Журнальчик Hakin9

0x00

Professional
Messages
127
Reputation
28
Reaction score
44
Points
28
Привет коллеги)

Может кому будет интересно почитать журнальчик Hakin9...если вы первый раз о нем слышите, это что то нашего советского Хакера.. только на английском..надеюсь английский уже все выучили ;)

И так вот последний декабрьский номер:

Темы номера: Botnets, Malware, Spyware звучит не плохо ;)

goo.gl/OCGZu

Size: 4.77MB

А это все остальные что я нашел и собрал вместе:

goo.gl/qIr72

Size: 97.11MB

Pass: carder.market

В общем рекомендую к прочтению, местами темы задвигают там интересные.
Приятного чтива и умных мыслей в голове )
Гуд лак!
 

krec

Professional
Messages
530
Reputation
10
Reaction score
39
Points
28
+ конечно.
но есть вопросы:
там только подписка на эл. версию или можно на бумажном?
А как насчет сакрдить ? ;) довно хотел спросить, но думал тут меня не так поймут ребята :)))))))
 

0x00

Professional
Messages
127
Reputation
28
Reaction score
44
Points
28
Январский выпуск..
Тема номера: Cybercrime and Cyberwar Predictions for 2011

Pros and cons of partial passwords in web applications

Almost every web application requires some kind of authorization. Most of them use user password authorization. And most of time one is forced to type full password. Is this solution convenient Probably yes. Is it secure? Not quite. There are few solutions of authorization by password. Let’s consider one of them called partial passwords.
- Darek Łysyszyn


Target Attacks via Email

After the lecture of this article we will be able to understand how the target attacks by email work, what are their targets and what are the malwares used. We will also see how easy it is to create an exploit based on public information.
- Pedro Bueno


Spyware Threat Invades BlackBerry App World

Lately, Google’s Android Market has attracted the attention of the security community for not vetting or ensuring the authenticity of the applications posted on its app market. Earlier this year, the Junos Pulse Global Threat Center team performed a thorough analysis of the Android Market and unveiled numerous malware applications disguised as utilities or game applications. Since then, several research studies of the malicious nature of applications on Android Market have surfaced and all the studies concluded that the Android Market has been hosting a large number of malicious applications, which forced Google to enforce a Remote Kill switch for the malicious applications.
- Mayank Aggarwal


Open WiFi and Firesheep

Recently there’s been a lot of commotion in the press about a new threat to privacy at open WiFi hotspots known by the humorous moniker Firesheep. What’s new about Firesheep isn’t the exploit – HTTP session hijacking has been well known for years – it’s that Firesheep is a simple Firefox plug-in that is available to anyone and requires no technical expertise to utilize. In other words it allows anyone with Firefox and Firesheep to be a hacker. No experience required.
- Joseph Webster


Cybercrime and Cyberwar Predictions for 2011

In my last article, I showed you where to find some of the best and mostly untapped resources available to improve your personal computer and network security posture. In this article, I will share with you some great resources on researching trends of Cybercrime and Cyberwar and from my own research my conclusions on what is coming our way in 2011.
- Gary Miliefsky


Sharing Malware

There is a lot of malware out there, and a lot of people interested in analyzing what they can find. Commercial services, friendly alliances, and others set up to collect and share those samples. Is this a good idea?
- MATTHEW JONKMAN

The Social Web Threat

___http://www.sendspace.com/file/64d83f
 
Top