tutorial about web security computer networking

tutorial about web security computer networking

Sabtu, 06 Agustus 2011

Go Exploring to find hidden gems like Spanish Fork Disc Golf Course

›
OK. So I must admit, this post does not really go too well with the theme of this blog. This is tutorialish, nor is it very geeky (unless y...
Jumat, 29 Juli 2011

Sorting Windows events by UserID

›
Sorting Windows events by UserID is a critical piece of auditing. In the code and examples below, I concentrate on: $Logs="System"...
Kamis, 28 Juli 2011

Review of Metasploit: The Penetration Tester's Guide Posted

›
Amazon.com just posted my four star review of Metasploit: The Penetration Tester's Guide by David Kennedy, Jim O’Gorman, Devon Kearns, ...

Review of Hacking: The Art of Exploitation, 2nd Ed Posted

›
Amazon.com just posted my five star review of Hacking: The Art of Exploitation, 2nd Ed by Jon Erickson. From the review : This is the last...

Review of Gray Hat Hacking, 3rd Ed Posted

›
Amazon.com just posted my three star review of Gray Hat Hacking, 3rd Ed by Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Le...

Review of Ninja Hacking Posted

›
Amazon.com just posted my four star review of Ninja Hacking by Thomas Wilhelm and Jason Andress. From the review : Ninja Hacking is not a ...

Review of Managed Code Rootkits Posted

›
Amazon.com just posted my five star review of Managed Code Rootkits by Erez Matula. From the review : Managed Code Rootkits (MCR) is one o...
‹
›
Beranda
Lihat versi web
Diberdayakan oleh Blogger.