Sponsor Links |
Soft Name |
|
MadMACs: MAC Address Spoofing And Host Name Randomizing App For Windows |
|
MadMACs was designed with the privacy paranoid in mind. The two main things a DHCP server records... Soft Directory:Group Releases |
|
Password Management Concerns with IE and Firefox, Part Two |
|
Part one of this article concluded just after discussing two JavaScript attacks against web brows... Soft Directory:Group Releases |
|
Password Management Concerns with IE and Firefox, Part One |
|
This two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses... Soft Directory:Group Releases |
|
Top 20 Hackers in Film History |
|
Jack Stanfield, Firewall (2006), J-Bone, Johnny Mnemonic (1995), Lazlo Hollyfeld, Real Genius (19... Soft Directory:Group Releases |
|
Zero Day Vulnerabilities Tracker |
|
Keep track of all the current vulnerabilities without patches, and notice the "days of expos... Soft Directory:Group Releases |
|
Analysis of the Recent MySpace Worm |
|
SPI Labs has acquired and analyzed the source code for the worm. This worm is capable of executin... Soft Directory:Group Releases |
|
Brief Analysis of the "Technical Mujahid" |
|
The editors of the publication state that it was written to heed the directives of the Emir of al... Soft Directory:Group Releases |
|
Browser Port Scanning without JavaScript |
|
Using some timing tricks, I "think" Ive discovered a way to perform Intranet Port Scann... Soft Directory:Group Releases |
|
Role Based Access Control Resources |
|
Role based access control (also called role based security), as formalized in 1992 by David Ferra... Soft Directory:Group Releases |
|
An AJAX Proof of Concept Worm |
|
Few weeks ago I demonstrated a Proof of Concept of how easy it is to create an Ajax worm which hi... Soft Directory:Group Releases |
|