PDA

توجه ! این یک نسخه آرشیو شده میباشد و در این حالت شما عکسی را مشاهده نمیکنید برای مشاهده کامل متن و عکسها بر روی لینک مقابل کلیک کنید : Hack,Security Magazine



Mohamad
01-26-2011, 04:20 AM
Short description of contents:
* Using real-time events to drive your network scans


* The Nmap project: Open source (http://www.azardl.com/)with style
* A look at geolocation, URL shortening and top Twitter threats
* Review: Data Locker
* Making clouds secure
* Top 5 myths about wireless protection
* Securing the foundation of IT systems
* Is your data recovery provider a data security problem?
* Security for multi-enterprise applications
* In mashups we trust?
* AND MORE!


http://pic.azardl.com/images/71413420879042317701.jpg (http://pic.azardl.com/)




http://dl.azardl.com/2011/azardl.com_INSECURE-Mag-22_p30ask.com.pdf

Mohamad
01-26-2011, 04:22 AM
* Writing a secure SOAP client with PHP: Field report from a real-world project
* How virtualized browsing shields against web-based attacks
* Review: 1Password 3
* Preparing a strategy for application vulnerability detection
* Threats 2.0: A glimpse into the near future
* Preventing malicious documents from compromising Windows machines
* Balancing productivity and security in a mixed environment
* AES and 3DES comparison analysis
* OSSEC: An introduction to open source log and event management
* Secure and differentiated access in enterprise wireless networks
* AND MORE!


http://www.net-security.org/dl/insec...URE-Mag-24.pdf (http://www.net-security.org/dl/insecure/INSECURE-Mag-24.pdf)

Mohamad
01-26-2011, 04:25 AM
http://www.ashiyane.org/forums/images/icons/icon1.gif IN)SECURE Magazine-April 2010)


http://www.net-security.org/images/insecure/issues/issue25.jpg


* The changing face of penetration testing: Evolve or die!
* Review: SmartSwipe
* Unusual SQL injection vulnerabilities and how to exploit them
* Take note of new data notification rules
* RSA Conference 2010 coverage
* Corporate monitoring: Addressing security, privacy, and temptation in the workplace
* Cloud computing and recovery, not just backup
* EJBCA: Make your own certificate authority
* Advanced attack detection using OSSIM
* AND MORE!

http://www.net-security.org/dl/insec...URE-Mag-25.pdf (http://www.net-security.org/dl/insecure/INSECURE-Mag-25.pdf)

Mohamad
01-26-2011, 04:26 AM
Hackin9 - May 2010


ماهنامه معروف Hackin9

http://www.security-database.com/toolswatch/IMG/jpg/image_hakin9_05_2010_EN.jpg

عناوین:


Writing WIN32 shellcode with a C-compiler
Flash memory mobile forensic
Threat Modeling Basics
Pwning Embedded ADSL Routers
Firewalls for Beginners

Regulars:

ID Fraud Expert Says by Julian Evans: Identity Theft Protection Services – a new industry is born
Tool reviews: NTFS Mechanic, Active@ Undelete Professional, KonBoot v1.1
Interview with:
Victor Julien, lead coder for the Open Information Security Foundation
Ferruh Mavituna, web application penetration tester and security tool developer


Download



http://download.hakin9.org/en/hakin9_04_2010_EN.pdf (http://download.hakin9.org/en/hakin9_04_2010_EN.pdf)

Mohamad
01-26-2011, 04:29 AM
شماره سی و یکم Hacker News

http://hotfile.com/dl/37453221/3c7b6...g.N31.pdf.htm (http://hotfile.com/dl/37453221/3c7b6dc/Hacker.News.Mag.N31.pdf.html)

Mohamad
01-26-2011, 04:31 AM
Security Matters - May/June 2010



http://hotfile.com/dl/45726373/ccd2d71/tech_and_learning_06-2010.rar.html

Mohamad
01-26-2011, 04:32 AM
new hackin9

http://download.hakin9.org/en/hakin9_04_2010_EN.pdf

Mohamad
01-26-2011, 04:33 AM
IN)SECURE Magazine-June 2010)

http://www.net-security.org/images/insecure/issues/issue26.jpg



* PCI: Security's lowest common denominator
* Analyzing Flash-based RIA components and discovering vulnerabilities
* Logs: Can we finally tame the beast?
* Launch arbitrary code from Excel in a restricted environment
* Placing the burden on the bot
* Data breach risks and privacy compliance
* Authenticating Linux users against Microsoft Active Directory
* Hacking under the radar
* iPhone backup, encryption and forensics
* AND MORE!

http://www.net-security.org/dl/insec...URE-Mag-26.pdf (http://www.net-security.org/dl/insecure/INSECURE-Mag-26.pdf)

Mohamad
01-26-2011, 04:35 AM
IN)SECURE Magazine-September 2010)

http://www.net-security.org/images/insecure/issues/issue27.jpg



* Review: BlockMaster SafeStick secure USB flash drive
* The devil is in the details: Securing the enterprise against the cloud
* Cybercrime may be on the rise, but authentication evolves to defeat it
* Learning from bruteforcers
* PCI DSS v1.3: Vital to the emerging demand for virtualization and cloud security
* Security testing - the key to software quality
* A brief history of security and the mobile enterprise
* Payment card security: Risk and control assessments
* Security as a process: Does your security team fuzz?
* Book review: Designing Network Security, 2nd Edition
* Intelligent security: Countering sophisticated fraud

http://www.net-security.org/dl/insec...URE-Mag-27.pdf (http://www.net-security.org/dl/insecure/INSECURE-Mag-27.pdf)

Mohamad
01-26-2011, 04:36 AM
Spyware Someone is always watching http://hakin9.org/system/editions/photo1s/1544/medium/hakin9_10_2010_EN.png?1288296768


http://www.4shared.com/file/8JNzVCIf/Spyware_Hakin9_10_2010.html

Mohamad
01-26-2011, 04:37 AM
http://www.net-security.org/images/insecure/issues/issue28.jpg


* Database protocol exploits explained
* Review: MXI M700 Bio
* Measuring web application security coverage
* Inside backup and storage: The expert's view
* Combating the changing nature of online fraud
* Successful data security programs encompass processes, people, technology
* Sangria, tapas and hackers: SOURCE Barcelona 2010
* What CSOs can learn from college basketball
* Network troubleshooting 101
* America's cyber cold war
* RSA Conference Europe 2010
* Bootkits - a new stage of development

http://www.net-security.org/dl/insec...URE-Mag-28.pdf (http://www.net-security.org/dl/insecure/INSECURE-Mag-28.pdf)