acid-burninfo.blogspot.com
acid-burninfo(in update status): January 2011
http://acid-burninfo.blogspot.com/2011_01_01_archive.html
Sunday, January 23, 2011. Performing Active Reconnaissance:with Nmap. Download the most current version of Nmap. Http:/ nmap.org/download.html. Open a command prompt and go to the directory that you have installed Nmap in. Run Nmap ] from the command line to see the various options. Perform a full connect scan on one of the local devices you have identified on your network. The syntax is. Perform a stealth scan on one of the local devices you have identified on your network. The syntax is. I-Newswire) Ap...
acid-burninfo.blogspot.com
acid-burninfo(in update status): Penetration Testing
http://acid-burninfo.blogspot.com/2011/04/penetration-testing.html
Thursday, April 7, 2011. Test one of the security assessments that perform on a computer system in which the person performing the assessment attempts to hack into the system. The main purpose is to find out whether or not person with malicious intent can enter the system, and what that person can access once the system has been penetrated. Offered by a number of security firms which specialize in the security of computer systems. Host Assessments is meaning. When doing the penetration testing, pentest t...
acid-burninfo.blogspot.com
acid-burninfo(in update status): July 2010
http://acid-burninfo.blogspot.com/2010_07_01_archive.html
Thursday, July 29, 2010. Unix and Linux File Permissions Octet (8). Rwx - 4 2 1 = 7. Permission concept for filesystems. When you install xampp there will include their file. Go to local c apache file. Try to search httpd.conf. In that file you will see like this or fine this line. Listen [: ].80. Listen 80 - change this line try to changes to others port like 85 or something. Labels: xampp port changes. Thursday, July 1, 2010. Well Known Trojans and Their Ports. Well Known Trojans and Their Ports. 1269 ...
acid-burninfo.blogspot.com
acid-burninfo(in update status): March 2010
http://acid-burninfo.blogspot.com/2010_03_01_archive.html
Wednesday, March 17, 2010. Source http:/ news.discovery.com/tech/my-favorite-hackers.html. Thu Dec 3, 2009 05:30 AM ET content provided by Ryan Draga. As a self-proclaimed hacker, who means you no harm, I stand on the shoulders of giants. The following people have set the standard for hacking and have given all of us newbies something to the strive for. These are some of the Great Ones, the ones we admire, emulate. These are my favs. Robin may be new to the scene, but he's definitely been talked about...
acid-burninfo.blogspot.com
acid-burninfo(in update status): November 2010
http://acid-burninfo.blogspot.com/2010_11_01_archive.html
Wednesday, November 3, 2010. How to protect password screen sever. 1press the window R keystrokes to open the run command. 2type in gpedit .msc and click ok. 3Expand user configuration Administrative Templates Control Panel. 4Click the Display container. 5In the details pan,doubles click password the screen saver. Labels: how to protest password screen sever. Subscribe to: Posts (Atom). 10 reasons why PCs crash U must Know. Advantages and Disadvantages of FTK and EnCase. Gerix Wifi Cracker Tutorial.
acid-burninfo.blogspot.com
acid-burninfo(in update status): April 2011
http://acid-burninfo.blogspot.com/2011_04_01_archive.html
Thursday, April 7, 2011. Test one of the security assessments that perform on a computer system in which the person performing the assessment attempts to hack into the system. The main purpose is to find out whether or not person with malicious intent can enter the system, and what that person can access once the system has been penetrated. Offered by a number of security firms which specialize in the security of computer systems. Host Assessments is meaning. When doing the penetration testing, pentest t...
mycert.org.my
Malaysian Computer Emergency Response Team
https://www.mycert.org.my/en/services/advisories/mycert/2014/main/detail/1003/index.html
Service Level Agreement (SLA). MyCERT Advisories, Alerts and Summaries for the year 2014. MA-417.092014 : MyCERT Alert - GNU Bourne Again Shell Vulnerability. Date Published: 26 September 2014. MyCERT received information from valid sources regarding a GNU Bash vulnerability that affects Unix-based operating systems such as Ubuntu, Red Hat, Debian, Linux and Mac OS X as well as a lot of web servers running Linux operating systems. The vulnerability exists for servers running UNIX-based systems as below:.
mycert.org.my
Malaysian Computer Emergency Response Team
https://www.mycert.org.my/cyber999
Cyber999 is a service provided for Internet users to report or escalate computer security incidents. Computer security incidents may be reported to Cyber999 via the following ways:. Security incidents may be reported to MyCERT by sending an email to cyber999 [at] cybersecurity.my. Please include the following information or artifacts, if available. Please provide a brief description of the incident and send it to 15888 using the following format: CYBER999 REPORT (email)(complaint) to 15888.
mycert.org.my
Malaysian Computer Emergency Response Team
https://www.mycert.org.my/en/services/advisories/mycert/2013/main/index.html
MyCERT Advisories, Alerts and Summaries for the year 2013. MA-367.122013 : MyCERT Alert - Cyber Blackmail Scam. MA-366.122013 : MyCERT Alert - Security Updates for Safari Web Browser. MA-365.112013 : MyCERT Alert Recent Threats of CryptoLocker Ransomware. MA-364.112013 : MyCERT Alert - Security Updates: Hotfix Available for Adobe ColdFusion. MA-363.012013 : MyCERT Alert - Security Updates for Adobe Flash Player. MA-362.112013 : MyCERT Alert - Microsoft Security Bulletin Summary For November 2013. MA-351&...
SOCIAL ENGAGEMENT