imilar to packet sniffing, port scanning
and other "security tools", vulnerability scanning can help you to
secure your own network or it can be used by the bad guys to identify
weaknesses in your system to mount an attack against. The idea is for you to use these tools to identify and fix these weaknesses before the bad guys use them against you.
The goal of running a vulnerability scanner is to identify devices on your network that are open to known vulnerabilities. Different scanners accomplish this goal through different means. Some work better than others. Some may look for signs such as registry entries in Microsoft Windows operating systems to identify that a specific patch or update has been implemented. Others, in particular Nessus ... Read more » |
actually
there are some tools that function as a defense most of your computer
but this time other than the firewall, I also encourage you to further
increase your security .... tolerable than not at all, and a little
difficult to do in the hacker act (at least that only professionals
can break down your site or your computer. heheheh )
this is the some of many tools
PC + Browser protection > |
<img href="http://www.ghoztcraft.net/Uploader/files/1/dos55.PNG">
try this to get your own download file http://rapidshare.com/files/120770936/DoS_5.0.rar.html |
<?php
/* COWON America jetCast 2.0.4.1109 (.mp3) local heap buffer overlow exploit (xp/sp3) by Nine:Situations:Group:: site: http://retrogod.altervista. software site: http://www.jetaudio.com/ Tested against JetAudio pack v.7.5.2 ------------------------------ Passing an overlong string as id3 tag we have: (370.7a8): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handlin ... Read more » |
Jakob Lell from the TU Berlin computer security working group (
http://www.agrs.tu-berlin.de/ ) has discovered multiple vulnerabilities in several ATEN IP KVM Switches. Affected products: - ATEN KH1516i IP KVM Switch (browser firmware version 1.0.063) - ATEN KN9116 IP KVM Switch (firmware version 1.1.104) - Aten PN9108 Power over the NET (only CVE-2009-1477) The KH1508i uses the same firmware as the KH1516i and is thus most likely affected as well. The KN9108 uses the same firmware as the KN9116. It is possible that other devices are affected as well. If you have access to other similar devices and want to test whether they are vulnerable as well, please contact me at jakob@cs.tu-berlin.de. ... Read more » |
google earth is one of many facility that serve by google coorporation to make life even small and easy to get by hand
google earth is the program that it give us the picture of earth which taken from satellite. we can look all of earth side but in other side google make this program be the expensive price for own and sale to everyone that have the money because of that reason i will give you that application for free http://rapidshare.com/files/206330195/Google_Earth_5.0.1337.rar this for google portable http://rapidshare.com/files/20311 ... Read more » |
------------------------------ MULTIPLE REMOTE VULNERABILITIES--Leap CMS 0.1.4--> ------------------------------ CMS INFORMATION: -->WEB: http://leap.gowondesigns.com/ -->DEMO: http://php.opensourcecms.com/ -->CATEGORY: CMS / Lite -->DESCRIPTION: Leap is a single file, template independent, open-source, standards-compliant,extensible content management system for the web... -->RELEASED: 2009-03-13 CMS VULNERABILITY: -->TESTED ON: firefox 3 and I-Explorer 6 -->DORK: "Powered by Leap" -->CATEGORY: AUTH-BYPASS(SQLi)/ ... Read more » |
http://securitytoolslist.domandhost.com
this site will give you all hacker tools information that will make you easy to recognise to know what tools that must you got for hack some website or application that you need or want to hack |
[Snip]
I. Background ~~~~~~~~~~~~~ ESET develops software solutions that deliver instant, comprehensive protection against evolving computer security threats. ESET NOD32® Antivirus, is the flagship product, consistently achieves the highest accolades in all types of comparative testing and is the foundational product that builds out the ESET product line to include ESET Smart Security. http://www.eset.com/products/ [Snip..] I. Background ~~~~~~~~~~~~~ I. Background Quote:"Trend Micro Incorporated is a global leader in network antivirus and Internet content security software and services. Founded in 1988, Trend Micro was a pioneer in secure content and threat management, leading the migration of early virus protection from the desktop to the network server and the Internet gateway. Today, th ... Read more » |
______________________________ Trendmicro RAR,CAB,ZIP bypass/evasions ______________________________ Release mode: Coordinated but limited disclosure. Ref : TZO-172009 - Trendmicro RAR,CAB,ZIP bypass/evasion WWW : http://blog.zoller.lu/2009/04/ Status : No patch, but mitigation recommendations for certain products (see below) Vendor : http://www.trendmicro.com/ Security notification reaction rating : Good Noti ... Read more » |