Windows

Is Sandboxing technology the answer?

Most of the security solutions in the market those days leverage sandboxing technologies to deal with Advanced Persistent Threats,  “0”days vulnerability, target attack and so on. It would be interesting to analyze the good and the limits of this kind of technologies to be able to better choose our security solutions. What is a Sandbox? sandboxing means to create a “virtual”, “fake” image that can be targeted by malware attackers o unknown security problems. Monitoring the change that happen to this decoy it is possible to understand if something strange is going on. The idea basically is that since the fake machine…

Nmap Guide Revisited – Hakin9 Tutorials | Magazine | Hackers about hacking techniques in our IT Security Magazine

Nmap Guide Revisited – Hakin9 Tutorials | Magazine | Hackers about hacking techniques in our IT Security Magazine The Right Tool NMAP Kung-Fu By Aamir Lakhani, DCUCD, DCUCI, CCNP, CCDP, Microsoft Certified Systems Engineer, IBM Cloud Computing Architect, CISSP, HP Open View Professional Nmap is a popular tool for network reconnaissance It usually one of the first tools a network penetration tester will use to determine the type of system they are targeting, what ports are open on the target system, and what services may be running on the system. Nmap stands for “network mapper” and is used to scan hosts and services on a network. Nmap…

Windows 8 product Key

Image via CrunchBase Ok guys I0’m back on track and start writeing again.   I just started to play with windows 8 and i have some impressions, but first of all i wanna give you a simple advise: write your product key somewhere before installing it, because changing product key on windows 8 can be frustrating. We do not have a direct link to a change Key tool, not help would be of some use, since the instructions does not lead you anywhere.   The best thing to do is quick search internet, but again there are more articles than…

Introduction To Network Security – Part 1

Introduction To Network Security – Part 1: Introduction By Sahir Hidayatullah – Firewall.cx Security Advisor As more and more people and businesses have begun to use computer networks and the Internet, the need for a secure computing environment has never been greater. Right now, information security professionals are in great demand and the importance of the field is growing every day. All the industry leaders have been placing their bets on security in the last few years. All IT venodors agree today that secure computing is no longer an optional component, it is something that should be integrated into every…

Posts navigation