Get flash to fully experience Pearltrees
When the security vulnerability hasn’t been publicly disclosed or the patch isn’t yet available from the vendor, it adds up to a zero-day attack because there’s no known fix. This makes the vulnerability a prime target for hackers. An unprecedented rise in zero-day vulnerabilities was one of the top security trends last year — 16 such vulnerabilities were discovered in Microsoft products alone. The most common vectors for zero-day attacks were through Web pages containing malicious code for exploiting Internet Explorer and e-mail attachments containing malicious code for Microsoft Office applications. Another alarming trend is that zero-day vulnerabilities in Microsoft Office applications are being used for corporate espionage.
Stefan Frei 1 , Bernhard Tellenbach 1 , Bernhard Plattner 1 Computer Engineering and Networks Laboratory (CSG), ETH Zurich [ Paper | HTML | slides | bibtex | media coverage ]
THC-Amap Amap was innovative - the first tool to perform application protocol detection. Then a better approach was implemented into nmap, this and the large user base of nmap made amap pretty much obsolete.
GpsDrive is a car (bike, ship, plane) navigation system for the linux system. On this page you will find a Mac OS X compiled version which has an addon for Mac OS X. It uses the airport WLAN card for scanning wireless accesspoints and stores them into the MySQL database (like KISMET under linux).
A GNU/Linux utility for viewing/manipulating the MAC address of network interfaces
SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools.
Cisilia is a mutli-process password cracking system.
With Distributed John (DJohn) you can crack passwords using several machines to get passwords sooner than using a single machine.
Trusted information and applicative apparatus is a base for all organisations and we are not any different, this can set a base for interested individuals to touch base and keep up to date. This can be a full time job in itself but with our help and assistance, this page should cut out the hassle and time. Do you want to learn what the current industry obstacles are? What integral members of information security think of the future of virtualisation?