flu-project.com
Flu Project: enero 2015
http://www.flu-project.com/2015_01_01_archive.html
Listado de Herramientas de Seguridad. Jueves, 29 de enero de 2015. La guerra contra los robots ya ha comenzado. El pasado lunes fue publicado en Voz Populi un completo reportaje sobre bots en el que tuvimos el placer de participar como entrevistados por el conocido periodista Antonio Martínez Ron. Conocido por sus interesantes reportajes en programas como Orbita Laika o diarios y medios de comunicación como Voz Populi-Next, entre otros muchos. Experto en seguridad informática."En el momento en que en...
cyberseg.blogspot.com
Cybersegurança: Maio 2013
http://cyberseg.blogspot.com/2013_05_01_archive.html
Cibernética, uma tentativa de compreender a comunicação e o controle de máquinas, seres vivos e grupos sociais através de analogias com as máquinas. De acordo com Norbert Wiener, pai da cibernética: ".do ponto de vista da transmissão da informação, a distinção entre máquinas e seres vivos, humanos ou não, é uma questão de semântica". Domingo, 19 de maio de 2013. Instalação do Kali Linux no Virtualbox. O roteiro a seguir faz parte do Treinamento em Teste de Invasão com Backtrack/Kali. O exemplo abaixo apr...
flu-project.com
Flu Project: Listado de Herramientas de Seguridad
http://www.flu-project.com/p/herramientas-de-seguridad.html
Listado de Herramientas de Seguridad. Listado de Herramientas de Seguridad. Listado de Herramientas de Seguridad. En este apartado de la comunidad generaremos entre todos un listado con todas las herramientas de auditoría de seguridad que puedan sernos de utilidad en el día a día de nuestra profesión. Os animamos a que nos enviéis vuestras herramientas preferidas junto con un enlace para su descarga y las incluiremos a continuación:. Footprinting y Fingerprinting: búsqueda de información. Shodan (Informa...
acg6415.wikispaces.com
ACG 6415 - Resources
https://acg6415.wikispaces.com/Resources
Skip to main content. Get your Wikispaces Classroom now:. The easiest way to manage your class. Syllabus - Fall 2016. Schedule - Fall 2016. Security in the News. A Strong Password Generator. GRC's Interactive Brute Force Password Search Space Calculator. Zxcvbn: realistic password strength estimation. TCP and UDP Port Numbers. Internet Control Message Protocol. Ping and Traceroute from within UCF. Open Web Applications Security Project. Reporting Computer, Internet-related, or Intellectual Property Crime.
w00tsec.blogspot.com
w00tsec: July 2014
https://w00tsec.blogspot.com/2014_07_01_archive.html
Embedded device and webapp hacking. Thursday, July 17, 2014. Hacking Asus RT-AC66U and Preparing for SOHOpelesslyBroken CTF. So it's finally July, time to pack for DEFCON, follow @defconparties. On Twitter and decide which villages. To visit and which talks. There's a new hacking competition this year called SOHOpelesslyBroken. Presented by ISE and EFF. The objective on Track 0. Is to demonstrate previously unidentified vulnerabilities in off-the-shelf consumer wireless routers. Track 1. According to the...
securingyour.info
Encryption Archive - securingyour.info
http://www.securingyour.info/category/crypto
Question the integrity of your security. Oct 9, 2012. Comments Off on InfoSec: How IT security can drive business and enable innovation. InfoSec: How IT security can drive business and enable innovation. Information security threats should be understood and addressed as a whole, not in a standalone manner. These threats should be considered in combination with those that depend on the human factor, and should be guided by a concise framework based on international practices. To find out how. Oct 20, 2010.
securingyour.info
humint Archive - securingyour.info
http://www.securingyour.info/category/humint
Question the integrity of your security. Oct 20, 2010. Comments Off on Infosec: “Nuclear secrets” found on unencrypted USB stick. Infosec: “Nuclear secrets” found on unencrypted USB stick. According to Credant vice president, whilst the convenience of USB sticks make them an important tool for any business, you don’t have to be a nuclear scientist to know that the data carried on these devices must be protected. As the coach driver is quoted as saying in the local press. I don’t know what is worse ...
SOCIAL ENGAGEMENT