- Guideline for Implementing Cryptography in the Federal Government (Second Edition)
- Hashing out encryption
- Ultimate Guide to Enterprise Wireless LAN Security
- Generating Policies for Defense in Depth
- Rootkits for Fun and Profit
- Tracking The Malware Battle
- RSA: Microsoft to push new antiphishing technology
- Pentagon to Contractors: Meet DOD InfoSec Standards
- On DDoS Attack Activity
- How digital forensics relates to computing
- NIST Competition to create new Hash algorithm
- The Google blacklist
- Blu-ray Encryption Defeated
- Rustock.B Analysis
- 10 Steps To Make Your Firewall More Secure
- SHA-1 Cracked?
- How trustworthy is hardware-based memory acquisition?
Archive for January, 2007
Week’s Links
Sunday, January 28th, 2007Wikipedia database dump
Friday, January 26th, 2007Lol: Apple Hardware
Friday, January 26th, 2007Hardware Apple vario…
http://blogs.nnm.ru/novye_produkty_apple
Week’s Links
Sunday, January 21st, 2007- Social Engineering: A Means To Violate A Computer System
- An Introduction to Information System Risk Management
- Investigations Involving the Internet and Computer Networks
- List of frequently seen TCP and UDP ports and what they mean
- Review: Six Rootkit Detectors Protect Your System
- The Surprising Security Threat: Your Printers
- Security in the World of Web 2
- Open Source Digital Forensics Tools: The Legal Argument by Brian Carrier
- Immunity SILICA – Redefining Penetration Testing
- Digital Forensics using Linux and Open Source Tools
- Evaluating Commercial Counter-Forensic Tools
- TCP: Fundamentals and General Operations
- Rootkit Basics
- Malicious Intrusion Techniques – A Review of Rootkits, Bots, Trojan Horses, and Remote Access Trojans (RATs)
- Backtracking Intrusions
- On the Effectiveness of Probabilistic Packet Marking for IP Traceback under Denial of Service Attack
- Integrating OpenID and Infocard
- Ben Laurie and the “Kittens” phishing attack
- Phishing and OpenID: Bookmarks to the Rescue?
- Data-mining Wikipedia
- It Bears Repeating
- This is 911. Please upload your video
- Sending Photos to 911 Operators
- Intel Centrino ipw2200BG Wireless Driver Buffer Overflow (Exploit)
- Dogbert’s Password Recovery Service
- Vista, RAM dumps, and OS detection
- Evolving the antimalware technology model
- Exposure exposed!
Cinema: 007 Operazione Thunderball
Sunday, January 21st, 2007007 – Operazione Thunderball: Continuo nella mia missione di riguardarmi tutti i 007, come facevo quando ero piccolo. Questi si che sono gran bei vecchi film.
Citazione: "..una signora non si apre da sola la portiera dell’automobile"
Citazione: "Ma che lavoro fai? Si puo’ sapere!" "Il commesso viaggiatore. Con licenza di combinare guai"