Password hashes dump tools https://docs.google.com/spreadsheet/ccc?key=0Ak-eXPencMnydGhwR1VvamhlNEljVHlJdVkxZ2RIaWc#gid=0
Password hashes dump tools https://docs.google.com/spreadsheet/ccc?key=0Ak-eXPencMnydGhwR1VvamhlNEljVHlJdVkxZ2RIaWc#gid=0
VulnVPN (Vulnerable VPN) – Exploiting IKE Aggressive Mode PSK http://www.rebootuser.com/?buffer_share=967de&p=1307
Major Security Issues with Cloud Computing Being Ignored http://news.hitb.org/content/major-security-issues-cloud-computing-being-ignored
This article in our free security tools series focuses on the benefits of the Microsoft Assessment and Planning Toolkit. If you are an IT Professional then you know platform migrations can be a daunting task. Depending on your organization’s size, complexity and maturity, simply understanding you… https://blogs.technet.com/b/security/archive/2013/01/29/microsoft-s-free-security-tools-microsoft-assessment-and-planning-map-toolkit.aspx?Redirected=true Enviada via Flipboard Dispositivo Móvel – VCT
Problems with security seem to pop up all the time—from an easy to hack router to apps that leak your data into the world. Thankfully, it’s pretty easy to protect yourself. Here’s how to do it.Unless you keep up to date on all the security news, it’s easy to miss a bit here and there…
https://www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp Dispositivo Móvel – VCT
[INFOGRAPHIC] The Automated Home of Tomorrow: How Vulnerable is it to Cybercrime? http://blog.trendmicro.com/trendlabs-security-intelligence/infographic-the-automated-home-of-tomorrow-how-vulnerable-is-it-to-cybercrime/
ISO 27001 Checklist: Router Audit Program http://www.desktopauditing.com/iso-270001-checklist-router-audit-program
Free virtual machine management tool https://www.net-security.org/secworld.php?id=14239
ios data interception | research | sprawl http://thesprawl.org/research/ios-data-interception/