gailly.net
Jean-loup Gailly - Security
http://gailly.net/security
I have a strong interest in computer security. I have studied in particular the security of the WASD. Web server for OpenVMS, and found multiple vulnerabilities, including a possible remote SYSTEM (root) compromise. Details are in the security advisory. Published on the Bugtraq. Mailing list. The vulnerabilities have been assigned Bugtraq id 5811. And SecurityTracker ID 1005301. Is an excellent password cracker. I have written a patch. For John the Ripper 1.6.32. Here is some documentation. Carl Karcher ...
jakubholy.net
El Kuba: UNIX - notes
http://www.jakubholy.net/unix/index.html
Last change: Aux 17, 2005. About shell, administration etc. Notes and links ( Emacs. On Debian/testing with 2.6.6 kernel. Some of the most used / useful commands ( man. Etc - operators , and. Dodání českých znaků [ CZ. Notes on KDE/GNOME, private network . To other unix sources. Is used for user's input (commands), yellow. For samples of files. Notes: ' ' means 'or'. Text in italic stays for any text (e.g. filename. Denotes any name of a file, i.e. the text to be replaced by a user). Cd cd absolut path.
beerstra.org
JB's Personal Site, about the site, it's creator etc.
https://www.beerstra.org/info.html
At this section you can find some technical info. At the moment this is limited to security related software. First of all: Security is NOT. Installing a (good) firewall. Good security will NOT. Last forever. Security is only as good as your weakest link. Perfect security doesn't exist, it's better to talk about hardening instead. With this in mind it's always good to visit security related sites like securityfocus. Every port corresponds with a certain service which is provided by a server, most port sc...
tricksonhacking.blogspot.com
Hacking: Top 20 Hacking Tools
http://tricksonhacking.blogspot.com/2009/05/top-20-hacking-tools.html
Sunday, May 3, 2009. Top 20 Hacking Tools. These are Top 20 Hacking Tools, the list is exhaustive, this are a few to name. The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix. Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. GFI LANguard Network security. Scanner (N.S.S&...Ettercap ...
brightchoose.blogspot.com
The Shadow Warrior: 01/12/11
http://brightchoose.blogspot.com/2011_01_12_archive.html
I AM NOT A HACKER OR A CRACKER AND THANK YOU FOR COMING. Rabu, 12 Januari 2011. Block IP Address Dengan Menggunakan htaccess. Jika anda mempunyai website dan ingin mengeblok IP Address. Tertentu agar IP Address tersebut tidak bisa mengakses website anda, anda cukup membuat file dengan nama .htaccess yang di letakkan pada direktori utama website. Caranya adalah sebagai berikut :. 1 Buat file dengan nama .htaccess dan isi file tersebut dengan salah satu script. Di bawah ini :. Deny from 127.0.0. Virus ini ...
theaditya.blogspot.com
TECH & ETHICAL HACK TIPS: Top 20 Must Have Hacking Tools
http://theaditya.blogspot.com/2010/01/top-20-must-have-hacking-tools.html
TECH and ETHICAL HACK TIPS. Jan 2, 2010. Top 20 Must Have Hacking Tools. At : 11:21 PM Category : DOWNLOADS. These are Top 20 Hacking Tools, the list is exhaustive, this are a few to name. The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix. Ethereal is a free network. Snort is an open source network intrusion detection system, capable of performing real-time traffic. GFI LAN...
ashaver.corp.he.net
Machine and Network Monitoring - Colocation tips and resources
http://ashaver.corp.he.net/monitoring.html
Routers, New and Used Networking Equip, and Cables. Machine and Network Monitoring Tools. Real Time Credit Card Processing. Here are some of the most common resources for setting up and maintaining your own webserver. You will find resources that I have found to be useful to many of my colocation customers. Be sure to let me know if you have any questions or if there is something you have found useful that you would like to share with others. Send me an email at ashaver@he.net. Times to send alerts.
oss-galaxy.de
Open Source Galaxy - Networking
http://www.oss-galaxy.de/infrastructure/network.htm
Die hier veröffentlichten Informationen über Open Source unterliegen der GNU Free Documentation License. Sie dürfen daher nach den Bestimmungen dieser Lizenz weiterverarbeitet, genutzt und verteilt werden, solange diese Rechte bei der Weitergabe nicht eingeschränkt werden. Diese Seite enthält jedoch zum Teil vertrauliche und rechtlich geschützte Informationen. Das unerlaubte Kopieren sowie die unbefugte Weitergabe dieser Informationen sind nicht gestattet. Powered by Eno Vaso 2005. Weitere Dienstleistung...
breaktoprotect.blogspot.com
Break To Protect: January 2013
http://breaktoprotect.blogspot.com/2013_01_01_archive.html
A Security Blog: My Personal Hacking Fumbles and Rumbles! Friday, January 18, 2013. Nipper Studio Licensing Protection Bypass. Ever heard of Titania's Nipper Studio (previously known as Nipper One)? Such an awesome software yet with poor licensing protection - what a shame! Sorry guys, I will not be sharing the step-by-step cracking as you know, lawsuit, -$, jail-term, blah. If you happen to be Titania, and wish to find out more on the license exploitation, please contact me: breaktoprotect@gmail.com.
SOCIAL ENGAGEMENT