
securityblog.gr
IT | Security | Hacking | ProgrammingA blog about IT, Security, Hacking and Programming!
http://www.securityblog.gr/
A blog about IT, Security, Hacking and Programming!
http://www.securityblog.gr/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Wednesday
LOAD TIME
2 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
20
SSL
EXTERNAL LINKS
53
SITE IP
136.243.24.159
LOAD TIME
1.954 sec
SCORE
6.2
IT | Security | Hacking | Programming | securityblog.gr Reviews
https://securityblog.gr
A blog about IT, Security, Hacking and Programming!
Control DNS Responses | PenTesting | Hacking | Coding
http://securityblog.gr/2865/control-dns-responses
Posted on 30/07/2015, 11:40. Mandiant ApateDNS is a tool for controlling DNS responses. As a phony DNS server, Mandiant ApateDNS spoofs DNS responses to a user-specified IP address by listening on UDP port 53 on the local machine. Mandiant ApateDNS also automatically sets the local DNS to localhost. Upon exiting the tool, it sets back the original local DNS settings. Larr; Detect executable dependencies. Registry snapshots →. Active Directory enumeration from non-domain system. Hardening SSH on Debian.
Top 5 Free Port Scanners | PenTesting | Hacking | Coding
http://securityblog.gr/1808/top-5-free-port-scanners
Top 5 Free Port Scanners. Posted on 05/03/2013, 22:30. Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network,. 2 Angry IP Scanner. Here are some of the new features in this version.
Reversing with DumpBin | PenTesting | Hacking | Coding
http://securityblog.gr/2841/reversing-with-dumpbin
Posted on 16/07/2015, 11:29. The Microsoft COFF Binary File Dumper ( DUMPBIN. Displays information about Common Object File Format (COFF) binary files. You can use DUMPBIN to examine COFF object files, standard libraries of COFF objects, executable files, and dynamic-link libraries (DLLs). For more…. HEADERS x: path to object file. DISASM x: path to object file. Display all exported definitions. EXPORTS x: path to object file. Display all imported definitions. IMPORTS x: path to object file. Post was not...
Compress buffer with zlib in C | PenTesting | Hacking | Coding
http://securityblog.gr/2847/how-to-compress-a-buffer-with-zlib-in-c
How to compress a buffer with zlib in C. Posted on 17/07/2015, 12:33. To build the following code, you first have to link zlib library, zlibstat.lib. File, with your project and define ZLIB WINAPI. In your project’s properties - c/c - preprocessor definitions. Define GZIP ENCODING 16. Z stream stream ;. Z DEFAULT COMPRESSION ,. Z DEFLATED ,. GZIP ENCODING ,. Z DEFAULT STRATEGY ). HEAP ZERO MEMORY ,. Stream. next in. Z const Bytef *. Stream. avail in. Stream. next out. Stream. avail out. Z FINISH ). Enter...
Backtrack | PenTesting | Hacking | Coding
http://securityblog.gr/tag/backtrack
Two alternatives for Backtrack. Kali Linux From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created…. WEP cracking using Gerix Wifi Cracker in BackTrack. GerixWiFiCracker is GUI for Aircrack-ng suite, is designed for pentesting in a realworld with efficent and userfriendly graphic interface. Get…. WEP cracking using fern wifi cracker in BackTrack. Change mac address in BackTrack. Installing Software Center and Synaptic on Backtrack.
TOTAL PAGES IN THIS WEBSITE
20
IT Services | Logisek
http://www.karpouzas.com/it-services
At Logisek, we have developed an original methodology to address IT infrastructure investment.Using this methodology, we can help you to identify the maturity level of your infrastructure and plan longterm improvements. R review methodology includes:. IT policies and processes. We can help you to optimise your IT infrastructure and transform it into a valuable business enabler through the following comprehensive portfolio of services. Operation Maintenance and Support Services. Logisek 2016 Privacy Policy.
Security Services | Logisek
http://www.logisek.com/node/74
Can help determine if operations are carried out economically and efficiently and if security controls and system access are adequate to protect your data and assets. These reviews can encompass all of your information. E-mail: info [at] logisek.com. Logisek 2016 Privacy Policy.
Infrastructure Virtualization Services | Logisek
http://www.logisek.com/node/96
Virtualization addresses this need by allowing multiple applications to share one physical server resource while eliminating the interaction between them. Streamline deployment and management by. Delivering Desktops as a service. For easier OS migration as you package once, deploy everywhere. Give Secure Remote Access. To teleworkers and temporary workers without sacrificing performance or security. Business Impact of Virtualization. Desktop as a Service. E-mail: info [at] logisek.com.
Security Services | Logisek
http://www.logisek.com/security-services
Can help determine if operations are carried out economically and efficiently and if security controls and system access are adequate to protect your data and assets. These reviews can encompass all of your information systems or focus on specific areas. IS General Controls Review. Not using an in-house system? We've developed a service to meet your unique needs. We review and analyze the system of internal controls over your on-line system and Internet-based electronic financial services, including ...
Two Factor SSH with Google Authenticator | MNX Solutions
https://www.mnxsolutions.com/security/two-factor-ssh-with-google-authenticator.html
Two Factor SSH with Google Authenticator. Posted on February 18, 2011 / IN Security. Last week, Google enabled two factor authentication for everyone. This article explains how to install and configure Google Authenticator in conjunction with SSH for two factor authentication. Two-factor authentication relies on something you know (a password) and something you have (your phone). I have posted another article. Describing this same implementation with a Yubikey. Sudo vi /etc/pam.d/sshd. Your verification ...
