Sponsor Links |
Soft Name |
|
Wifitap - PoC for Communication over WiFi Networks Using Traffic Injection |
|
Wifitap is a proof of concept for communication over WiFi networks using traffic injection. It ba... Soft Directory:Wireless Security |
|
Free Security Courses - Watch & Download |
|
Web Application Security Module 1, Storage Media Sanitation (Object Reuse), Network Access Contro... Soft Directory:Group Releases |
|
Defeating Windows Personal Firewalls : Filtering Methodologies, Attacks, and Defenses |
|
This paper provides a better understanding of how network traffic is processed by Microsoft Windo... Soft Directory:Group Releases |
|
Analysis of Vulnerabilities in Internet Firewalls |
|
This paper describes a novel methodology for analyzing vulnerabilities in Internet firewalls. A f... Soft Directory:Group Releases |
|
Reverse Engineering and Java Viral Analysis |
|
This article presents some techniques that Java malicious programs might use to prevent or delay ... Soft Directory:Group Releases |
|
Googling Forensics - Personal Desktop Searching Utilities |
|
This paper discusses the emerging trend of Personal Desktop Searching utilities on desktop PCs, a... Soft Directory:Group Releases |
|
Security Publications courtesy of the S3G |
|
"Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure", "On Th... Soft Directory:Group Releases |
|
Defense in Depth : Foundations for Secure and Resilient IT Enterprises |
|
The Defense-in-Depth Foundational Curriculum handbook (368 pages) discusses how technical assuran... Soft Directory:Group Releases |
|
Mobile Malware Evolution: An Overview, Part 2 |
|
Certainly from a theoretical point of view, these conclusions are logical, and reasonably convinc... Soft Directory:Group Releases |
|
Google Code Search - Exploring the Dark Corners |
|
Code search is a great resource for web developers and programmers, but like the making available... Soft Directory:Group Releases |
|