Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

«HAKIN9 2006 ISSUE 2 English Language»

Posted By: Spymaker
«HAKIN9 2006 ISSUE 2 English Language»

«HAKIN9 2006 ISSUE 2 English Language»
Publisher: Hakin9 | Issue 02/2006 | ISBN: n/a | Pages: 84 | PDF | 6.7 MB


»Tools – Steganos Security Suite 6

Carlos Ruiz
The author presents SSS 6, a complete security package with different security tools for protecting your PC combining encryption with steganography.

»Tools – WS-DNS-BFX

Daniel de
The author describes how WS-DNS_BFX works and what kind of advantages you can have thanks to using it.

»Constructing a hooking-oriented size disassembler for malware analysis

Ruben Santamarta
How you can fight the malicious code? To achieve this essential objective we have to analyse in detail the inner works of malware using reverse engineering. Ruben Santamarta prompts how to use Structure Exception Handling to create a size disassembler.

»Snort_inline as a solution

Pierpaolo Palazzoli,
From this article you will learn how Snort_inline works, what are the basics of Intriusion Prevention Systems and how to tune Snort_inline configuration. authors also present the ways to add a dedicated device which is best suited for the environment we want to protect.

»Can one fool application-layer fingerprinting

Piotr Sobolewski
Numerous tools exists and allow us to determine what service runs on some given port and what software provides it. Let's try to understand how they work and check than if it's possible (easy) to trick them.

»IE plugins: BHOs and toolbars

Gilbert Nzeka
The author presents online advertisement industry strategies. One of the problem advertisers face is: how can they increase the ROI by targeting more users? The answer - by developing toolbars and other types of Internet Explorer plugins which enable them to spy and sometimes to control the navigation of users.

»Security violation and policy nforcement with IDS and firewall

Arrigo Triulzi,
In this article we discuss how to detect security violation of a firewall policy using a Network Intrusion Detection System (NIDS) comparing in real time traffic on the outside with traffic on the inside and alerting if it's contradicting the rules. Arrigio Triulzi and Antonio Merola show how NIDS can be used in the specific case of firewall failure.

»An interview with Dr. Gary McGraw


Our expert on IT security situation, careless private users, vulnerabilieties in the systems and hackers community.

»Books reviews


Reviews of books: 19 Deadly Sins of Software Security, Fundamentals in Computer Security, Linux Server Security, Network Security Bible.

»Column – Spammers fortune

Konstantin Klyagin
King for a day, spammer for a lifetime… Konst column on protection against SPAM and outsourcing role.