Security & Encryption
epub |eng | 2014-09-22 | Author:Josh Datko [Datko, Josh]

In the FPS_CryptoCape.ino file, this is accomplished by setting digital output 2 as an output and then pulling the line low. When a fingerprint is recognized, the pin is configured ...
( Category: Software Development April 4,2019 )
azw3, epub, pdf |eng | 2015-07-15 | Author:Piyush Verma

OS fingerprinting attempts OS fingerprinting is the technique where an attacker tries to identify the operating system running on the target machine(s). An attacker can perform either passive or active ...
( Category: Network Security April 4,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen

Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category: Networks April 1,2019 )
mobi, epub |eng | 2010-08-15 | Author:Rob Cameron, Brad Woodberg, Patricio Giecco, Timothy Eberhard, and James Quinn

Drop-Packet Drop-Packet will drop an individual offending packet, but not the rest of the session. Typically, you want to use the Drop-Connection action when malicious activity is detected on a ...
( Category: Network Security April 1,2019 )
epub |eng | 2019-03-15 | Author:Eric O'Neill

At FBI HQ, the walls essentially did have eyes and ears. I’d have to ask Garcia to work some magic to make this evening disappear. When the hallway quieted, I ...
( Category: Russian & Former Soviet Union March 29,2019 )
epub |eng | 2014-06-04 | Author:Phil Champagne [Champagne, Phil]

* * * Re: Stealing Coins Posted by knightmb, July 25, 2010, 07:34:42 PM * * * Very nice. *another reason why I love open source* As I understand it ...
( Category: Software Development March 23,2019 )
epub |eng | | Author:Jacob G. Oakley

Types of Findings Now to cover the meat of the report, which includes the findings themselves and how best to communicate them to the customer. It is important to understand ...
( Category: Security & Encryption March 20,2019 )
epub |eng | 2019-01-31 | Author:Preston Miller

Writing Excel spreadsheets – xlsx_writer.py The xlsx_writer.py script contains the logic for creating an excel document containing our processed UserAssist values. In addition to this, this script also creates an ...
( Category: Network Security March 11,2019 )
epub |eng | 2019-01-29 | Author:Peter Lipovyanov

DTube takes decentralized social media a step further. It is a video sharing and streaming platform, similar to YouTube, built as an application on the Steem blockchain. The principles it ...
( Category: Encryption March 11,2019 )
epub |eng | | Author:Adrian Pruteanu

Since this is a custom TCP protocol, we have to intercept the traffic using Wireshark or tcpdump, as opposed to Burp or ZAP. With Wireshark running, we can capture and ...
( Category: Hacking March 11,2019 )
epub |eng | 2019-01-29 | Author:Koshik Raj

Digital assets and identity Digital assets are programmable assets that exist in digital format. These assets can have their own value (digital tokens) or could virtually represent existing physical assets ...
( Category: Encryption March 11,2019 )
epub |eng | 2012-02-23 | Author:Michael Sikorski [Michael Sikorski and Andrew Honig]

( Category: Hacking March 8,2019 )
epub |eng | 2019-02-05 | Author:Erdal Ozkaya

Simple Mail Transfer Protocol Simple Mail Transfer Protocol (SMTP) is used for email purposes by many organizations. This protocol was added to the internet and it quickly became the simplest ...
( Category: Privacy & Online Safety March 8,2019 )
epub |eng | 2019-03-03 | Author:Jack Caravelli

Artificial Intelligence Technologies 1 £250,233 Cold Atoms and Molecules 2 £1,614,066 Complexity Science 1 £84,126 Condensed Matter: Electronic Structure 5 £1,567,387 Light Matter Interaction and Optical Phenomena 2 £1,976,911 Optical ...
( Category: Viruses March 4,2019 )
epub |eng | | Author:Nihad A. Hassan

Encrypted Hard Drive Sometimes, we may face a situation when we need to acquire a hard drive while it is protected with encryption (FDE). As we have already mentioned in ...
( Category: Hacking March 1,2019 )