infosecdz.blogspot.com infosecdz.blogspot.com

infosecdz.blogspot.com

InfoSecDz

Blog dédié à la sécurité informatique en général, présentation d'outils et d'outils d'audit et autres

http://infosecdz.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR INFOSECDZ.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

December

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.7 out of 5 with 3 reviews
5 star
1
4 star
0
3 star
2
2 star
0
1 star
0

Hey there! Start your review of infosecdz.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.5 seconds

FAVICON PREVIEW

  • infosecdz.blogspot.com

    16x16

  • infosecdz.blogspot.com

    32x32

  • infosecdz.blogspot.com

    64x64

  • infosecdz.blogspot.com

    128x128

CONTACTS AT INFOSECDZ.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
InfoSecDz | infosecdz.blogspot.com Reviews
<META>
DESCRIPTION
Blog dédié à la sécurité informatique en général, présentation d'outils et d'outils d'audit et autres
<META>
KEYWORDS
1 securité
2 sécurité informatique
3 algerie
4 TIC
5 NTIC
6 attaques web
7 hacking
8 test de penetration
9
10
CONTENT
Page content here
KEYWORDS ON
PAGE
infosecdz,2° préimage,tel que h,résistance aux collisions,publié par infosecdz,dernière modification le,2 commentaires,cryptographie,nist,webgoat,est une plateforme,éditée par l'owasp,open web,application security,project,1 commentaires,owasp,sécurité
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

InfoSecDz | infosecdz.blogspot.com Reviews

https://infosecdz.blogspot.com

Blog dédié à la sécurité informatique en général, présentation d'outils et d'outils d'audit et autres

INTERNAL PAGES

infosecdz.blogspot.com infosecdz.blogspot.com
1

InfoSecDz: Pourquoi il ne faut plus utiliser le MD5?

http://www.infosecdz.blogspot.com/2009/08/pourquoi-il-ne-faut-plus-utiliser-le.html

Blog dédié à la sécurité informatique, axé sur la description d'outils et de méthodologies. Lundi 24 août 2009. Pourquoi il ne faut plus utiliser le MD5? Beacoup d'applications Web et de logiciels en général, utilisent le MD5 pour entre autre stocker les mots de passe des utilisateurs. Créé en 1991 par Ronald Riverst (RSA security), le MD5 est une fonction de hashage qui à partir d'un fichier numérique calcule une empreinte (ou hash) unique de 128 bits. Si on a un message. Parmi ces attaques citons:.

2

InfoSecDz: 3,2,1,0.... et c'est parti

http://www.infosecdz.blogspot.com/2009/08/3210-et-cest-parti.html

Blog dédié à la sécurité informatique, axé sur la description d'outils et de méthodologies. Lundi 17 août 2009. 3,2,1,0. et c'est parti. Donc voila je viens de créer mon premier blog, faut dire que je ne suis pas un adepte du "broadcast yourself" mais je trouve qu'un blog est un bon moyen de communication et de diffusion. Ce blog sera consacré aux problématiques liées à l'informatique en général et la sécurité en particulier. Welcome parmi nous :). 17 août 2009 à 17:24. Yes, You are welcome in our midst.

3

InfoSecDz: août 2009

http://www.infosecdz.blogspot.com/2009_08_01_archive.html

Blog dédié à la sécurité informatique, axé sur la description d'outils et de méthodologies. Lundi 24 août 2009. Pourquoi il ne faut plus utiliser le MD5? Beacoup d'applications Web et de logiciels en général, utilisent le MD5 pour entre autre stocker les mots de passe des utilisateurs. Créé en 1991 par Ronald Riverst (RSA security), le MD5 est une fonction de hashage qui à partir d'un fichier numérique calcule une empreinte (ou hash) unique de 128 bits. Si on a un message. Parmi ces attaques citons:.

4

InfoSecDz: WebGoat: un outil didactique pour la sécurité des applications Web

http://www.infosecdz.blogspot.com/2009/08/webgoat-un-outil-dedactique-pour-la.html

Blog dédié à la sécurité informatique, axé sur la description d'outils et de méthodologies. Lundi 17 août 2009. WebGoat: un outil didactique pour la sécurité des applications Web. Destinée à la formation aux attaques contre les applications Web. Délibérément vulnérable à diverses attaques, WebGoat. Se présente sous la forme de leçons avec des explications et des défis à relever. Injection , XSS. Vol de session, etc) et des aides sous la forme d'astuces sont disponibles. Est disponible au téléchargement.

