Monday, February 16, 2009

Hacking9

List Of Articles for Download

1. HTTP Tunnel
2. Training – the Security Minefield
3. Client-side Exploits
4. Auditing Oracle in a Production Environment
5. VoIPER
6. Exploitation and Defense of Flash Applications
7. How to Deploy Robustness Testing
8. Cracking LDAP Salted SHA Hashes
9. Remote and Local File Inclusion Explained
10. Writing IPS Rules – Part 3
11. Self Exposure by Dr. Gary McGraw
12. One Time Password – New Dimensions in Security
13. Storming SIP Security
14. Alternate Data Streams or “Doctor Jekyll and Mr. Hyde” move to NTFS
15. Programming with Libpcap - Sniffing the network from our own application
16. Consumers Test - We help you choose the most reliable firewall
17. Analyzing Malicious Code
18. Virtualization and Virtual Machine Software. We help you to choose the best VM
19. VoIP Security
20. Data Recovery Software
21. Defending the Oracle Database with Advanced Security Features
22. Choosing a Router for Home Broadband Connection
23. Designing a crypto attack on the Ccrp (bit shuffling) cipher
24. Analyzing and Mapping Wireless Networks
25. Snort_inline as a solution
26. An interview with Dr. Gary McGraw
27. Simple Event Correlator for real-time security log monitoring
28. Cryptography for Mail and Data
29. Introduction to XPath Injection techniques
30. Tested products - security scanners
31. Firewall leak testing

Download Links:

Netload

or

Rapidashare

No comments:

Post a Comment