Matasano Security LLC - Chargen
Helping developers and enterprises secure their code is what we do. ... To learn more about Playbook, check out the site, or get in touch with us via ...
http://chargen.matasano.com/
popularity:
security
blog
programming
networking
documentation
matasano
blogs
privacy
reverse-engineering
work
|
CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
|
OWASP - Home
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
webdev
reference
software
application
internet
|
Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
|
invisiblethings.org
At this year's Black Hat conference Rafal, Alex and I will be ... Probably the coolest thing I've ever been involved in. Read more ... invisiblethings.org has been ...
similarity:
popularity:
security
hacking
rootkit
blog
infosec
windows
rootkits
linux
people
malware
|
DoxPara Research
Features Paketto Keiretsu: a set of utilities for doing odd things to TCP/IP networks by "stretching the protocols ... Staring Into The Abyss dan@doxpara.com ... (such as www.doxpara.com) to numbers the ...
similarity:
popularity:
security
dns
hacking
blog
network
research
internet
software
tools
vulnerability
|
OpenRCE
OpenRCE: The Open Reverse Code Engineering Community ... About Articles Book Store Distributed RCE Downloads Event Calendar Forums Live ...
similarity:
popularity:
security
programming
reverse-engineering
reversing
hacking
tools
windows
reverseeng
hack
code
|
Suspekt…
Suspekt... A Blog About Code, Information Security, PHP And More ... Suspekt... is proudly powered by WordPress Entries (RSS) and Comments (RSS). Theme by Bob ...
similarity:
popularity:
security
php
mac
blog
wireless
osx
network
networking
hacking
apple
|
Moxie Marlinspike >> Thoughtcrime Labs
About Me Software Stories "..now yea be learnin' the value of a lobster, ain't yea, young yachtsman? ...
similarity:
popularity:
security
hacking
software
blog
ssl
anarchism
anarchy
tools
culture
programming
|
Metasploit
Official blog of the Metasploit Project. Monday, May 11, 2009. Mastering the Metasploit Framework ... The next official Metasploit class will be held in Las ...
similarity:
popularity:
security
metasploit
blog
hacking
exploits
blogs
framework
iphone
news
hacks
|
How to Bypass Most Firewall Restrictions and Access the Internet Privately
How to Surf the Internet at Work (or School) Privately (Using SSH and an HTTP Proxy Server) Get ... Copyright 2002-2008 BuzzSurf.com - All rights reserved. ...
similarity:
popularity:
security
firewall
internet
privacy
howto
networking
ssh
proxy
web
hacking
|