imilar to packet sniffing, port scanning and other "security tools", vulnerability scanning can help you to secure your own network or it can be used by the bad guys to identify weaknesses in your system to mount an attack against. The idea is for you to use these tools to identify and fix these weaknesses before the bad guys use them against you.

The goal of running a vulnerability scanner is to identify devices on your network that are open to known vulnerabilities. Different scanners accomplish this goal through different means. Some work better than others.

Some may look for signs such as registry entries in Microsoft Windows operating systems to identify that a specific patch or update has been implemented. Others, in particular Nessus ... Read more »

Views: 8426 | Added by: Siegh_Wahrhreit | Date: 29 May 2009 | Comments (0)

actually there are some tools that function as a defense most of your computer but this time other than the firewall, I also encourage you to further increase your security .... tolerable than not at all, and a little difficult to do in the hacker act (at least that only professionals can break down your site or your computer. heheheh )

this is the some of many tools

PC + Browser protection >
PC protection >
Browser protection >
... Read more »

Views: 8585 | Added by: Siegh_Wahrhreit | Date: 29 May 2009 | Comments (0)

<img href="http://www.ghoztcraft.net/Uploader/files/1/dos55.PNG">
try this to get your own


download file
http://rapidshare.com/files/120770936/DoS_5.0.rar.html

Views: 11034 | Added by: Siegh_Wahrhreit | Date: 27 May 2009 | Comments (2)


<?php
       /*
       COWON America jetCast 2.0.4.1109 (.mp3) local heap buffer overlow exploit (xp/sp3)
       by Nine:Situations:Group::pyrokinesis

       site: http://retrogod.altervista.org/
       software site: http://www.jetaudio.com/
       Tested against JetAudio pack v.7.5.2
       ---------------------------------------------------------------------------------
       Passing an overlong string as id3 tag we have:

       (370.7a8): Access violation - code c0000005 (first chance)
       First chance exceptions are reported before any exception handlin ... Read more »
Views: 8354 | Added by: Siegh_Wahrhreit | Date: 27 May 2009 | Comments (0)

Jakob Lell from the TU Berlin computer security working group (
http://www.agrs.tu-berlin.de/v-menue/ag_rechnersicherheit/parameter/en/
) has discovered multiple vulnerabilities in several ATEN IP KVM
Switches.


Affected products:
- ATEN KH1516i IP KVM Switch (browser firmware version 1.0.063)
- ATEN KN9116  IP KVM Switch (firmware version 1.1.104)
- Aten PN9108  Power over the NET (only CVE-2009-1477)

The KH1508i uses the same firmware as the KH1516i and is thus most
likely affected as well. The KN9108 uses the same firmware as the
KN9116. It is possible that other devices are affected as well. If you
have access to other similar devices and want to test whether they are
vulnerable as well, please contact me at jakob@cs.tu-berlin.de.


... Read more »
Views: 8714 | Added by: Siegh_Wahrhreit | Date: 27 May 2009 | Comments (0)

google earth is one of many facility that serve by google coorporation to make life even small and easy to get by hand
google earth is the program that it give us the picture of earth which taken from satellite. we can look all of earth side


but in other side google make this program be the expensive price for own
and sale to everyone that have the money

because of that reason
i will give you that application for free
http://rapidshare.com/files/206330195/Google_Earth_5.0.1337.rar


this for google portable

http://rapidshare.com/files/20311
		
		... 
		
			Read more »
		
Views: 1576 | Added by: Siegh_Wahrhreit | Date: 10 May 2009 | Comments (0)

------------------------------
--------------------------
MULTIPLE REMOTE VULNERABILITIES--Leap CMS 0.1.4-->
--------------------------------------------------------

 CMS INFORMATION:

-->WEB: http://leap.gowondesigns.com/
-->DEMO: http://php.opensourcecms.com/scripts/details.php?scriptid=161&name=Leap
-->CATEGORY: CMS / Lite
-->DESCRIPTION: Leap is a single file, template independent, open-source,
               standards-compliant,extensible content management system for the web...
-->RELEASED: 2009-03-13

 CMS VULNERABILITY:

-->TESTED ON: firefox 3 and I-Explorer 6
-->DORK: "Powered by Leap"
-->CATEGORY: AUTH-BYPASS(SQLi)/ ... Read more »
Views: 1838 | Added by: Siegh_Wahrhreit | Date: 01 May 2009 | Comments (0)

http://securitytoolslist.domandhost.com
this site will give you all hacker tools information that will make you easy to recognise
to know what tools that must you got for hack some website or application that you need or want to hack
Views: 8382 | Added by: Siegh_Wahrhreit | Date: 01 May 2009 | Comments (0)

[Snip]
I. Background
~~~~~~~~~~~~~
ESET develops software solutions that deliver instant, comprehensive protection
against evolving computer security threats. ESET NOD32® Antivirus, is the flagship
product, consistently achieves the highest accolades in all types of
comparative testing and is the foundational product that builds
out the ESET product line to include ESET Smart Security.

http://www.eset.com/products/eset_performance_advantages.php

[Snip..]

I. Background
~~~~~~~~~~~~~
I. Background
Quote:"Trend Micro Incorporated is a global leader in network antivirus and Internet content security software and services. Founded in 1988, Trend Micro was a pioneer in secure content and threat management, leading the migration of early virus protection from the desktop to the network server and the Internet gateway. Today, th ... Read more »
Views: 8666 | Added by: Siegh_Wahrhreit | Date: 30 April 2009 | Comments (0)

______________________________
________________________________________

              Trendmicro RAR,CAB,ZIP bypass/evasions
______________________________________________________________________

Release mode: Coordinated but limited disclosure.
Ref         : TZO-172009 - Trendmicro RAR,CAB,ZIP bypass/evasion
WWW         : http://blog.zoller.lu/2009/04/trendmicro-multiple-evasion-and-bypass.html
Status      : No patch, but mitigation recommendations for certain
             products (see below)
Vendor      : http://www.trendmicro.com/
Security notification reaction rating : Good
Noti ... Read more »
Views: 1287 | Added by: Siegh_Wahrhreit | Date: 30 April 2009 | Comments (1)

« 1 2 ... 17 18 19 20 21 22 »
close