1. Autospy Autopsy is a digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate…
Read moreAnyone can, with the right equipment, access wireless networks (wireless local area networks, wlan’s). After all, there is no physical barrier that makes break-in attempts more difficult, as is the case with wired…
Read moreReverse-engineering is especially important with computer hardware and software. Programs are written in a language, say C, C++ or Java, that’s understandable by other programmers. But to run on a computer, they have…
Read moreFor those who are interested in learning how to do Penetration Testing, there are many tools and operating systems are available, but very few targets to practice against safely – not to mention…
Read moreNetwork scanning refers to the use of a computer network to gather information regarding computing systems. Network scanning is mainly used for security assessment, system maintenance, and also for performing attacks by hackers….
Read more1. Common Vulnerabilities and Exposures (CVE) CVE (Common Vulnerability and Exposures) is a list of entries, each containing an identification number, a description, and at least one public reference – for publicly known…
Read more1. Nudge4j Nudge4j is a tiny piece of Java code to make your Java application accessible to the browser. It’s meant for use during development to provide an environment for experimenting with code…
Read moreA conference is a meeting of people who “confer” about a topic. Conference types include: Convention (meeting), meeting of a, usually large, group of individuals and/or companies in a certain field; Academic conference,…
Read more1. Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software 1st Edition Amazon Buy Link – https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901 Price – $28.78 (Paperback) & $34.35 (Kindle) Rating – 4.5 out of 5 Nostarch Link – https://nostarch.com/malware…
Read moreNowhere is the term hacker more misconstrued than in the network security field. This is understandable because the very same tools that network security professionals use to probe the robustness of their own…
Read more