security.over-blog.com
METHODOLOGY Part 2 - le blog security
http://security.over-blog.com/article-1633967.html
Utilisez notre Reader et abonnez-vous aux meilleurs articles de ce blog! PART 2: IN THE WILD WITH REAL MALWARES. 7) Boot Sector/Bios/MBR protection: MBR virus. When a computer is not protected with a Bios password, and neither by an antivirus (only HIPS), an ill-intentioned person can easly boot the computer from external drives and cause damages. This test just shows that a line defense based only on the HIPS, and without an antivirus, does not cover MBR/CMOS/Bios protection and risks. In this case we u...
vladimirmalikov.com
Антивирусный Сканер, Сканер безопасности, Тест сетевых экранов
http://vladimirmalikov.com/antivirus-security-scanner
Отчет о возможных уезвимостях в плагинах или ОС рекомендации ссылки ). 8212; проверка браузера и плагинов на обновления отчет ссылки. Https:/ browsercheck.qualys.com/. 8212; тоже самое. Http:/ www.pcflank.com/. 8212; 7 разных тестов для проверки системы на уязвимость. Скрипт для AVZ для обнаружения часто используемых уязвимостей:. 3 запускаем AVZ, заходим в меню Файл- Выполнить скрипт. 4Вставляем скопированный скрипт от AndreyKa в окно и ЗАпускаем скрипт. Проверка файлов и ссылок на вирусы. Как установит...
securityteacher.com
Internet security tips and advice » Blog Archive » Cross Site Scripting – the Web’s lurking danger
http://www.securityteacher.com/2008/07/23/cross-site-scripting-–-the-web’s-lurking-danger
Internet Security Tips and Advice. Cross Site Scripting the Web’s lurking danger. July 23rd, 2008 by Igor Pankov. There are some areas of computer security over which a user has almost no control; from involuntary exposure to software vulnerability exploits. To hijacked DNS servers that divert visitors to infective locations, there is little that a user alone can do to avoid becoming a victim. What is cross-site scripting? In an XSS attack, after the script has been executed on the user’s PC, it starts i...
neuronius.wordpress.com
Dicas de Segurança | Soluções para Informatica
https://neuronius.wordpress.com/2009/05/14/dicas-de-seguranca
Just another WordPress.com weblog. Laquo; Dicas – Como retirar virus do computador. Ferramentas de remoção do Conficker. Devido a preocupação de diversos usuários com o Conficker, venho recomendar a leitura de um artigo do Baixaki e o uso de ferramentas de detecção e remoção do worm que está provocando temor no mundo todo. Proteja-se do Conficker e de outras pragas virtuais da atualidade. McAfee AVERT Stinger Conficker. Lista de alerta contra falsos e-mails. Banco do Brasil informa – Sua chave e se...
krayzzie-y-tools.blogspot.com
KrayzziE-Yahoo Tools: Flaming Skull D0T N3T by Kevin Dunn
http://krayzzie-y-tools.blogspot.com/2010/04/flaming-skull-d0t-n3t-by-kevin-dunn.html
Friday, April 30, 2010. Flaming Skull D0T N3T by Kevin Dunn. Friday, April 30, 2010. Subscribe to: Post Comments (Atom). PC Flank's: Quick Test, Advanced Port Scanner, Stealth Test, Browser Test, Trojans Test and Exploit. FaceBook: F .KrayzziE. B@gmx.com YouTube Channel: Http:/ www.KrayzziE-Tube.Tk. View my complete profile. Happy Brithday My Friend Plolonk. Lady Booter v3.0. Flaming Skull D0T N3T by Kevin Dunn. Sys and Load boot. Awesome Inc. template. Powered by Blogger.
ecoms.com
resources
http://ecoms.com/resources.htm
A collection of links to useful internet resources. PC Flank Security Analysis. XSQL - Great SQL Server Developer Tools. Shoeboxed Scans and Organizes Your Receipts and Business Cards!
mercurynetworks.blogspot.com
The IT Universe by [mercnet]: Themes for Windows Guide
http://mercurynetworks.blogspot.com/2008/09/themes-for-windows-xp.html
The IT Universe by [mercnet]. Guides: Music Production and Windows XP, Including Operating System Configuration, Unattended Setups, Silent Application Installations, Booting XP from USB Flash, Virtual Studio Technology, Reaper Music Sequencer and much more. Themes for Windows Guide. If you have downloaded the Patched Uxtheme.dll file, use Replacer.cmd to Replace the original UXTheme.dll with your new Patched version. Download Replacer.cmd site. This replaces the Microsoft original file with the Patched v...
mercurynetworks.blogspot.com
The IT Universe by [mercnet]: 29/03/09 - 05/04/09
http://mercurynetworks.blogspot.com/2009_03_29_archive.html
The IT Universe by [mercnet]. Guides: Music Production and Windows XP, Including Operating System Configuration, Unattended Setups, Silent Application Installations, Booting XP from USB Flash, Virtual Studio Technology, Reaper Music Sequencer and much more. Listen to a lot of music? Online radio, presented by NULLsoft, the makers of Winamp and Reaper Music Production suite. It contains thousands of digital radio stations in every genre. Similar apps are IcyRadio and StationRipper. Links to this post.
mercurynetworks.blogspot.com
The IT Universe by [mercnet]: 28/06/09 - 05/07/09
http://mercurynetworks.blogspot.com/2009_06_28_archive.html
The IT Universe by [mercnet]. Guides: Music Production and Windows XP, Including Operating System Configuration, Unattended Setups, Silent Application Installations, Booting XP from USB Flash, Virtual Studio Technology, Reaper Music Sequencer and much more. Remote Administration Tool Guide - Sub7. Most AntiVirus products will state that these tools are Trojans (Backdoors) which they are, but the RAT tools can only do what the Hacker (you) wants them to do. Go to this site: Sub7legends.com. Run Editserver...