Monthly Archives: maio 2012

RJLPranks.com

RJLPranks.com http://www.stumbleupon.com/to/s/1HqA7h

Five Best Computer Diagnostic Tools

Five Best Computer Diagnostic Tools http://www.stumbleupon.com/to/s/2TPAE3

Change the Windows 7 Login Screen Background Image

Change the Windows 7 Login Screen Background Image http://www.stumbleupon.com/to/s/1K3XIN

Article: skipfish

skipfish http://code.google.com/p/skipfish/

Article: A technical analysis of Adobe Flash Player CVE-2012-0779 Vulnerability – Microsoft Malware Protection Center – Site Home

A technical analysis of Adobe Flash Player CVE-2012-0779 Vulnerability – Microsoft Malware Protection Center – Site Home http://blogs.technet.com/b/mmpc/archive/2012/05/24/a-technical-analysis-of-adobe-flash-player-cve-2012-0779-vulnerability.aspx

Article: Protecting a Laptop from Simple and Sophisticated Attacks

Protecting a Laptop from Simple and Sophisticated Attacks https://grepular.com/Protecting_a_Laptop_from_Simple_and_Sophisticated_Attacks

Article: BeEF – The Browser Exploitation Framework Blog: BeEF In a Real World Pen Test – Part 2: Tasty BeEF nuggets, line, hook and sinker (Social Engineering to get a hook)

BeEF – The Browser Exploitation Framework Blog: BeEF In a Real World Pen Test – Part 2: Tasty BeEF nuggets, line, hook and sinker (Social Engineering to get a hook) http://blog.beefproject.com/2012/05/beef-in-real-world-pen-test-part-2.html

Article: Top 10 Most Searched Metasploit Exploit and Auxiliary Modules

Top 10 Most Searched Metasploit Exploit and Auxiliary Modules http://www.toolswatch.org/2012/05/top-10-most-searched-metasploit-exploit-and-auxiliary-modules/

Article: Anatomy of a security hole – the break that broke sudo

Anatomy of a security hole – the break that broke sudo http://nakedsecurity.sophos.com/2012/05/21/anatomy-of-a-security-hole-the-break-that-broke-sudo/

Article: PHP 5.4 Remote Exploit PoC in the wild

PHP 5.4 Remote Exploit PoC in the wild http://isc.sans.edu/diary.html?rss&storyid=13255