Blogs

View All RSS Feed

Last Updated on 15 April 2014, Total: 1081 Blog Posts

479 George Chetcuti’s Blog 15 April 2014
602 Windows Networking Admin Blog 20 March 2014
  1. GetGo Download Manager buffer overflow vulnerability

    Julien Ahrens (aka MrTuxracer) publishes root-cause analysis of GetGo Download Manager http response header buffer overflow remote code execution... Read More

  2. SQL Server 2014 Released to Manufacturing; Windows Azure HDInsight supporting Hadoop 2.2 Generally Available

    Eron Kelly, General Manager of Data Platform Group at Microsoft, posted on Azure blog... Read More

  3. Software architect accused of stealing Microsoft trade secrets

    Ex-Microsoft employee charged with passing blogger trade secrets... Read More

  4. Ukrainian Cyber Golden Eagle Hacktivists warns of more cyber attacks

    Cyber Berkut, Ukrainian’s Cyber Golden Eagle hacktivist group demands NATO officials to get away from Ukrainian land and warns NATO’s Colonel to change his computer password!... Read More

  5. What is Passive DNS?

    Passive DNS or Passive DNS replication is a technique invented by Florian Weimer in 2004 where inter-server DNS messages are captured by sensors and forwarded to a collection point for analysis... Read More

  6. Win Free Training For Life

    Firebrand offers free training for life... Read More

  7. Netwrix Releases Six New Auditing Solutions

    New Netwrix Auditor Solutions for Active Directory, File Servers, VMware and More... Read More

  8. Buffer overflow vulnerability in Wireshark

    Wesley Neelen from Hoffmann Investigations discovered an MPEG file parser buffer overflow in Wireshark... Read More

  9. Free tool that detects Netgear switches

    German IT security firm Curesec releases a set of tools that helps you catalog all Netgear switches on your internal infrastructure... Read More

  10. How do Credit cards data end up for sale on Internet forums?

    There are multiple ways to steal this information on-line, but Point of Sales are the most tempting target of Cybercriminals... Read More

Featured Links