Blog

Article: Top 5: Corporate Losses Due to Hacking

Top 5: Corporate Losses Due to Hacking http://www.hotforsecurity.com/blog/top-5-corporate-losses-due-to-hacking-1820.html

Article: Cisco Study: IT Saying Yes To BYOD

Cisco Study: IT Saying Yes To BYOD http://newsroom.cisco.com/press-release-content?articleId=854754&type=webcontent

Article: A Security-Oriented Approach to IP Addressing

A Security-Oriented Approach to IP Addressing http://www.cisco.com/web/about/security/intelligence/security-for-ip-addr.html

Article: ExitProcess Shellcode

ExitProcess Shellcode http://blog.didierstevens.com/2012/05/14/exitprocess-shellcode/

Article: The Art of Exploiting SQL Injection

The Art of Exploiting SQL Injection https://www.blackhat.com/html/bh-us-12/training/courses/bh-us-12-training_exploiting-sql-injection.html

Article: The Debian Administrator’s Handbook

The Debian Administrator’s Handbook http://static.debian-handbook.info/browse/stable/

Article: Building the Network You Need with OpenBSD’s PF

Building the Network You Need with OpenBSD’s PF http://home.nuug.no/~peter/pf/bsdcan2012/

Article: truecrack – Password cracking for truecrypt(c) volume files.

truecrack – Password cracking for truecrypt(c) volume files. https://code.google.com/p/truecrack/

Article: A look at object confusion vulnerability (CVE-2012-0779) in Adobe Flash

A look at object confusion vulnerability (CVE-2012-0779) in Adobe Flash http://scrammed.blogspot.it/2012/05/look-at-object-confusion-vulnerability.html

Article: Manual Unpacking of UPX Packed Binary File

Manual Unpacking of UPX Packed Binary File http://securityxploded.com/unpackingupx.php