Netsec

Facebook Twitter

Nmap - Free Security Scanner For Network Exploration & Security Audits. Open source anti-theft solution for Mac, PCs & Phones – Prey. (IN)SECURE Magazine. ISSUE 41 (February 2014) Cloud security & Big Data Cloud insecurity?

(IN)SECURE Magazine

Time to bust the mythExecutive hot seat: Cloud Security Alliance CEOSecurity uncertainty in the cloud: Problems and potential solutionsShare with the world: Who reads my data in the cloud? Executive hot seat: Intrinsic-ID CEOPrivacy in the cloud: The power of encryptionHow to recover deleted or corrupted digital currencyLeveraging Big Data for security operationsThe past, present, and future of Big Data securityInformation stewardship: Avoiding data breaches and managing Big Data Generating value from Big Data analyticsToo big to fail: The Big Data dilemma. Ophcrack. Tomato Firmware | polarcloud.com. Tomato is a small, lean and simple replacement firmware for Linksys' WRT54G/GL/GS, Buffalo WHR-G54S/WHR-HP-G54 and other Broadcom-based routers.

Tomato Firmware | polarcloud.com

It features a new easy to use GUI, a new bandwidth usage monitor, more advanced QOS and access restrictions, enables new wireless features such as WDS and wireless client modes, raises the limits on maximum connections for P2P, allows you to run your custom scripts or telnet/ssh in and do all sorts of things like re-program the SES/AOSS button, adds wireless site survey to see your wifi neighbors, and more. Screenshots This firmware is provided as-is without any warranty. Phantom - System for generic, decentralized, unstoppable internet anonymity. The Phantom protocol is a system for decentralized anonymization of generic network traffic.

phantom - System for generic, decentralized, unstoppable internet anonymity

It has been designed with the following main goals in mind: 1. Completely decentralized. Penetration Testing | The Metasploit Project. Welcome to SecurityTube! BackTrack Linux - Penetration Testing Distribution. OpenDNS | Internet Navigation And Security. Security Now! Episode Archive. How to Pod Slurp. ***Disclaimer***The following is for informational purposes only, I take no responsibility for what you do with this knowledge.

How to Pod Slurp

I can not be held responsible for any property, emotional, or any other kind of damages caused by this technique. I believe it would be safe to assume that this is illegal and could get you into some trouble.You've been warned. :-) Kaspersky Lab United States | Antivirus Computer Security. Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources.