finds you similar websites
auto-suggest    top sites

May 31st, 2024

13 Popular Sites Like http://www.skullsecurity....

Our team has scoured through the net and identified a lot of of the best security and malware sites like this one. So come and check out websites that are similar to this one.

Displaying 31 to 40 of 500 alternatives to http://www.skullsecurity.org/blog/?.... (Updated: May 31st, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  SkullSecurity » Blog Archive » Taking apart...
reverse engineering the energizer trojan, a tutorial: http://www.skullsecurity.org/blog/?p=627
http://www.skullsecurity.org/blog/?p=627
popularity:
security
malware
tutorial
reverseengineering
trojan
howto
reversing
engineering
debug
hack
new search by a custom tag signature
  Darknet - The Darkside | Ethical Hacking, Penetration Testing & Computer Security
Darknet - The Darkside. Ethical Hacking, Penetration Testing & Computer Security ... Posted by Darknet to Hacking Tools, Linux Hacking, Network Hacking, Password ...
similarity:
popularity:
security
hacking
blog
tools
hack
linux
hacks
blogs
computer
howto
  StopBadware.org
Initiative launched by Harvard University and the Oxford Internet Institute against spyware and other malicious software programs that spotlights companies that trick Internet users into downloading malicious spyware, adware, and malware programs.
similarity:
popularity:
security
spyware
malware
badware
software
internet
google
adware
reference
web
  A guide and tutorial on using ComboFix
BleepingComputer.com -> Combofix Index -> A guide and tutorial on ... ComboFix is a program, created by sUBs, that scans your computer for known malware, and ...
similarity:
popularity:
malware
combofix
antivirus
security
virus
spyware
tools
windows
software
tutorial
  artificial ignorance: how-to guide
No information avaiable
similarity:
popularity:
security
howto
logging
unix
linux
sysadmin
tutorial
network
programming
monitoring
  HOWTO bypass Internet Censorship, a tutorial on getting around filters and blocked ports
A tutorial on how to bypass Internet Censorship using Proxies, Shells, JAP e.t.c. Different ways to beat the filtering in schools, countries or companies. (blocked ...
similarity:
popularity:
censorship
security
internet
howto
proxy
privacy
tutorial
web
reference
tools
  How I’d Hack Your Weak Passwords - Passwords - Lifehacker
No information avaiable
similarity:
popularity:
security
password
passwords
lifehacker
hack
hacking
internet
tips
reference
howto
  Malware Block List
Malware Patrol / Malware Block List is a free, automated and user contributed system for checking URLs for the presence of Malware.
similarity:
popularity:
security
malware
blacklist
squid
spam
spyware
virus
blocklist
list
network
  CrackZ's Reverse Engineering Page (1997-2006).
Amongst these pages you will find what is now a very rare commodity on todays ... This site provides information for analysts and protectionists alike, focusing ...
similarity:
popularity:
cracking
hacking
security
reverse
reverseengineering
programming
reversing
software
engineering
crack
  Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
  Linux Security HOWTO
This document is a general overview of security issues that face the ... It covers general security philosophy and a number of specific examples of how ...
similarity:
popularity:
linux
security
howto
reference
tutorial
sysadmin
unix
guides
server
networking
< prev ... 1 2 3 4 5 6 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.