(DLP).html3.http://searchsecurity.techt
Encrypting Block DevicesThe second approach mentioned in this article is encrypting block devices. This includes encrypting entire disks or disk partitions. This approach has some appeal because you d
1.Working with Encryption and LinuxThere are basically three options when talking about encrypting your data on a Linux system. The options are: (1) encrypting a single file, (2) encrypting a director
Here we see that the Perl Compatible Regular Expression (PCRE) library is being used. Success. At this point you could do a make install, as root of course, and the binaries and support files will
As an organization adds more and more hosts, both physical and virtual, its system administrators must spend more and more time ensuring that all hosts comply with policy. This results in an explosive
http://www.cyberciti.biz/faq/centos-fedora-rhel-nfs-v4-configuration/
CIITIX-WiFi is a turnkey solution to your WiFi hotspot needs. Built onto the rock solid stable debian linux, setting up a secure (TTLS) WiFi hotspot is just a minute away. This guide shows how to set
LogFile Viewers MultiTail View multiple logfiles windowed on the console System Log Viewer A system log viewer for GNOME KSystemLog System log viewer for KDE 4 Xlogmaster GTK+ ba
今天笔记本被人抢了!!!!!! 资料全没了
Managing Cisco Network Security包含以下部分:Cisco IOS Command Reference Network Security Instructor Guide Network Security Instructor Lab Manual Network Security Instructor Lab Notes Network Security In
InfoSec Institute provides this highly-rated 7 Day CISSP Boot Camp to the Information Security community共分为三部分:http://hotfile.com/dl/45959410/b2c3f5a/InfoSec.Institute.CISSP.Boot.Camp.Online_M1.part1.
Following up on "Implementing One-way Encryption in PHP," my previous tutorial about using one-way encryption to build a secure online diary application, this article explores using PHP encrypti
windows: 1.Windows Server Update Services (wsus) 2.Microsoft Baseline Security Analyzer 3.GFI LANguard linux: 1.yum and apt 2.nessus 3.securityfocus,isc.sans.org cve.mitre.org/ etc
第一是要有热情,我在写这本书的时候,也是每天都在考虑如何更好的改善系统安全,热情是必不可缺第一条件。第二就是收集信息和材料,我们在网络上收集一些信息,我们需要关注安全领域实时的信息。第三就是认识尽可能多的安全行业中的领袖人物。 http://www.hackingexposed.com/ http://netsecurity.51cto.com/art/2010
Two developers have refined techniques for rummaging through browser histories to the extent that web sites can now find out what articles a user has recently read on news sites, their exact postcod
A first impression of Google's Skipfish scanner for web applicationsAccording to a Google security blog post by developer Michal Zalewski, Google's new, free Skipfish scanner is designed to be fast
1. Type about:config into the Firefox URL/address bar and hit ENTER. You will be warned that you might void your warranty if you change some advanced settings, but just go on and trust me :-)2. Ins
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will b
Old Unix hands already know this, but new Unix (Linux) users may be asking, ‘What is a “watchdog script”?’ Basically it is a bash or other script that is run via cron periodically to check on a pers
Open Source File Transfer 24. WinSCP Replaces CuteFTP, FTP Commander This utility makes it easy to transfer files using SFTP or SCP. It also includes a fairly basic file manager and FTP tran
Copyright © 2005-2024 51CTO.COM 版权所有 京ICP证060544号