The Art of Software Security Assessment
Continued ramblings on software security and code auditing ... I always find these types of bugs interesting because they require such unique ...
http://taossa.com/
popularity:
security
blog
programming
software
auditing
code
books
research
blogs
book
|
System Advancements at the Monastery
Information about developments at the Monastery ... July 19th 2009, "Blacklisting with Snort," http://blog.securitymonks.com/2009/07/19/blacklisting-with-snort ...
similarity:
popularity:
security
blog
blogs
infosec
|
Fefes Homepage
You can send email to web@fefe.de. Please use my GnuPG key. News ... If you like the software on fefe.de, you should also look at the web sites from Dan ...
similarity:
popularity:
programming
linux
people
software
security
code
development
network
blog
hacking
|
milw0rm - exploits : vulnerabilities : videos : papers : shellcode
milw0rm exploits and 0day exploits database ... send all submissions to submit[at]milw0rm.com [gpg] Videos hosted by Tradebit file hosting ...
similarity:
popularity:
security
hacking
exploits
hack
exploit
vulnerabilities
reference
tools
programming
code
|
nologin --
Contact me at warlord / nologin.org or rjohnson at rjohnson / uninformed.org. ... This paper shows a potential way to defend against these devices. ...
similarity:
popularity:
security
hacking
infosec
news
papers
hack
blog
web
programming
tools
|
Schneier.com
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. ... After nine years of publication and with 125,000 readers, Crypto-Gram is the most popular ...
similarity:
popularity:
security
cryptography
news
privacy
crypto
blog
technology
schneier
blogs
newsletter
|
Vulnerability and Virus Information - Secunia
Secunia corporate information, Vulnerability database, Secunia Research, Binary Analysis, and ... Welcome to Secunia.com. Vulnerability Database - Covering all ...
similarity:
popularity:
security
vulnerability
virus
advisories
news
software
reference
network
tools
sysadmin
|
Cloud Security Blog by Trend Micro
The Trend Cloud Security Blog hosts several regular contributors who cover a variety of cloud computing secuirty topics about protecting your computers data and ...
similarity:
popularity:
security
cloud
blog
news
cloudcomputing
programming
blogs
todo
java
sicherheit
|
Sophos - anti-virus and anti-spam software for businesses
Anti-virus and data security software, produces anti-virus sol'ns for these systems: MSDOS, Windows, Windows NT, NetWare, OS/2 and VMS as well as encryption software
similarity:
popularity:
security
antivirus
software
virus
internet
spyware
computer
mac
it
sophos
|
Ruby on Rails Security Project — Exploring the Security of Rails and friends.
The Ruby on Rails Security Project wants to make Rails (applications) more secure. ... We have a free book, interesting links and a Rails Security Guide for ...
similarity:
popularity:
security
rails
rubyonrails
ruby
blog
programming
development
web
mysql
ror
|
carnal0wnage.attackresearch.com
No information avaiable
similarity:
popularity:
security
hacking
blog
pentesting
exploits
programming
hack
research
exploit
infosec
|