FW: Hakin9 News: Windows FE Forensic Live CD Live Hacking, Guide to Computer Hacking! The Secret of Ethical Hacking!

42 views
Skip to first unread message

Ray McClure

unread,
Dec 2, 2009, 11:48:14 AM12/2/09
to Long Island Information Security Group

Attachment limitation is 4mb. The file was 11mb.

Sorry!

~R

 

From: Ray McClure
Sent: Wednesday, December 02, 2009 11:40 AM
To: Long Island Information Security Group
Subject: FW: Hakin9 News: Windows FE Forensic Live CD Live Hacking, Guide to Computer Hacking! The Secret of Ethical Hacking!

 

FYI

This is a magazine that I get.

They are offering a free issue in PDF form, but you have to sign up for their newsletter.

I attached it in case you don’t want to sign up for the newsletter.

 

~R

 

From: Newsletter Hakin9 [mailto:newsle...@software.com.pl]
Sent: Wednesday, December 02, 2009 9:55 AM
To: Ray McClure
Subject: Hakin9 News: Windows FE Forensic Live CD Live Hacking, Guide to Computer Hacking! The Secret of Ethical Hacking!

 

 

 Windows FE Forensic Live CD
Live Hacking, Guide to Computer Hacking!
The Secret of Ethical Hacking!

New Book Published Reveals Hacking Techniques and Countermeasures for Ethical Hackers and IT Security Experts


'Live Hacking' is published, a comprehensive guide to computer hacking which aims to educate IT professionals about hacking techniques and possible countermeasures.

Dr. Ali Jahangiri, a world-renowned computer and security expert, is pleased to announce the launch of his new book “Live Hacking”. Live Hacking is a complete guide to the `techniques of hacking written to instruct and educate IT professionals and so prepare them to protect their computer systems from potential hacking threats.

Regardless of the size of a computer network, be it a Fortune 500 company or a small home office, computers need to be protected to limit access to confidential data, to ensure the integrity of such data and enable the computers and their data to be available at all times necessary. A hacker will try to break those goals and try to either access confidential data, change the data or remove the availability of the machines holding the information. Dr. Jahangiri's book looks at the principles, theories and practices of hacking and empowers readers to protect themselves from potential threats.

This book, which is available from Amazon, is truly comprehensive and starts with Basic Hacking Terminology and progresses to look at the different areas of hacking and security including Google Hacking, Password Cracking, Malware and hacking on Wireless Networks.
The Live Hacking book also has an accompanying website www.livehacking.com  where you can find a sample chapter on Wireless Networking Hacking and other information about the book including the table of contents, index and more information about Dr. Jahangiri.
In writing about this subject Dr. Jahangiri brings his many years of academic, professional, and practical experience to the fore in order to equip his readers with the knowledge they need to defend their data against the ever-increasing cyber-thieves on the Internet.

About Dr. Ali Jahangiri
Dr. Ali Jahangiri, a world-renowned information technology expert has an extensive background in computer science and has worked as an information security auditor, security consultant and technical trainer. He is a Chartered IT Professional member of the British Computer Society, and a professional member of both the IEEE and the Information Systems Audit and Control Association.
 

 

PCI Compliance Boot Camp
5 weeks / 10 modules


Qualys' PCI Boot Camp is for mid-to-large size Level 4 merchants that process a significant number of card transactions annually. Your IT  infrastructure may have several hundred IPs, but IT support is usually  thin with a dozen or so staffers. In other words: you wear a lot of  hats, including security and compliance.

How you will benefit?

The PCI Boot Camp strips out the jargon and gets right to the point – enabling you to be more effective in meeting your PCI compliance objectives. Your investment of five minutes for each of the Boot Camp’s modules will clarify how to protect payment card data – and clearly guide your organization to PCI compliance.

What you’ll get?

Every Tuesday and Thursday for 5 weeks, you will receive an HTML email with your latest Boot Camp module.

Sign up now
 

 

Get a Free Online Security Scan
Scan for XSS, SQL Injection, Host and Web Errors


To get a free scan today please visit
http://www.secpoint.com/free-security-scan.html

 

The Secret of Ethical Hacking



 

 

Learn Advanced Hacking and Exploitation Techniques


As zero-day vulnerabilities are discovered more frequently, malicious computer attackers are constantly writing exploits to attack them. But when a new flaw is discovered, it is often difficult to determine whether it is truly exploitable, making an analysis of business risk difficult, if not impossible.

Things get even murkier when the flaw is discovered in home-grown applications supporting an enterprise. In this course, we bridge the gaps and take a step-by-step look at Linux and Windows operating systems and how exploitation truly works under the hood. This five-day course rapidly progresses through exploitation techniques used to attack stacks, heaps, and other memory segments on Linux and Windows.

This is a fast-paced course that provides you with the skills to hit the ground running with vulnerability research. We end the course with a Capture the Flag (CTF) exercise requiring you to discover and exploit vulnerabilities on remote systems. Attendees can apply the skills developed in this class to create and customize exploits for penetration tests of homegrown software applications and newly discovered flaws in widespread commercial software.

Understanding the process of exploit development can help enterprises analyze their actual business risks better than the ambiguous hypotheticals we often contend with in most traditional vulnerability assessments.

http://www.sans.org/

 

 

Black Hat DC


Understanding the increasingly complex threats posed to an enterprise is a daunting task for today’s security professional. The knowledge to secure an enterprise against those threats is invaluable. Come to Black Hat learn from the industries best. Register for Black Hat DC today at www.blackhat.com.

Download 3/2009 issue of Hakin9 FOR FREE 


* Brute Force Attack
* Exporting Nonexportable Certificates
* User Enumeration with Burp Suite
* More Thoughts on Defeating AntiVirus
* A New Era for Buffer Overflow
* Automating Malware Analysis
* Anatomy of Malicious PDF Documents
* Analyzing Malware Packed Executables
* Bootleggers and the Internet
* Interview with Nicholas J. Percoco
* Self exposure with...

Download Now!


See the full list of articles at

hakin9 website


Tool review section on hakin9 website!

Visit our website and read all toll reviews from hakin9 2009 issues
Read now!


The 6 FREE Hakin9 Issues! Read Online Now! 


http://www.hakin9.org/

http://www.hakin9.org/

http://www.hakin9.org/



http://www.hakin9.org/



http://www.hakin9.org/



http://www.hakin9.org/

Please spread the word about Hakin9.
Hakin9 team
www.hakin9.org
e...@hakin9.org
tel. +1 917 338 36 31

Find hakin9 magazine on:

         

 

To Unsubscribe, please click here.


Reply all
Reply to author
Forward
0 new messages