Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    «HAKIN9 2006 ISSUE 1 English Language»

    Posted By: Spymaker
    «HAKIN9 2006 ISSUE 1 English Language»

    HAKIN9 2006 ISSUE 1 English
    Publisher: Hakin9 | Issue 01/2006 | ISBN: n/a | Pages: 84 | PDF | 7.9 MB


    »Metasploit Framework

    The author presents Metasploit, a development environment designed to ease the work of penetration testers and network security analysts.

    »GFI LANguard Network Security Scanner

    Tomasz Nidecki
    The author describes how GFI LANguard NSS works and what kind of advantages you can have thanks to the security scanner.

    »Rootkits under Windows platforms

    Nzeka Gilbert
    We present the link between kernel hackers and corporations having webmarketing businesses which develop spywares or adwares to profile websurfers and corporations like Sony. Find out what the guiding principles of rookits are and what kind of techniques and tools can be used by rootkits developers.

    »Simple Event Correlator for real-time security log monitoring

    Risto Vaarandi
    Over the past decade, event correlation has become a prominent event process in technique in many domains. However, existing open-source log monitoring tools don't support it well. We present what correlation is, what was the motivation for its developing and how to employ SEC for monitoring and correlating events from security logs.

    »Writing advanced Linux backdoors – packet sniffing

    Brandon Edwards
    As people create new defenses for backdoors, intruders are forced to innovate new techniques to keep pace with the rapidly progressing security industry. One of them is packet sniffing backdoors. We show you how it works and how to use it in practice.

    »Cryptography for Mail and Data

    Lars Packschies
    Should we put our confidencial information in an e-mail and send it around the world? What is the cryptography role in more secure communication? We present how to set up and use keys GnuPG and how encrypt data on the filesystem level.

    »Network Defense Applications using Sinkholes

    Victor Oppleman
    A little-talk-about network security technique has proven one of the most effective means of defense against denial-of-service attacks. In this article we describe sinkoholing usage techniques and present methods of protection.

    »How to cook a covert channel

    Simon Castro
    Before starting to cook your covert channel, you first have to think about the receipt: how your cover channel will look like, what it will be used for and when you'll have your dinner. We make the menu, and teach you how to prepare a stealth control communication channel. Are you ready for cooking?

    »There is no absolute security

    We talk to a research associate worker at the local electronic data processing centre of the University of Cologne. How to use cryptographic solutions? Find out in this article.

    »Column – Beware the monitor-crashing worm

    Konstantin Klyagin
    Would you like to get a hammer and smash the monitor in front of you? Take it easy, Konstantin Klyagin proves that you can love e-mail worms.