UPGRADE TO PREMIUM TO VIEW 0 MORE

TOTAL PAGES IN THIS WEBSITE

4

LINKS TO THIS WEBSITE

dzcore.wordpress.com dzcore.wordpress.com

July | 2009 | DZCORE

https://dzcore.wordpress.com/2009/07

Open Source and Computer Security. DZC-2009-001] The Movie Player and VLC Media Player Real Data Transport parsing integer underflow. July 27, 2009. I have published a security advisory for Mplayer and VLC: [DZC-2009-001]. The Movie Player and VLC Media Player Real Data Transport. The Movie player = svn r29446 [1]. VLC media player = 1.0.0 [2]. Possible others applications that use the xine lib code [3]. DZCORE Labs, Algeria. VLC: update to VLC media player 1.0.1 [2] [4]. Mplayer: update to svn r29447.

dzcore.wordpress.com dzcore.wordpress.com

we have a new home | DZCORE

https://dzcore.wordpress.com/2011/01/19/new-home

Open Source and Computer Security. We have a new home. Just to tell you that I’m still alive and we have started a new site opendz.org. We hope to publish our stuff there. If you need more info: currently I’m doing research in the embedded systems world, and sorry if I’m not a true blogger. This entry was posted on Wednesday, January 19th, 2011 at 9:25 pm and is filed under Uncategorized. You can follow any responses to this entry through the RSS 2.0. Feed You can leave a response. From your own site.

dzcore.wordpress.com dzcore.wordpress.com

Advisories | DZCORE

https://dzcore.wordpress.com/advisories

Open Source and Computer Security. DZC-2009-001] The Movie Player and VLC Media Player Real Data Transport parsing integer underflow. DZCORE: https:/ dzcore.wordpress.com/2009/07/27/dzc-2009-001-the-movie-player-and-vlc-media-player-real-data-transport-parsing-integer-underflow/. Bugtraq: http:/ www.securityfocus.com/bid/35821/. Secunia Mplayer: http:/ secunia.com/advisories/36041/. Secunia VLC: http:/ secunia.com/advisories/36037/. TFTP Server Error Packet Handling Remote Buffer Overflow Vulnerability.

dzcore.wordpress.com dzcore.wordpress.com

About | DZCORE

https://dzcore.wordpress.com/about

Open Source and Computer Security. DZCORE is about: computing, programming, security and open source. Author: Djalal aka tixxDZ. Education: Master in Software Engineering at Mentouri University Constantine (2009). Contact: tixxdz at gmail dot com. Algerian Open Source Blogs. InalGnu = Open source. Le Blog De Amarsoft. Tuxargon Open Source Power. IT and Security in Algeria. Create a free website or blog at WordPress.com. Follow “DZCORE”. Get every new post delivered to your Inbox.

dzcore.wordpress.com dzcore.wordpress.com

January | 2011 | DZCORE

https://dzcore.wordpress.com/2011/01

Open Source and Computer Security. We have a new home. January 19, 2011. Just to tell you that I’m still alive and we have started a new site opendz.org. We hope to publish our stuff there. If you need more info: currently I’m doing research in the embedded systems world, and sorry if I’m not a true blogger. You are currently browsing the DZCORE. Blog archives for January, 2011. Algerian Open Source Blogs. InalGnu = Open source. Le Blog De Amarsoft. Tuxargon Open Source Power. IT and Security in Algeria.

UPGRADE TO PREMIUM TO VIEW 1 MORE

TOTAL LINKS TO THIS WEBSITE

6

OTHER SITES

infosecdailydigest.com infosecdailydigest.com

Infosec Daily Digest

May 16, 2014. This module exploits a buffer overflow vulnerability in Adobe Flash. Player. The vulnerability occurs in the flash.Display.Shader class,. When setting specially crafted data as its bytecode, as exploited in. The wild in April 2014. This module has been tested successfully on. IE 6 to IE 10 with Flash 11 and Flash 12 over Windows XP SP3,. Windows 7 SP1 and Windows 8. Http:/ www.securityfocus.com/bid/67092. Http:/ helpx.adobe.com/security/products/flash-player/apsb14-13.html. Meterpreter sess...

infosecdelta.blogspot.com infosecdelta.blogspot.com

InfoSec Delta

The difference between where you are and where you should be. Sunday, October 9, 2016. Slingbag with a suit jacket? I thought you were a professional! It's 8 AM on a Sunday and I'm sitting in the airport. This will make my 4th week in a row traveling. I have 2 more to go before I can begin to recover. At age 43, traveling is beginning to become a burden. You should be asking "Why is this guy carrying a sling pack? Presentation, Minimalistic Physical Assessment Kit. To get the best deal. Links to this post.

