Главная Материалы сайта (страница 30)

Материалы сайта

U.S. Army Website Hacked

Romanian hackers continue to have a field day with SQL injection flaws in major Website applications: A vulnerability in a U.S. Army Website that leaves the database wide open to an attacker has now been exposed.

Революция в *nix-системах: новый взгляд на повышение привилегий

Сегодня мы с тобой свершим переворот в сложившихся устоях мира. Наверняка, ты уже имел дело с web-shell'ами, такими как r57, c99, WSO2 и иже с ними. Так, вот о чем я — уверен, зайдя на свежезалитый шелл, ты первым делом смотришь свои права в системе, а именно – результат команды "id" в nix-like системах

Привратник для локальной сети

UserGate Proxy & Firewall - это комплексное решение для организации общего доступа в интернет из локальной сети, управления трафиком и защиты корпоративной сети от внешних угроз. В этом ролике мы покажем, как установить UGPF 5.1, и познакомимся с основными его настройками.

Social networking hacks: Top 10 Facebook and Twitter security stories of 2009

Facebook and Twitter use skyrocketed in 2009, and naturally the social networking sites became magnets for hacker attacks and sparked other types of privacy concerns. CIOs have expressed doubts about the social networking sites, and these stories show there is good reason to be worried. Here, in chronological order, are the top 10 security and privacy stories concerning Facebook and Twitter from the past year.

Top Five Data Security Trends for 2010

With 2009 behind us, we look forward to what the next year might bring. The question of what changes might be coming in terms of data security begs answering. The ongoing battle between hackers and the teams defending sensitive information means that the techniques in use by both sides last year will be updated, and the better you are able to predict what the other side may do, the more likely you will be prepared to defend against it

Top Five Data Security Trends for 2010

With 2009 behind us, we look forward to what the next year might bring. The question of what changes might be coming in terms of data security begs answering. The ongoing battle between hackers and the teams defending sensitive information means that the techniques in use by both sides last year will be updated, and the better you are able to predict what the other side may do, the more likely you will be prepared to defend against it

Hackers Compromise Fox Sports Website

According to a warning released by security researchers, the Fox Sports website, an integral part of the Fox Broadcasting Company, has gone under the control of unknown hackers. The hackers injected malware inside the 'custom error' section of the site. Two different malicious codes have been found, each as a result of a different infection.

Конкурс OLDI Computers

Одним из преимуществ покупки готового ПК является то, что в нем могут быть установлены такие компоненты, которые ты бы никогда не приобрел, собирая компьютер самостоятельно. Отнюдь не потому, что они плохие – просто имея определенные бюджетные рамки мы стремимся к компромиссу между производительностью и ценой, поэтому редко приобретаем новейшие или топовые комплектующие, чья стоимость оказывается несколько завышенной в силу той самой топовости или новизны

Microsoft rolls out Word patch

Microsoft has already begun offering what appears to be a patch for its popular Word software, allowing it to comply with a recent court ruling which has banned the software giant from selling copyright infringing versions of the word processing product.

Xbox 360 Thief Tracked by Gamertag

If you steal an Xbox 360, don't forget to disable the auto sign-in feature before going online. That's the lesson high-tech crooks are probably gleaning from today's New York Post brief about a thief, 22-year-old Jeremy Gilliam, apprehended after logging into Xbox LIVE with his victim's online game id.

Hackers unsuccessfully attack site

On Dec. 11, the bank’s information technology director Christine Lee met with Dells police to report that a person or persons gained unauthorized access to the bank’s domain registration. Between Dec. 5 and Dec. 7, changes made to the domain redirected customers accessing dellsbank.com or commbankportage.com to a fictitious web page. The page stated that “your account has been created” and that the person could access the Web site by going to another link

Good Guys Bring Down the Mega-D Botnet

For two years as a researcher with security company FireEye, Atif Mushtaq worked to keep Mega-D bot malware from infecting clients' networks. In the process, he learned how its controllers operated it. Last June, he began publishing his findings online. In November, he suddenly switched from de­­fense to offense. And Mega-D--a powerful, resilient botnet that had forced 250,000 PCs to do its bidding--went down.

Взломанный .NET

Думаешь .NET приложения сложны для взлома? Поверь, крекинг .NET-сборок ничуть не сложнее, а в целом значительно проще традиционных приложений. В ролике ты увидишь процесс решения одного из .NET CrackMe. На закуску продемонстрирована процедура снятия защиты с помощью шифрования.

DDoS attack on DNS hits Amazon and others briefly

Internet users in Northern California were unable to reach properties including Amazon.com and Amazon Web Services for a time Wednesday evening, as their DNS provider was targeted by a distributed denial-of-service attack. The attack came as North American consumers rushed to finish online shopping ahead of the end-of-year holiday season.

E-Book Piracy: The Publishing Industry`s Next Epic Saga?

As e-readers such as the Amazon Kindle continue to rise, so follows the publishing industry's worst nightmare: e-book piracy. For years e-book piracy was the exclusive province of the determined few willing to ferret out mostly nerdy textbook titles from the Internet's dark alleys and read them on their PC. But publishers say that the problem is ballooning as e-readers grow in popularity and the appetite for mainstream e-books grows.

New critical IIS flaw discovered

Security experts are warning of a highly critical new zero day vulnerability in Microsoft’s popular Internet Information Services (IIS) web server product which could allow hackers to bypass existing security measures and upload malicious code to any affected machine.

Starry Twitter: Hacking the Stephen Fry account

Watching the feeds, one’s can often face the news that another Twitter account of some Britney Spears, John McCain and others of that ilk was hacked. Typically, these hacks do not make much effort and are hacked using “brute force” (stars like to set some simple passwords). But brute force – is not our method. British comedian, "The Hitchhiker's Guide to the Galaxy" and "V - for Vendetta" film star, Stephen Fry, can be taken as an example

Фабрика сплоитов: учимся писать эксплоиты для Metasploit Framework

Откуда берутся сплоиты? Задумывался ли ты, каким образом тусклая новость из багтрака превращается в реально работающую отмычку? Каким образом двумя десяткам строчек кода удается получить шелл на удаленном сервере? Сегодня мы посетим фабрику сплоитов и во всех подробностях посмотрим, как изготавливается качественное изделие.

Страница 30 из 200В начало...10202829303132 405060...
«ХАКЕР» ДОСТУПЕН ТОЛЬКО В ЭЛЕКТРОННОЙ ВЕРСИИ
Оформи подписку — получи:
  • доступ к платным материалам сайта
  • доступ ко всем номерам PDF
7690 р.
на год
720 р.
на месяц
90 р.
за 1 статью

«Хакер» в соцсетях

Telegram ВКонтакте Twitter Facebook

Еженедельный дайджест

Статьи для подписчиков