Security & Encryption
epub |eng | 2013-07-22 | Author:Peter Loshin

Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category: Network Security March 26,2014 )
epub, pdf |eng | 2012-08-27 | Author:Mike Shema

Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2012-11-22 | Author:Derrick Rountree

3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
( Category: Network Security March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny

Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category: Cloud Computing March 26,2014 )
epub |eng, eng | 2012-08-22 | Author:Andy Greenberg

Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2010-08-24 | Author:Himanshu Dwivedi [Himanshu Dwivedi]

IAX.Brute performs the passive dictionary attack and, using these examples, identifies the password as 123voiptest. Active Dictionary Attack In addition to passive attacks, IAX is also vulnerable to pre-computed dictionary ...
( Category: Hacking March 26,2014 )
epub |eng | 2012-11-08 | Author:Steve Winterfeld

Physical Warfare Cyber warfare can have great impact on the way physical war is waged. Given that even strictly physical warfare, in the sense of boots on the ground, depends ...
( Category: Network Security March 26,2014 )
epub, mobi |eng | 2012-11-19 | Author:Stephen D. Gantz & Daniel R. Philpott

Relevant Source Material Several NIST Special Publications and Federal Information Processing Standards provide guidance, recommendations, and instructions relevant to the development of system security plans and their use in support ...
( Category: Network Security March 26,2014 )
epub |eng | 2011-12-10 | Author:EC-Council [EC-Council]

5-10 Chapter 5 Copyright © by All rights reserved. Reproduction is strictly prohibited Figure 5-3 This reverse trace can identify an attacker, even when using reflectors. logs, an investigator can ...
( Category: Networks March 26,2014 )
epub, mobi |eng | 2011-09-05 | Author:Joel Brenner

WIKILEAKS’S STATEMENT of purpose is high-minded. In its view, “principled leaking” changes history for the better, and “transparency in government activities leads to reduced corruption, better government and stronger democracies.” ...
( Category: Social Aspects March 26,2014 )
epub, pdf |eng | 2013-03-03 | Author:Chris Seibold

cd /Users/cks/Desktop/feed/testpics Alternatively, you can type cd, then drag the folder into the Terminal window, and then hit Return to accomplish the same thing. Now that we’re in the proper ...
( Category: Macs March 26,2014 )
epub |eng | 2013-04-17 | Author:Darril Gibson

Windows Memory Diagnostics Used to check the hardware memory Component Services Used to manually add Component Object Model (COM) reusable code. This is most commonly needed when an application is ...
( Category: LAN March 26,2014 )
epub |eng | 2012-01-26 | Author:Harlan Carvey

Figure 5.22 Values in RegIdleBackup key, via WRR. We can then use the GUID value to navigate to the TaskCache\Tasks key, and locate the subkey with the ID GUID as ...
( Category: Microsoft Windows Registry March 26,2014 )
epub |eng | 2012-05-18 | Author:Cameron H. Malin & Eoghan Casey & James M. Aquilina

After extracting the suspicious file from the system, determining its purpose and functionality is often a good starting place. This process, called file profiling, should answer the following questions: • ...
( Category: Microsoft OS Guides March 26,2014 )
epub |eng | 0101-01-01 | Author:Balapure, Aditya [Balapure, Aditya]

Summary In this chapter, we went through the first phase of post exploitation in which we made an attempt to understand our victim better. Once we had the meterpreter session ...
( Category: Security & Encryption March 26,2014 )