securosis.com
The Business Justification for Data Security. Building a Web Application Security Program. Securosis: On Holiday. Database Security: The Other First Steps ...
http://www.securosis.com/
popularity:
security
blog
technology
mac
sysadmin
networking
network
osx
infosec
blogs
|
阿碼外傳-阿碼科技非官方中文 Blog
惡意的PDF檔案一點都不是新聞,過去 doc、flash 以及圖片等都已經被大量利用在 PC 的感染中,但前一陣子在日本以及各地頻傳的事件 (1,2) 顯示,才 ... 這次利用的攻擊瀏覽器方式稱為 JSRedir-R,它其實是一種攻擊方式的通稱,在友廠的分類說明中可以見到它是利用 PDF, Flash/SWF 的漏洞來讓瀏覽器, ...
similarity:
popularity:
security
blog
技
其他
tech
free
network
|
Macintosh Security Site - Security for Mac Platform MacOS X Security Firewalls Desktop Network Security secure mac os x Virus Encrpytion PGP macosx
Devoted to Apple Macintosh security issues. Offers news, software reviews, and MacScan software for detection and removal of spyware in the Classic Mac OS and OS X.
similarity:
popularity:
security
mac
osx
apple
macosx
software
macintosh
news
reference
tools
|
Home - The Community's Center for Security
LinuxSecurity.com delivers the latest breaking news and information on security, linux, open source, firewalls, networks, privacy, encryption, cryptography, hacks, ...
similarity:
popularity:
linux
security
news
sysadmin
network
administration
opensource
networking
howto
computer
|
Intrusion Prevention IPS | Network Access Control NAC | TippingPoint | Home
Provider of network platform and open development environment infrastructure services.
similarity:
popularity:
security
ips
ids
network
networking
intrusion
hardware
sysadmin
software
resources
|
Daring Fireball
Mac nerdery and general web curmudgeonry, by John Gruber.
similarity:
popularity:
blog
mac
apple
blogs
tech
osx
design
technology
news
macintosh
|
Didier Stevens
I did some research and discovered that Adobe implemented a blacklist ... but that the blacklisting functionality identifies the file type of "cmd.exe" as. ...
similarity:
popularity:
security
blog
forensics
hacking
pdf
blogs
windows
malware
computers
research
|
SecViz | Security Visualization
This is the place to share, discuss, challenge, and learn about security data visualization, log visualization, and IT data visualization.
similarity:
popularity:
security
visualization
tools
analysis
monitoring
graphs
network
blog
graphics
sysadmin
|
[lcamtuf.coredump.cx]
Click here for sample chapters, plenty of reviews, and other useful information. ... NEW Interesting vulnerabilities: exploitable DOM fuzzing crashes in multiple ...
similarity:
popularity:
security
hacking
programming
tools
network
software
people
blog
linux
geek
|
SGUIL - The Analyst Console for Network Security Monitoring.
your description goes here ... Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil's main component is an ...
similarity:
popularity:
security
monitoring
network
ids
snort
software
tools
networking
opensource
sysadmin
|
Setting up firmware password protection in Mac OS X
Setting up firmware password protection in Mac OS X. Last Modified: June 26, 2009 ... You can use the Open Firmware Password application to set up low-level password ...
similarity:
popularity:
security
mac
osx
password
firmware
apple
hardware
howto
macosx
protection
|