Items Tagged with "Tools"


69dafe8b58066478aea48f3d0f384820

Researchers Can Pinpoint Identity by Analyzing Usernames

February 08, 2011 Added by:Headlines

The researchers produced a tool that uses statistical analysis to calculate the relative uniqueness of any given username. The team can now distinguish a single user about half of the time by analyzing multiple usernames without using other key data such as location or date of birth...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google and Microsoft Clash Over IE Fuzzer Release

January 04, 2011 Added by:Headlines

Did a Google staff researcher jump the gun by releasing a tool that identifies dozens of exploitable bugs in Internet Explorer before critical patches were available, or did Microsoft drop the ball back in July by not addressing the problems when first presented to them? A cyber-drama is playing out...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Metasploit 3.5.1 Release Includes Cisco Exploits

December 18, 2010 Added by:Headlines

The recent Metasploit 3.5.1 release offers users a wider range of tools, with 47 new modules and 8 new scripts, and now includes options to perform exploits on Cisco products. The latest version of Metasploit has a total of 635 exploits, 314 auxiliary modules, and 215 payloads available...

Comments  (0)

E973b16363b3de77b360563237df7e32

Steganography - Passing Through the Defenses

December 15, 2010 Added by:Bozidar Spirovski

Steganography is still considered to be a part of the obscure tools of secret agents and corporate spies. But the science of counter-steganography is also advancing, and it is quite probable that such analysis will find their way in filter systems, like mail and web filters...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Developers Seek to Sharpen LOIC DDoS Attack Tool

December 15, 2010 Added by:Headlines

Given the amount of effort involved in mounting long term campaigns that seek to shape public opinion through reasoned discourse, the LOIC seems to be a logical alternative. The stark irony that such a tool would be spawned by the radical proponents of free speech will not be lost on historians...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Defeating Censorship or Undetectable Botnet C and C?

November 22, 2010 Added by:Dan Dieterle

How would you stop or even detect botnet command and control messages, when they are hidden inside tweets or Flickr photos? We may be fast approaching a time when social media traffic and picture sharing is banned altogether from company networks...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

The Top Free Log Management Tools

October 10, 2010 Added by:Anton Chuvakin

The log cheat sheet presents a checklist for reviewing critical system, network and security logs when responding to a security incident. It can also be used for routine periodic log review. It was authored by Dr. Anton Chuvakin and Lenny Zeltser...

Comments  (1)

E973b16363b3de77b360563237df7e32

Tools to Keep Sensitive Data Off Your Computer

October 03, 2010 Added by:Bozidar Spirovski

Sensitive data scanners are very useful tools. A periodic scan for leftover sensitive data is a good practice to maintain the security of your computer. This is even more true for enterprises, where this check-up should become part of the regular security awareness program...

Comments  (0)

Cc5b3987fdda8edb89d6f82eb0d64fed

The first thing about security

February 23, 2010 Added by:_ Comet

My first blog post, Comet's Home Page, is a document that contains settings and freeware that I typically install on my own Windows machines.  The purpose of that page is to serve as a reference, because there are many things that only need to be done once on a new machine, such as installing software or tweaking internet connection limi...

Comments  (2)

Page « < 6 - 7 - 8 - 9 - 10 > »