FYI
---------- Forwarded message ---------- From: Hakin9 magazine <[email protected]> Date: Wed, Nov 4, 2009 at 9:43 PM Subject: Hakin9 News: Download Article "My ERP Got Hacked. Part II" For Free! Live Hacking, Guide to Computer Hacking! The Secret of Ethical Hacking! To: [email protected] <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/en> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/article> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/subscription> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/newsletter> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/forum> * Download Article "My ERP Got Hacked. Part II" For Free! Live Hacking, Guide to Computer Hacking! The Secret of Ethical Hacking!* * * *LIVE HACKING: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts * ------------------------------ Dr. Ali Jahangiri, a world-renowned information technology (IT) expert, brings us the next must-have in IT training: Live Hacking, the definitive and comprehensive guide to computer hacking. Groundbreaking, insightful, and practical, this guide serves to inform IT professionals about and challenge existing conceptions of hacking, its victims, and its consequences, but with an eye to empowering prospective victims with the knowledge they need to thwart the criminal elements in cyberspace. Whether you work in a Fortune 500 company or if you're just looking to protect your home office from hackers, this book will provide you with all the information you need to protect your valuable information. Don't be a victim; be ready! Live Hackingis straightforward, easy to read, and a reference that you'll use again and again. It's the kind of book you'll want to keep in your back pocket! With a user-friendly writing style and easy-to-follow diagrams and computer screenshots, Dr. Jahangiri expounds on all of the major issues - and more - n hacking: - Basic Hacking Terminology - Reconnaissance - Google Hacking - Scanning - Enumeration - Password Cracking - Windows Hacking - Malware - Data Packet Sniffers - Web Server and Web Application Hacking - Denial of Service - Wireless Network Hacking Dr. Jahangiri conducts thousands of hours of training per year, has patents in network security, and speaks on a variety of computer security-related issues all over the world. He even offers advice on his web site www.alijahangiri.org<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.alijahangiri.org>. His new book Live Hackingis like having your own private IT security guard. With his knowledge at your fingertips, you can fight back and stay on the offensive! *Free Online Security Scan Scan for XSS, SQL Injection, Web Errors* ------------------------------ The Protector Ultimate UTM Appliance Award Winning Anti Spam - Anti Virus - Web Filter - Web Proxy - IPS - Content Filter The Protector solves your entire network's spam and security problems with just one appliance! All in one at one cost For more information please see the link to http://shop.secpoint.com/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--shop.secpoint.com/shop/protector-utm-with-53c1.html> Request a free evaluation unit at: http://www.secpoint.com/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.secpoint.com/secpoint-evaluation-unit.html> Request a free scan: http://www.secpoint.com/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.secpoint.com/free-security-audit.html> *The Secret of Ethical Hacking* ------------------------------ <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.thesecretofhacking.com> *Learn Advanced Hacking and Exploitation Techniques* ------------------------------ As zero-day vulnerabilities are discovered more frequently, malicious computer attackers are constantly writing exploits to attack them. But when a new flaw is discovered, it is often difficult to determine whether it is truly exploitable, making an analysis of business risk difficult, if not impossible. Things get even murkier when the flaw is discovered in home-grown applications supporting an enterprise. In this course, we bridge the gaps and take a step-by-step look at Linux and Windows operating systems and how exploitation truly works under the hood. This five-day course rapidly progresses through exploitation techniques used to attack stacks, heaps, and other memory segments on Linux and Windows. This is a fast-paced course that provides you with the skills to hit the ground running with vulnerability research. We end the course with a Capture the Flag (CTF) exercise requiring you to discover and exploit vulnerabilities on remote systems. Attendees can apply the skills developed in this class to create and customize exploits for penetration tests of homegrown software applications and newly discovered flaws in widespread commercial software. Understanding the process of exploit development can help enterprises analyze their actual business risks better than the ambiguous hypotheticals we often contend with in most traditional vulnerability assessments. http://www.sans.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.sans.org/training/developing-exploits-penetration-testers-and-security-researchers-1107-mid> *Free IP Scan: Get a detailed report on 1 publicly facing IP address* ------------------------------ <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.qualys.com/forms/trials/qualysguard_free_scan/--Q-leadsource--E-333514>Detect vulnerabilities on your Internet-facing server with this free tool from Qualys FreeScan allows you to quickly and accurately scan your server for thousands of vulnerabilities that could be exploited by an attacker. If vulnerabilities exist on the IP address provided, FreeScan will find them and provide detailed information on each risk - including its severity, associated threat, and potential impact. Scan now!<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.qualys.com/forms/trials/qualysguard_free_scan/--Q-leadsource--E-333514> *SAINT **Securing **Y**our **N**etwork **J**ust **G**ot **E**asier* ------------------------------ <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.saintcorporation.com> *Download Article "My ERP got hacked - An Introduction to Computer Forensics - Part II " For Free* ------------------------------ Now we are finally getting closer to know if there was any unauthorised access to the Web-based Enterprise Resource Planning (ERP) server, how it happened and what was the extent of the damage... Read the second part of Ismael Valenzuela's article online! http://hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/918-21st-century-hacking-techniques> *Windows FE Forensic Live CD in stores!* ------------------------------ <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/947-windows-fe-forensic-live-cd> -Windows FE A Windows-PE Based Forensic Boot CD -Network Forensics: More Than Looking For Cleartext Passwords -Unified Communications Intrusion Detection Using Snort -Protocol Channels -Fuzzing Finding Vulnerabilities with rand() -Windows Timeline Analysis, Building a Timeline, Part 2 -Anatomy of Malicious PDF Documents, Part 2 -Recovering Debugging Symbols From Stripped Static Compiled Binaries -Simple DLP Verification Using Network Grep -A Look at How the Mobile Phone Opens the Door to Location (LBS) Tracking, Proximity Marketing and Cybercrime -Interview with Michael Helander -Viva la Revolucion! *Hakin9 The Real World Clickjacking Magazine! * ------------------------------ <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/810-the-real-world-clickjacking> *The 6 FREE Hakin9 Issues! Read Online Now!* ------------------------------ <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/904-http-authentication-vulnerability> http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/904-http-authentication-vulnerability> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/334-anatomy-of-pharming-how-your-money-is-stolen> http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/334-anatomy-of-pharming-how-your-money-is-stolen> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/900-vpn-discovery-6-2005> http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/900-vpn-discovery-6-2005> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/907-hacking-ibm-as-400> http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/907-hacking-ibm-as-400> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/908-haking-wi-fi-1-2006> http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/908-haking-wi-fi-1-2006> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/906-shatter-attack-vulnerable-windows> http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/906-shatter-attack-vulnerable-windows> Please spread the word about Hakin9. Hakin9 team www.hakin9.org<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/en> [email protected] tel. +1 917 338 36 31 <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--psdmag.org/en> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--lpmagazine.org/en> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--photoshopdigitalpainting.com/> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--photoshopretouchmag.com/> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--ffdmag.com/> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--bsdmag.org/> <http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--gomotionmag.com/> To Unsubscribe, please click here<http://www.payrankings.com/12all/box.php?funcml=unsub2&nl=10&mi=3765&email=myusnizam%40opensource.org.my> . --~--~---------~--~----~------------~-------~--~----~ Join Open Source Developers Club Malaysia http://www.osdc.my/ Facebook Fan page http://www.facebook.com/group.php?gid=98685301577 http://www.facebook.com/OSDC.my You received this message because you are subscribed to the Google Groups "OSDC.my Mailing List" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/osdcmy-list?hl=en -~----------~----~----~----~------~----~------~--~---

