Wednesday, February 3, 2016
Posted by manager
Reader's rate:
0
Contributed by Eric A. Simmons These days one would be hard pressed to find lucrative employment with a company that is not, to some extent, international. In order to maintain connections and communications, travel is inevitable. Living in the digital age requires much more planning than... + continue reading
Thursday, January 14, 2016
Posted by manager
Reader's rate:
0
Contributed by Securosis Prevention isn’t enough, whether you deploy it on the network or endpoints or both. It’s not clear that it ever was, but there is additional proof every day that adversaries cannot be reliably stopped. We see the beginning of the long-awaited shift of focus and funding... + continue reading
Monday, January 4, 2016
Posted by manager
Reader's rate:
5
Contributed by Zamteng Blind SQL injection is a type of SQL Injection attack that asks the database true or false questions and determines the answer based on the applications response (Content-based, Time-based) This document is in PDF format. To view it click here. + continue reading
Thursday, December 31, 2015
Posted by manager
Reader's rate:
0
Contributed by Jeffrey E. Hammonds As a Network Monitoring System Administrator I have gained a substantial amount of experience using different versions of SNMP. The purpose of this paper is to discuss the history of SNMP over the years and the security (or lack thereof) that the different... + continue reading
Tuesday, December 29, 2015
Posted by manager
Reader's rate:
0
Contributed by A. Michele Parrish Ransomware could be a potential problem for users of electronic devices. This paper will examine ransomware. I will discuss what it is and how your device can be infected. I will explore the reasons why it is growing and the new devices it is infecting. I will... + continue reading

Home Page

Featured Articles

Monday, 04/01/16 - 0 comment(s)
Contributed by Zamteng Blind SQL injection is a type of SQL Injection attack that asks the database true or false questions and determines the answer based on the applications response (Content-based, Time-based) This document is in PDF format. To view it click here. + continue reading
Tuesday, 29/12/15 - 0 comment(s)
Contributed by A. Michele Parrish Ransomware could be a potential problem for users of electronic devices. This paper will examine ransomware. I will discuss what it is and how your device can be infected. I will explore the reasons why it is growing and the new devices it is infecting. I will also explain ways in which a normal user can... + continue reading

Red Tape

375
reads
11 today
Wednesday, 03/02/16 - 0 comment(s)
Contributed by Dr. Anton Chuvakin All organizations have to care about security incident response! Unlike detection and prevention, the response is impossible to avoid. While it is not uncommon... + continue reading

Cryptography

562
reads
3 today
Monday, 11/01/16 - 0 comment(s)
Contributed by M. Orumiehchi Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from... + continue reading

Exploitation

541
reads
5 today
Monday, 11/01/16 - 0 comment(s)
Contributed by Aditya K Sood This article define the layout of the exploiting factors of web attacks ie where the JSON framework is compromised.The article is consistent in explaining the pros of... + continue reading

Sistema

606
reads
6 today
Monday, 11/01/16 - 0 comment(s)
Contributed by Don Mosley The area of real-time Intrusion Detection and Prevention utilizing intelligent routers or various network attached appliances has received much press in the last few... + continue reading

Et Cetera

424
reads
9 today
Wednesday, 03/02/16 - 0 comment(s)
Contributed by Frank Isaacs VNC (Virtual Network Computing) is an open-source, cross-platform protocol for viewing GUI desktops on remote machines within a LAN or over a WAN/Internet connection.... + continue reading

Recommended Reading

1.124
reads
10 today
Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading