begood Posted March 4, 2010 Report Posted March 4, 2010 (edited) ISSUE 24 (February 2010)DOWNLOAD ISSUE 24 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-24.pdfThe covered topics are: * Writing a secure SOAP client with PHP: Field report from a real-world project * How virtualized browsing shields against web-based attacks * Review: 1Password 3 * Preparing a strategy for application vulnerability detection * Threats 2.0: A glimpse into the near future * Preventing malicious documents from compromising Windows machines * Balancing productivity and security in a mixed environment * AES and 3DES comparison analysis * OSSEC: An introduction to open source log and event management * Secure and differentiated access in enterprise wireless networks * AND MORE!ISSUE 23 (November 2009)DOWNLOAD ISSUE 23 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-23.pdfThe covered topics are: * Microsoft's security patches year in review: A malware researcher's perspective * A closer look at Red Condor Hosted Service * Report: RSA Conference Europe 2009, London * The U.S. Department of Homeland Security has a vision for stronger information security * Q&A: Didier Stevens on malicious PDFs * Protecting browsers, endpoints and enterprises against new Web-based attacks * Mobile spam: An old challenge in a new guise * Report: BruCON security conference, Brussels * Study uncovers alarming password usage behavior * Elevating email to an enterprise-class database application solution * AND MORE!ISSUE 22 (September 2009)DOWNLOAD ISSUE 22 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-22.pdfThe covered topics are: * Using real-time events to drive your network scans * The Nmap project: Open source with style * A look at geolocation, URL shortening and top Twitter threats * Review: Data Locker * Making clouds secure * Top 5 myths about wireless protection * Securing the foundation of IT systems * Is your data recovery provider a data security problem? * Security for multi-enterprise applications * In mashups we trust? * AND MORE!ISSUE 21 (June 2009)DOWNLOAD ISSUE 21 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-21.pdfThe covered topics are: * Malicious PDF: Get owned without opening * Review: IronKey Personal * Windows 7 security features: Building on Vista * Using Wireshark to capture and analyze wireless traffic * "Unclonable" RFID - a technical overview * Secure development principles * Q&A: Ron Gula on Nessus and Tenable Network Security * Establish your social media presence with security in mind * A historical perspective on the cybersecurity dilemma * A risk-based, cost effective approach to holistic security * AND MORE!ISSUE 20 (March 2009)DOWNLOAD ISSUE 20 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-20.pdfThe covered topics are: * Improving network discovery mechanisms * Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus * What you need to know about tokenization * Q&A: Vincenzo Iozzo on Mac OS X security * A framework for quantitative privacy measurement * Why fail? Secure your virtual assets * Phased deployment of Network Access Control * Web 2.0 case studies: challenges, approaches and vulnerabilities * ISP level malware filtering * Q&A: Scott Henderson on the Chinese underground * AND MORE!Vedeti site-ul de mai jos pentru toate revistele (IN)SECURE !(IN)SECURE Magazine - ArchiveLE: le am toate, reply sau pm daca le vreti arhivate.torrent magnet Edited March 4, 2010 by begood Quote