Sponsor Links |
Soft Name |
|
Securing Java Applications with Acegi, Part 2 & Part 1 |
|
Access control with ApacheDS and Acegi. Soft Directory:Programming |
|
OpenSSH v4.6 Call Graph |
|
Today I had a look at the OpenSSH sources again. It seems to me that they overdo the whole PrivSe... Soft Directory:Programming |
|
Akathisia - Fuzzer |
|
Akathisia is a fuzzer designed to find remotely exploitable flaws in Microsofts RPC interface. Soft Directory:Programming |
|
Hackety Hack : The Coder s Starter Kit |
|
Presently, Ruby is the only language taught by Hackety Hack. And it is a great one to start with.... Soft Directory:Programming |
|
8 Defensive Programming Best Practices to Prevent Breaking Your Sites |
|
Handle unexpected conditions, Process external systems data properly, Test your code, Monitor you... Soft Directory:Programming |
|
Effective File Hiding : Bypassing Raw File System I/O Rootkit Detector |
|
Actually in China, many smart rootkit/antirootkit writers have their own interesting materials,bu... Soft Directory:Programming |
|
Fuzzled - A Fuzzing Framework |
|
Fuzzled is a powerful fuzzing framework. Fuzzled includes helper functions, namespaces, factories... Soft Directory:Programming |
|
BuGLe - a Graphical OpenGL Debugger |
|
The debugger allows viewing of state, textures, framebuffers, and shaders, while the filters allo... Soft Directory:Programming |
|
The Open Reverse Code Engineering Community |
|
OpenRCE aims to serve as a centralized resource for reverse engineers (currently heavily win32/se... Soft Directory:Programming |
|
Securing Java applications with Acegi, Part 1:Architectural Overview and Security Filters |
|
This three-part series introduces Acegi Security System, a formidable open source security framew... Soft Directory:Programming |
|