Blog

Artigo: dnschef | projects | sprawl

dnschef | projects | sprawl http://thesprawl.org/projects/dnschef/

Artigo: How Red October went undetected for 5 years

How Red October went undetected for 5 years http://www.itproportal.com/2013/01/16/how-red-october-went-undetected-for-5-years/

Artigo: Bitdefender Releases Free Red October Removal Tool | Bitdefender Labs

Bitdefender Releases Free Red October Removal Tool | Bitdefender Labs http://labs.bitdefender.com/2013/01/bitdefender-releases-free-red-october-removal-tool/

Artigo: “Red October” – part two, the modules

“Red October” – part two, the modules https://www.securelist.com/en/blog/208194091/Red_October_part_two_the_modules

Artigo: O Que Não Se Ensina Sobre “Pensar Como o Inimigo”

Assim como não existe apenas um idioma estrangeiro, não existe só um tipo de inimigo. Eis que entre potenciais atacantes, nem todos pensam da mesma forma. Mesmo entre aqueles que se juntam para uma missão ou objetivo comum, com frequência há divergências sobre como alcançar o objetivo. Então, q… http://www.cic.unb.br/~pedro/trabs/peteherzog.html

Artigo: Two Years of Fast and Easy Hacking

Two Years of Fast and Easy Hacking http://blog.strategiccyber.com/2012/11/28/two-years-of-fast-and-easy-hacking/

Artigo: How to Find a Backdoor in a Hacked WordPress Site and Fix It

How to Find a Backdoor in a Hacked WordPress Site and Fix It http://www.wpbeginner.com/wp-tutorials/how-to-find-a-backdoor-in-a-hacked-wordpress-site-and-fix-it/

Artigo: Util – Win32 Window Handle Hijack (simple) v1.0.exe

Util – Win32 Window Handle Hijack (simple) v1.0.exe http://diniscruz.blogspot.co.uk/2012/11/util-win32-window-handle-hijack-simple.html

Artigo: Good Practice Guide for Addressing Network and Information Security Aspects of Cybercrime — ENISA

Good Practice Guide for Addressing Network and Information Security Aspects of Cybercrime — ENISA http://www.enisa.europa.eu/activities/cert/support/fight-against-cybercrime/good-practice-guide-for-addressing-network-and-information-security-aspects-of-cybercrime

Artigo: ISM – Information Security Manual

ISM – Information Security Manual http://www.dsd.gov.au/infosec/ism/index.htm