Cloud Security Alliance Summit
January 5th, 2011 | by NJ Ouchn
Source The CSA Summit 2011 provides the most timely and relevant education for securing cloud computing. This year’s Summit serves [&hellipJanuary 5th, 2011 | by NJ Ouchn
Source The CSA Summit 2011 provides the most timely and relevant education for securing cloud computing. This year’s Summit serves [&hellipJanuary 5th, 2011 | by NJ Ouchn
BackBox is a Linux distribution based on Ubuntu Lucid 10.04 LTS developed to perform penetration tests and security assessments. Designed [&hellipJanuary 4th, 2011 | by NJ Ouchn
Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong [&hellipJanuary 4th, 2011 | by NJ Ouchn
Agnitio is an application security tool developed to help further the adoption of the Principles of Secure Development and to [&hellipDecember 26th, 2010 | by NJ Ouchn
Open Computer and Software Inventory Next Generation (OCS inventory NG) is free software that enables users to inventory their IT assets. OCS-NG collects information about the hard- and software of networked machines running the OCS client program ("OCS Inventory Agent"). OCS can be used to visualize the inventory through a web interface. Furthermore, OCS comprises the possibility of deploying applications on the computers according to search criteria. Agent-side IpDiscover makes it possible to know the entirety of networked computers and devicesDecember 26th, 2010 | by NJ Ouchn
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field.December 26th, 2010 | by NJ Ouchn
NoVirusThanks Malware Remover is an application designed to detect and remove specific malware, trojans, worms and other malicious threats that can damage your computerDecember 26th, 2010 | by NJ Ouchn
The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human element of pentesting. ItDecember 24th, 2010 | by NJ Ouchn
In order to outline the dangers of implicitly trusting shortened URLs, a student has launched a service which generates links that take users to their destination, but also hijack their browsers for DDo