Company | Logisek
http://www.logisek.com/company
Company is a leading Security. Solution provider. We specialize in building customized, scalable solutions to meet your unique business demands. We combine Security, IT, Software Development, Web, VoIP, Hosting and Business services to provide high quality and cost effective solutions. E-mail: info [at] logisek.com. Logisek 2016 Privacy Policy.
IT Services | Logisek
http://www.karpouzas.com/node/75
At Logisek, we have developed an original methodology to address IT infrastructure investment.Using this methodology, we can help you to identify the maturity level of your infrastructure and plan longterm improvements. E-mail: info [at] logisek.com. Logisek 2016 Privacy Policy.
Company | Logisek
http://www.buysoftware.gr/company
Company is a leading Security. Solution provider. We specialize in building customized, scalable solutions to meet your unique business demands. We combine Security, IT, Software Development, Web, VoIP, Hosting and Business services to provide high quality and cost effective solutions. E-mail: info [at] logisek.com. Logisek 2016 Privacy Policy.
Infrastructure Virtualization Services | Logisek
http://www.karpouzas.com/node/96
Virtualization addresses this need by allowing multiple applications to share one physical server resource while eliminating the interaction between them. Streamline deployment and management by. Delivering Desktops as a service. For easier OS migration as you package once, deploy everywhere. Give Secure Remote Access. To teleworkers and temporary workers without sacrificing performance or security. Business Impact of Virtualization. Desktop as a Service. E-mail: info [at] logisek.com.
TOTAL LINKS TO THIS WEBSITE
53
Security Blog | A slight bit about security
July 21, 2014. Okay, I found this in my leftover posts, and I never finished it. I’m going to post it, in case anyone is interested. The WRCCDC this year was tons of fun, and I saw a lot of new tricks from black team on the linux boxes. I’ll try to list what I can recall on them now so that other teams can cross reference to see if they missed things:. Running DokuWiki – Vulnerable, but I didn’t take the time to figure out how. The /opt/bin/ directory was pretty bad. All of /opt/ was. That sucked bigtime...
Securityblog.co.uk
SecurityBlog.com
Sign Up Now For Early Access. Is launching soon. Enter your email address below to instantly create your account and get early access. Enter your email address:. Click here to contact us.
securityblog.com.au - This domain may be for sale!
Find the best information and most relevant links on all topics related to securityblog.com.au. This domain may be for sale!
securityblog.defendersystem.com
Security Blog - Delaware County, Security Alarm & Monitoring Specializing in Security System Monitoring, Alarm SECURITY Systems and Solutions
Residential, Commercial, Retail, Manufacturing, Healthcare, etc. We are committed 24/7 365 days to help. See our referral incentive program. Everyone wins! This is an example of a WordPress page, you could edit this to put information about yourself or your site so readers know where you are coming from. You can create as many pages like this one or sub-pages as you like and manage all of your content inside of WordPress. Security Blog is proudly powered by WordPress.
IT | Security | Hacking | Programming
IT Security Hacking Programming. Kill chain attacks with Kali. The term kill chain was originally used as a military concept related to the structure of an attack; consisting of…. Create fake services for malware analysis. INetSim is a software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour…. Regshot is an open-source (LGPL) registry compare utility that allows you to quickly take a snapshot of your registry and…. Parsing JSON in C. To compile...
BITZ Secure Security Blog
BITZ Secure Security Blog. Matrix of Security News. August 13, 2015. IT Specialist – Technical Support . O Network Security. Maintain confidentiality with regard to the information being processed, stored or accessed by the network. From St. August 13, 2015. Tableau BI Developer – Wells Fargo. Tableau server experience posting dashboards, configuring permissions and setting row level security. Enjoys assimilating complex information into cle. August 13, 2015. Bookkeeper – Main Event USA –. Comments ...
securityblog.info - This domain may be for sale!
Securityblog.info has been informing visitors about topics such as Security Alarm Companies, Network Security Threats and Home Security System Companies. Join thousands of satisfied visitors who discovered Home Security Home Security, Home Security Alarm Monitoring and General Liability Insurance. This domain may be for sale!
امنیت سایت | امنیت سرور - مقالات آموزشی امنیت
امنیت سایت امنیت سرور. آموزش نصب mod pagespeed. 2015-09-20 / securityblog / 1 Comment. افزونه pagespeed از سمت تیم توسعه دهنده وب گوگل برای وب سرور آپاچی ارائه شده است. این افزونه با عمل Cache سایت ها را بهینه سازی کرده و سرعت آنها را بهبود می بخشد.استفاده از این افزونه علاوه بر بالا بردن سرعت لود سایت ، باعث کاهش فشار به سرور می شود. آموزش نصب mod pagespeed. آموزش نصب mod pagespeed در سی پنل. برای نصب و فعالسازی mod pagespeed در WHM/cPanel بصورت زیر اقدام کنید. Cd & rm -rf /tmp/pagespeed. Wget https:/ d...
securityblog.it - Questo dominio potrebbe essere in vendita!
Find the best information and most relevant links on all topics related to securityblog.it e Security Tab. Questo dominio potrebbe essere in vendita!
SOCIAL ENGAGEMENT