Groups
Sign in
Groups
SecAudit
Conversations
About
Send feedback
Help
SecAudit
Contact owners and managers
1–30 of 159
Mark all as read
Report group
0 selected
karen....@gmail.com
1/30/09
P2P
How do you detect/trace P2P connection that has already happened. Logs show no traceability. Any
unread,
P2P
How do you detect/trace P2P connection that has already happened. Logs show no traceability. Any
1/30/09
cybexin
1/29/09
writing-exploits-in-metasploit
http://cybexin.blogspot.com/2009/01/writing-exploits-in-metasploit.html
unread,
writing-exploits-in-metasploit
http://cybexin.blogspot.com/2009/01/writing-exploits-in-metasploit.html
1/29/09
Shawn
6/29/07
Article: Strengthening Passwords
Questions: I heard some of the passwords on the most commonly used list and want to make sure I use a
unread,
Article: Strengthening Passwords
Questions: I heard some of the passwords on the most commonly used list and want to make sure I use a
6/29/07
Shawn
6/21/07
News: Red Hat Linux gets top government security rating
Red Hat Linux has received a new level of security certification that should make the software more
unread,
News: Red Hat Linux gets top government security rating
Red Hat Linux has received a new level of security certification that should make the software more
6/21/07
Shawn
6/12/07
Article: The Art of Software Security Testing
Chris Wysopal, Lucas Nelson, Dino Dai Zovi and Elfriede Dustin explain which security methods should
unread,
Article: The Art of Software Security Testing
Chris Wysopal, Lucas Nelson, Dino Dai Zovi and Elfriede Dustin explain which security methods should
6/12/07
Shawn
6/12/07
News: Flaw hunters go off on Safari (Apple)
Less than a day after Apple released a beta version of its Safari Web browser for Windows, three
unread,
News: Flaw hunters go off on Safari (Apple)
Less than a day after Apple released a beta version of its Safari Web browser for Windows, three
6/12/07
Shawn
6/12/07
News: Law puts damper on web security research
Web security research is being seriously hampered by laws that punish researchers for even attempting
unread,
News: Law puts damper on web security research
Web security research is being seriously hampered by laws that punish researchers for even attempting
6/12/07
Shawn
5/31/07
News: Microsoft unveils revolutionary device
In the next year, Bill Gates will manage one of the highest-profile transitions in American business
unread,
News: Microsoft unveils revolutionary device
In the next year, Bill Gates will manage one of the highest-profile transitions in American business
5/31/07
Shawn
5/31/07
Article: Interview with Rain Forest Puppy
If your unfamiliar with RFP's work, Google. Great article, especially the part about being a dad
unread,
Article: Interview with Rain Forest Puppy
If your unfamiliar with RFP's work, Google. Great article, especially the part about being a dad
5/31/07
Shawn
5/15/07
Article: Vista Security FAQ
Q: If a company has a good firewall installed, won't that protect it from all these attacks? A:
unread,
Article: Vista Security FAQ
Q: If a company has a good firewall installed, won't that protect it from all these attacks? A:
5/15/07
Shawn
5/15/07
Article: Cracking WiFi security: "How we did it to WEP" - complete with instruction kit
Last month, three researchers, Erik Tews, Andrei Pychkine and Ralf- Philipp Weinmann developed an
unread,
Article: Cracking WiFi security: "How we did it to WEP" - complete with instruction kit
Last month, three researchers, Erik Tews, Andrei Pychkine and Ralf- Philipp Weinmann developed an
5/15/07
ShawnK
5/8/07
TOOL: Metasploit "The Best a Haxor Can Get"
The Metasploit Framework is an advanced open-source platform for developing, testing, and using
unread,
TOOL: Metasploit "The Best a Haxor Can Get"
The Metasploit Framework is an advanced open-source platform for developing, testing, and using
5/8/07
Shawn
4/16/07
WhiteHat Security Webinar to Reveal New Website Vulnerabilities
Company founder and chief technology officer to present findings from the latest website security
unread,
WhiteHat Security Webinar to Reveal New Website Vulnerabilities
Company founder and chief technology officer to present findings from the latest website security
4/16/07
Shawn
4/16/07
Warning: New Worm Wriggles on Skype
A worm targeting Skype Ltd.'s VOIP (voice over Internet protocol) application is harvesting e-
unread,
Warning: New Worm Wriggles on Skype
A worm targeting Skype Ltd.'s VOIP (voice over Internet protocol) application is harvesting e-
4/16/07
Shawn
4/12/07
Article: Vista DRM could hide malware
A security researcher has released a proof-of-concept program that hackers could use to exploit
unread,
Article: Vista DRM could hide malware
A security researcher has released a proof-of-concept program that hackers could use to exploit
4/12/07
Shawn
4/12/07
Warning: Microsoft urges Windows users to download new security patches
