Sponsor Links |
Soft Name |
|
Medieval Bluetooth Diagnostic Tool |
|
Medieval Bluetooth Diagnostic Tool allows you to analyze and scan a local Bluetooth network. Soft Directory:mobile phones |
|
Technical Analysis of the Skype Trojan |
|
Copy pasting protection code without even changing it a little, provides no security at all and a... Soft Directory:Group Releases |
|
An Analysis of the Shipped-Vulnerable Acer Notebooks |
|
Luckily, the Acer Aspire 5600 notebook has already been updated to IE7. This prevents silent exec... Soft Directory:Group Releases |
|
Windows Vista - How Secure is the New OS? |
|
On that note, you might ask us what differences exist between Windows XP and Windows Vista with r... Soft Directory:Group Releases |
|
The Insider Threat To Information Systems |
|
These information technology specialists¡ªoperators, programmers, networking engineers, and syste... Soft Directory:Group Releases |
|
Web Security Trends Reports - 2006 |
|
Web Security Trends Report - Q1/2006, Web Security Trends Report - Q2/2006, Web Security Trends R... Soft Directory:Group Releases |
|
Who needs sophisticated malware? |
|
The huge user base that Windows operating systems have gives enough potential victims that the ba... Soft Directory:Group Releases |
|
String Theory for Windows |
|
With that in mind, I ve put together a series of tables of quick facts about the various string f... Soft Directory:Programming |
|
Wireless Forensics : Tapping the Air - Part Two |
|
In this second article, we take it a step further and focus on the technical challenges for wirel... Soft Directory:Wireless Security |
|
Turning Firefox Into an Auditing Platform |
|
Here are some useful extensions we used to play with during our application security assessment. Soft Directory:Group Releases |
|