Wednesday, May 28th, 2008
The major change is both tools now support 64-bit targets! Good news for us.
pwdump6 is a password hash dumper for Windows 2000 and later systems. It is capable of dumping LanMan and NTLM hashes as well as password hash histories. It is based on pwdump3e, and should be stable on ...
Posted in General BS, Internet, Linux, Privacy, Security, Windows | No Comments
Tuesday, May 27th, 2008
You already know how to create multiple user profiles in Firefox for various types of online work; but if you're trying to troubleshoot an existing Firefox profile, start up the 'fox in "Safe Mode" to disable add-ons or reset other custom configuration. Use firefox -safe-mode at the command line for ...
Posted in Internet, Linux, Security, Software, Windows | No Comments
Tuesday, May 27th, 2008
Security assessment and deep testing don't require a big budget. Some of most effective security tools are free, and are commonly used by professional consultants, private industry and government security practitioners. Here are a few to start with.
For scanning in the first steps of a security assessment or pen test, ...
Posted in Linux, Networking, Privacy, Security, Software, Windows | No Comments
Tuesday, May 27th, 2008
Whether you hire outside consultants or do the testing yourself, here are some tips for making sure your time and money are well spent.
1. Set goals. Make sure you know before you start your penetration testing what you want the results to encompass. Adding in too many systems can be ...
Posted in Hardware, Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Tuesday, May 20th, 2008
Most of the time, Linux is run from either an installation on a hard drive or a live CD/DVD distribution. The first is fast, but not very portable; the second can be run anywhere you have a computer and a CD drive with boot access, but typically isn't very fast. ...
Posted in Hardware, Linux, Privacy | No Comments
Page 23 of 30« First«...10...2122232425...30...»Last »