Monday, August 3, 2015
Posted by manager
Reader's rate:
0
Contributed by James Rollins During the 2014 Christmas holidays, millions of people all over the world were subjected to an unwanted gift. They sat down to play their new video game or watch a streaming movie on their Microsoft X-Box or Sony PlayStation, only to find that the online services of... + continue reading
Monday, August 3, 2015
Posted by manager
Reader's rate:
0
Contributed by Corey Pachniak While at work we believe that our co-workers are all trust worthy. While much emphasis is placed on the virtual security of that information, firms often overlook the physical opportunities provided by daily common tasks. This paper will demonstrate that during... + continue reading
Saturday, August 1, 2015
Posted by manager
Reader's rate:
0
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM... + continue reading
Thursday, July 30, 2015
Posted by manager
Reader's rate:
0
Contributed by Harrison Christopher Forest An ever-present concern in today’s information systems is network security and data integrity. It is essential for enterprises globally to maintain a strict network policy to ensure that data breaches are mitigated by all means possible. Businesses... + continue reading
Thursday, July 30, 2015
Posted by manager
Reader's rate:
5
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine shootings and many other high profile cases. Her law enforcement career spanned 32 years, beginning in... + continue reading

Home Page

Featured Articles

Saturday, 01/08/15 - 0 comment(s)
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper will describe the typesof protocols that SharePoint is capable to using with an emphasis on NTLM communication. Within the discussion of NTLM... + continue reading
Tuesday, 28/07/15 - 0 comment(s)
Contributed by A. Michele Parrish More and more homes are getting smart appliances. They have refrigerators, toilets, garage doors, thermostats and other appliances that are connected to the Internet and can be controlled from anywhere. The problem is can they also be controlled by anyone or just the homeowners? With the proliferation of smart... + continue reading

Red Tape

298
reads
51 today
Monday, 03/08/15 - 0 comment(s)
Contributed by Corey Pachniak While at work we believe that our co-workers are all trust worthy. While much emphasis is placed on the virtual security of that information, firms often overlook the... + continue reading

Cryptography

Cryptography
1.132
reads
14 today
Wednesday, 08/07/15 - 0 comment(s)
Contributed by Ashish Anand and restored from the old Infosecwriters archives. “If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s... + continue reading

Exploitation

257
reads
16 today
Monday, 03/08/15 - 0 comment(s)
Contributed by Aelphaeis Mangarae and restored from the Infosecwriters archives This paper is a sequel to my “Learn Information Gathering By Example”. This paper will go through looking for... + continue reading

Sistema

356
reads
6 today
Saturday, 01/08/15 - 0 comment(s)
Contributed by Robert Underwood SharePoint Communication Protocol Hardening will discuss the details related to sever to server communication within the SharePoint communication schema. This paper... + continue reading

Et Cetera

320
reads
63 today
Monday, 03/08/15 - 0 comment(s)
Contributed by James Rollins During the 2014 Christmas holidays, millions of people all over the world were subjected to an unwanted gift. They sat down to play their new video game or watch a... + continue reading

Recommended Reading

245
reads
35 today
Thursday, 30/07/15 - 0 comment(s)
This book was written by Mary Ellen O'Toole, PH.D. and Alisa Bowman. Taken from her web site "Dr. O’Toole also worked the Elizabeth Smart and Natalee Holloway disappearances, the Columbine... + continue reading