Security

Introduction

One thing I have always maintained is that aspiring or practicing penetration testers who use an exploitation product (such as CANVAS, Core Impact, Metasploit) should know how buffer overflows actually work. Having this knowledge will help you understand the circumstances under which these products can work, will help you troubleshoot when things don't work and will correct unrealistic expectations about what the products are capable of.

In addition, being able to reproduce buffer overflow exploits will also give you the tools to more accurately assess the risk of discovered vulnerabilities as well as to develop effective countermeasures for exploits out in the wild. These are important skills for incident responders and for those attempting to protect their networks.
Read more..
Your rating: None Average: 3.7 (112 votes)



Ebay Hack*****tip
General Keyboard Shortcuts
Get In Windows 2000 As Administrator
Get the Most Out of Your DVD Recorder
Get The Music You Want To Hear
Get unlimited bandwidth from your host for free
Getting A 1gb China Account
Getting Counter-strike Source To Work
getting movies, mp3,games using google
Getting older programs to run on Windows XP
Getting started with Linux for nOObs!
Go to Windows updates anonymously
Google ***** Search
Google secrets
Google Tips & Tricks, (utilizing search engine)

Guide For Getting Free Stuff
Guide to IIS Exploitation
Guide to Slipstreaming Service Pack 2
Hardware Firewall
How To Add An Option To Print, the Contents of a Folder!
How To Add Your Own Windows Tips
How to Back Up the Registry
How To Backup Ps2 Games
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING
How To Block Websties Without Software, block websitesRead more..
Your rating: None Average: 3.5 (13 votes)

Title: Ethical Hacking & Penetration Testing 
Author: Brad Causey & Bobby Rogers 

Computer Hacking is no longer the black art of computer geniuses. Exploit scripts and hacks are available to anyone with a web browser, so prepare yourself to protect your network by looking at security from a hacker’s eyes. Understanding what attack vectors might be used on your systems is a fundamental piece of the security toolkit. VTC Authors Brad Causey and Bobby Rogers present computer security from an angle that aims to put you into the seat, to protect your network through Ethical Hacking and Penetration Testing. To begin learning today, simply click the links. 

Title Description Read more..
Your rating: None Average: 3.7 (50 votes)



CONTENT:

Module 01 - Getting Started with Nmap
Module 02 - Nmap Basics
Module 03 - Scans for Every Occasion
Module 04 - Back Pocket Scans
Module 05 - Useful Scanning Options
Module 06 - Nmap Pings - The Search for Hosts
Module 07 - Recon Scanning
Module 08 - Ninja Scanning
Module 09 - Output Options
Module 10 - Windows and Nmap
Module 11 - Real-World Nmap Scanning
Bonus Content

Download:

http://rapidshare.com/files/245053442/GSM-pmnstc.part01.rar
http://rapidshare.com/files/245058537/GSM-pmnstc.part02.rar
http://rapidshare.com/files/244999106/GSM-pmnstc.part03.rar
http://rapidshare.com/files/245003889/GSM-pmnstc.part04.rar
http://rapidshare.com/files/245008510/GSM-pmnstc.part05.rar
http://rapidshare.com/files/245013020/GSM-pmnstc.part06.rar
http://rapidshare.com/files/245017998/GSM-pmnstc.part07.rar
http://rapidshare.com/files/245023011/GSM-pmnstc.part08.rar
http://rapidshare.com/files/245027104/GSM-pmnstc.part09.rar
http://rapidshare.com/files/245031301/GSM-pmnstc.part10.rar Read more..
Your rating: None Average: 2.7 (11 votes)


PHP's default configuration file, php.ini (usually found in /etc/php.ini on most Linux systems) contains a host of functionality that can be used to help secure your web applications. Unfortunately many PHP users and administrators are unfamiliar with the various options that are available with php.ini and leave the file in it's stock configuration. By utilizing a few of the security related options in the configuration file you can greatly strengthen the security posture of web applications running on your server. Read more..

Your rating: None Average: 3.5 (6 votes)

Is Linux secure? The question is much less useful, than 'Is Linux "securable"?' The answer to the latter is a definite yes.

Being securable means that Linux can be made more secure (to whatever degree necessary) by applying a clearly defined sequence

of steps that always produces the same result, and that can be automated and applied to systems that have been in operation for

a long time. It would be ideal to be able to make securing systems understandable by regular system administrators who don’t

have formal security training. However, the last requirement might be pushing it a bit, since security will likely always

require expertise.

Linux can be made more secure by hardening the system.

=================
| 1) Intruduction |
===================

I wrote a step by step paper how to secure linux server with cP/WHM and
Apache installed. By default, linux is not secured enough but you have
to understand there is no such thing as "totally secured server/system".
The purpose of this paper is to understand how to at least provide some
kind of security to the server. I prefer lsws web-server without anyRead more..
Your rating: None Average: 4.8 (22 votes)

Search

Loading

Sponsered links

Bookmark Us!

Share/Save

Page Rank

Quotes

If you born as a poor, its not your mistake.But if you dead as a poor, its your own mistake
— Bill Gates

Explore Tags

Follow Us