infosecdistilled.com infosecdistilled.com

InfoSec Distilled - Parsing the InfoSec World

Parsing the InfoSec World. March 20, 2014. Quick Decisions-Using Real Time Security Management to Make the Call. September 12, 2013. The Challenges and Benefits of Continuous Monitoring and BYOD. August 29, 2013. Using New Design Patterns to Improve Mobile Access Control. August 14, 2013. Managing Security and Compliance in a Big Data World. July 25, 2013. Optimizing Directory Architecture for Mobile Devices and Applications. July 18, 2013. July 18, 2013. June 26, 2013. June 20, 2013. When Trust is Assum...

infosecdocs.wordpress.com infosecdocs.wordpress.com

Information Security Documents | Just another WordPress.com weblog

Just another WordPress.com weblog. Information Security requires only one Policy. January 22, 2010. Large “P” policy vs small “p” polices … in many cases the word “policy” is overused in information security to refer to not only what should truly be a high-level statement but also to what are actually standards and guidelines. The real structure should consists of a policy supported by a strategy with metrics, standards, guidelines, and procedures. What is meant by “Information”? Since we’re lookin...

infosecdojo.com infosecdojo.com

Infosec Dojo - Information Security Podcast

Security in Depth is Failing. Using the SHA-1Sum for File Integrity Checks. The lsof and fuser command in Linux. Security in Depth is Failing. February 25, 2018. February 25, 2018. Security in Depth is Failing I’m back after fighting a cold for the past two weeks. I talk about how Security in Depth is Failing, and the reasons for that. I think this comes down to talent, training, and learning to…. SANS Class Oklahoma City. Using the SHA-1Sum for File Integrity Checks. February 2, 2018. February 2, 2018.

infosecdz.blogspot.com infosecdz.blogspot.com

InfoSecDz

Blog dédié à la sécurité informatique, axé sur la description d'outils et de méthodologies. Lundi 24 août 2009. Pourquoi il ne faut plus utiliser le MD5? Beacoup d'applications Web et de logiciels en général, utilisent le MD5 pour entre autre stocker les mots de passe des utilisateurs. Créé en 1991 par Ronald Riverst (RSA security), le MD5 est une fonction de hashage qui à partir d'un fichier numérique calcule une empreinte (ou hash) unique de 128 bits. Si on a un message. Parmi ces attaques citons:.

infosececuador.wordpress.com infosececuador.wordpress.com

Seguridad o Inseguridad de la Información | ¿Realidad o percepción en el Ecuador?

Seguridad o Inseguridad de la Información. Realidad o percepción en el Ecuador? 8220;CISA” (Ser o no ser). 23 abril, 2012. En los últimos meses el término CISA ha estado presente en las labores cotidianas. Por lo que he decidido compartir un poco acerca de esta certificación.El procedimiento y los detalles que se deben tener en cuenta para poder brindar el examen de certificación CISA, se los puede encontrar en http:/ www.isaca.org. O ingresando al capítulo de Ecuador http:/ www.isaca.org.ec. El tiempo n...

infoseceducation.blogspot.com infoseceducation.blogspot.com

InfoSec Education

Thoughts and ideas related to education of the next generation of InfoSec professionals. Sunday, August 28, 2011. Three years ago when I was asked to create the content for the IT3700 (Network Defense and Countermeasures) course I knew the curriculum would change. What I didn’t know is how much – and how quick – the subject matter would change. Each semester I’ve discovered about 1/3 of the material evolves or morphs in one way or another. This year is no exception. So what does it all mean? What single ...

infoseceducation.com infoseceducation.com

Account Suspended

This Account Has Been Suspended.

infoseceibar.com infoseceibar.com

Infosec Seguridad Informática

Llámanos ahora: 94 320 80 11. Estos precios se entienden IVA incluído. Producto añadido correctamente a su carrito de la compra. Artículos en su carrito. Hay 1 artículo en su cesta. Total productos: (tasas incluídas). Total envío: (tasas incluídas). Ir a la caja. Lo más vendido. Bases Para Portátiles Y Replicadores De Puertos. Almohadillas De Refrigeración Para Portátiles. Accesorios Para Dispositivos De Mano. PC/Estaciones De Trabajo Barebones. Fundas Para Libros Electrónicos. Componentes De La Interfaz.