Sponsor Links |
Soft Name |
|
Mobile Malware Evolution: An Overview, Part 2 |
|
Certainly from a theoretical point of view, these conclusions are logical, and reasonably convinc... Soft Directory:Group Releases |
|
Google Code Search - Exploring the Dark Corners |
|
Code search is a great resource for web developers and programmers, but like the making available... Soft Directory:Group Releases |
|
Steganalysis of JPEG Images : Breaking the F5 Algorithm |
|
In this paper, we present a steganalytic method that can reliably detect messages (and estimate t... Soft Directory:Group Releases |
|
Anti-Forensics - slides |
|
Covers, encryption, stenography use and detection, hiding collections of pictures, disk wiping - ... Soft Directory:Group Releases |
|
Guide on Managing and Auditing IT Vulnerabilities |
|
The guide recommends specific management practices to help an organization achieve and sustain hi... Soft Directory:Group Releases |
|
MojoPac - Transform any Portable Storage Device Into Your Secure, Personal Computer |
|
MojoPac can turn any USB 2.0 compliant portable storage device, including your iPod, or your USB ... Soft Directory:Group Releases |
|
Fear the Metasploit Framework |
|
The Metasploit Project is one of the most popular penetration testing suites available. If youre ... Soft Directory:Group Releases |
|
Shellcodes for Linux, *BSD, SUN, etc. |
|
Resourceful archive of tools, projects, and related documents. Soft Directory:Group Releases |
|
Map and Details on All CERTs in Europe |
|
It is beyond doubt that the Computer Emergency Response Teams (CERTs) play a significant role in ... Soft Directory:Group Releases |
|
Netwox - a Network Toolbox Containing 222 Tools |
|
Toolbox netwox helps to find and solve network problems : - sniff, spoof - clients, servers - DNS... Soft Directory:Group Releases |
|