IT Trenches:

hacking

1

September 10, 2010  3:56 PM

DLL hole also affects EXE files



Posted by: Troy Tate
exploit, hacking, information security, infosec, risk analysis, threat, vulnerability

According to a Heise Media report, the DLL binary planting vulnerability is not just limited to DLL files but affects EXE files. The example given: An HTML file is saved along with a copy of a file called EXPLORE.EXE. The HTML file is opened and has a URI link embedded with the address file://....

August 17, 2010  5:48 PM

8-character passwords are so 1999 – 12 characters is 21st century



Posted by: Troy Tate
access management, authentication, brute force, hacking, identity management, information security, infosec, infosecurity, Password, password management, secure access, Security

Today's computers and add-on processors (think graphics processing units - GPU's) are extremely powerful. The GPU of today offers about 2 teraflops (10^12 floating...


May 12, 2010  2:48 PM

Follow Twitter “How to become a hacker in 15 minutes”



Posted by: Troy Tate
certified ethical hacking, education, hacking, information security, information security education, infosec, infosec awareness, Security, technology, twitter

Well, it looks like it might be time for me to join the "twitterpated". Until now I did not see much value in this additional information source. With regards to Twitter, I tend to agree with


January 21, 2009  4:36 PM

Security news – Videos from Hack In The Box 2008 Malaysia available for download



Posted by: Troy Tate
Apple, education, hacking, hardware, Microsoft, OSX, Password, Security, software, training, vulnerabilities, Windows


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: