Monthly Archives: junho 2013

Vídeo: Top 10 real hacking videos

Top 10 real hacking videos https://www.youtube.com/watch?v=vviaj3mK4WA

Imagem: The 5 most common #hacking methods: http://t.co/yY8vZFi3ro <-- And to avoid them : Awareness, hardening, secure coding and patching.

The 5 most common #hacking methods: http://t.co/yY8vZFi3ro <– And to avoid them : Awareness, hardening, secure coding and patching. http://twitter.com/PrometricCyber/status/345635858076008448/photo/1

Artigo: Adding Vulnerability Scanning Capabilities to Nmap with NSE Vulscan 1.0 | ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects

Adding Vulnerability Scanning Capabilities to Nmap with NSE Vulscan 1.0 | ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects http://www.toolswatch.org/2013/06/adding-vulnerability-scanning-capabilities-to-nmap-with-nse-vulscan-1-0/

Artigo: BYOD blues: What to do when employees leave – CSO Online – Security and Risk

BYOD blues: What to do when employees leave – CSO Online – Security and Risk http://www.csoonline.com/article/735441/byod-blues-what-to-do-when-employees-leave?source=rss_data_protection

Securing access to AWS using MFA – Part I

Securing access to AWS using MFA – Part I http://blogs.aws.amazon.com/security/post/Tx1KJ4H6H5R80UD/Securing-access-to-AWS-using-MFA-Part-I

Veil – AV Evasion –

https://www.veil-evasion.com/

Artigo: Identify Backdoors in Firmware By Using Automatic String Analysis

Identify Backdoors in Firmware By Using Automatic String Analysis http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html

Artigo: Cracking 16 Character Strong passwords in less than an hour

Cracking 16 Character Strong passwords in less than an hour http://thehackernews.com/2013/05/cracking-16-character-strong-passwords.html