Software company Microsoft has urged users of its Windows operating system to download the security
unread,
Warning: Microsoft urges Windows users to download new security patches
Software company Microsoft has urged users of its Windows operating system to download the security
4/12/07
Shawn
4/12/07
Article: The fine art of data destruction
April 12, 2007 (Network World) -- Peggy Jones, a business manager for the information-management team
unread,
Article: The fine art of data destruction
April 12, 2007 (Network World) -- Peggy Jones, a business manager for the information-management team
4/12/07
Shawn
4/11/07
View this page "Members"
Click on http://groups.google.com/group/secaudit/web/members?hl=en - or copy & paste it into your
unread,
View this page "Members"
Click on http://groups.google.com/group/secaudit/web/members?hl=en - or copy & paste it into your
4/11/07
Shawn
4/9/07
Article: Stakes are High for Vista Security
There's a lot more at stake in Microsoft's new Vista operating system than many people
unread,
Article: Stakes are High for Vista Security
There's a lot more at stake in Microsoft's new Vista operating system than many people
4/9/07
Shawn
4/6/07
Article: 9th Circuit Court of Appeals rules exception to Fourth Amendment
The more important piece of this article is the ruling of the 9th Circuit Court of Appeals ruling
unread,
Article: 9th Circuit Court of Appeals rules exception to Fourth Amendment
The more important piece of this article is the ruling of the 9th Circuit Court of Appeals ruling
4/6/07
Shawn
4/5/07
Article: Is your wireless network really secure?
Not like we didn't know this already... Think your wireless network is secure? Think again.
unread,
Article: Is your wireless network really secure?
Not like we didn't know this already... Think your wireless network is secure? Think again.
4/5/07
Shawn
4/5/07
Article: Security crisis? First, remain calm
March 01, 2007 (IDG News Service) -- Security managers have to keep their cool and clearly
unread,
Article: Security crisis? First, remain calm
March 01, 2007 (IDG News Service) -- Security managers have to keep their cool and clearly
4/5/07
Shawn
4/2/07
Article: Web services security finally grows up
Recent ratification of two key standards means that web services security has finally reached a level
unread,
Article: Web services security finally grows up
Recent ratification of two key standards means that web services security has finally reached a level
4/2/07
Shawn
2
4/2/07
Warning: New email virus disguises itself as IE7 beta
Update: Fake Internet Explorer 7 Installer Phishing Attacks added March 30, 2007 US-CERT is aware of
unread,
Warning: New email virus disguises itself as IE7 beta
Update: Fake Internet Explorer 7 Installer Phishing Attacks added March 30, 2007 US-CERT is aware of
4/2/07
Shawn
4/2/07
Warning: Exploit in wild for CA storage software flaw
Hackers have released exploit code for a vulnerability in CA storage software, US-CERT (the US
unread,
Warning: Exploit in wild for CA storage software flaw
Hackers have released exploit code for a vulnerability in CA storage software, US-CERT (the US
4/2/07
Shawn
3/30/07
Article: A Computer Forensics Strategy to Sink Your Opponent's Legal Battleship
Successful litigation often hinges on a single relevant e-mail or document -- anchored, traveling or
unread,
Article: A Computer Forensics Strategy to Sink Your Opponent's Legal Battleship
Successful litigation often hinges on a single relevant e-mail or document -- anchored, traveling or
3/30/07
Shawn
3/26/07
Tool: JavaScript bug-hunting tool revealed
A security researcher at ShmooCon in Washington on Saturday demonstrated, but did not release, a tool
unread,
Tool: JavaScript bug-hunting tool revealed
A security researcher at ShmooCon in Washington on Saturday demonstrated, but did not release, a tool
3/26/07
Shawn
3/26/07
Warning: Found new way for steal data encrypted using SSL/TLS
Russian malware authors are finding new ways to steal and profit from data which used to be
unread,
Warning: Found new way for steal data encrypted using SSL/TLS
Russian malware authors are finding new ways to steal and profit from data which used to be
3/26/07
Shawn
3/26/07
News: Exploit-for-sale hacker pins bug on Vista's e-mail app
A just-disclosed bug in Windows Vista's built-in e-mail program can be used by hackers to run
unread,
News: Exploit-for-sale hacker pins bug on Vista's e-mail app
A just-disclosed bug in Windows Vista's built-in e-mail program can be used by hackers to run
3/26/07
ShawnK
3/23/07
ARTICLE: Steganography and E-Discovery: What will Courts and litigators do when spam contains hidden messages?
Steganography and E-Discovery: What will Courts and litigators do when spam contains hidden messages?
unread,
ARTICLE: Steganography and E-Discovery: What will Courts and litigators do when spam contains hidden messages?
Steganography and E-Discovery: What will Courts and litigators do when spam contains hidden messages?
3/23/07