Blog Posts Tagged with "Open Source"
January 30, 2012 Added by:Ben Rothke
The Metasploit Project is an open-source security project that provides information about security vulnerabilities and assists those performing the penetration tests in building a framework in which to carry out the testing...
January 17, 2012 Added by:Scot Terban
This is an organic process. I learned by just doing it and in the process of “doing it” I had to learn A LOT of other things apart from technology issues like hacking/security/coding etc. Remember you are dealing with PEOPLE and you have to be adept and reading them...
December 14, 2011 Added by:Malgorzata Skora
With multi-tier network architectures, web services, custom applications, and heterogeneous server platform environments, keeping data assets secure is more difficult than ever. Coupled with this complexity is the fact that criminal organizations have organized their hacking efforts...
November 22, 2011 Added by:Keith Mendoza
This is a question that I would like to pose to the open-source software community: Assuming that we can ignore the lawyers for a second, what amount of effort would you be willing to put to produce software that is free of defect from workmanship? How will you go about making sure?
November 02, 2011 Added by:Andrew Case
We are announcing the release of Registry Decoder 1.1, a free and open source tool. We are reaching out to practitioners and research groups (professional and academic) in an attempt to proliferate Registry Decoder. We would appreciate any plugins contributed from these communities...
October 15, 2011 Added by:Spencer McIntyre
EAPeak is a suite of open source tools to facilitate auditing of wireless networks that utilize the Extensible Authentication Protocol framework for authentication. It provides useful information relating to the security of these networks for PenTesters to use in searching for vulnerabilities...
September 28, 2011 Added by:Scot Terban
Anonymous came up with a new splinter organization that claims to be looking into corporate wrongdoing. This group is called Anonymous Analytics and claims that they are using open source information as well as soliciting leaks/whistleblowers to reveal corporate malfeasance...
September 01, 2011 Added by:Anton Chuvakin
If you received any hints with the log pile, then you can search for this and then branch out to co-occurring and related issues and drill-down as needed, but then your investigation will suffer from “tunnel vision” of only seeing this initially reported issue and that is, obviously, a bad idea...
August 22, 2011 Added by:Bozidar Spirovski
Identify your point of interest - who/what is your target of investigation. Start broad, and then narrow down to the interesting elements, then you can start drilling for material left on the Internet by them for further useful clues...
August 11, 2011 Added by:Bozidar Spirovski
Regardless of whether you need to collect information on a potential competitor, the target of a penetration test, for financial spread betting and derivatives trading, or even for financial research of a company there are several lessons that the "The Big Short" teaches us...
August 01, 2011 Added by:Headlines
"WASP is equipped with the tools to crack Wi-Fi network passwords made possible by an on-board VIA EPIA Pico-ITX PC running BackTrack Linux equipped with 32GB of storage to record information. WASP can also act as a GSM network antenna meaning it will be able to eavesdrop on calls/text messages..."
June 16, 2011 Added by:Ryan Dewhurst
WPScan is a black box WordPress Security Scanner written in Ruby which attempts to find known security weaknesses in WordPress installations. Its intended use is for security professionals or WordPress administrators, and the code base is Open Source and licensed under GPLv3...
June 05, 2011 Added by:Kelly Colgan
Recovering successfully from a breach is definitely something to shoot for. But nothing makes executives smile, or helps build back customer confidence, more then putting the bad guys behind bars. It makes for good news headlines. Plan for it...
February 09, 2011 Added by:Rahul Neel Mani
Open source BI tools do not have the same richness of features that the large BI tools have. There is a downside to this gap because many people have a need for those more advanced features. The good is that the open source products are less complex to configure and use for basic purposes...
January 18, 2011 Added by:Guy Huntington
The open source formula usually delivers free software with a low yearly license. Use of this software should lower enterprises overall physical security budget over time as opposed to paying proprietary vendors large purchase amounts and annual license fees...
January 10, 2011 Added by:Danny Lieberman
The software development environment of 20 years ago is radically different than today. Development tools are free, hardware is almost free and programming talent is a global resource. Its so easy to do things today but that's precisely the problem...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013