FYI


---------- Forwarded message ----------
From: Hakin9 magazine <[email protected]>
Date: Wed, Nov 4, 2009 at 9:43 PM
Subject: Hakin9 News: Download Article "My ERP Got Hacked. Part II" For
Free! Live Hacking, Guide to Computer Hacking! The Secret of Ethical
Hacking!
To: [email protected]



<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/en>
  
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/article>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/subscription>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/newsletter>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/forum>
* Download Article "My ERP Got Hacked. Part II" For Free!
Live Hacking, Guide to Computer Hacking!
The Secret of Ethical Hacking!* * *      *LIVE HACKING: The Ultimate Guide
to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security
Experts *
------------------------------

Dr. Ali Jahangiri, a world-renowned information technology (IT) expert,
brings us the next must-have in IT training: Live Hacking, the definitive
and comprehensive guide to computer hacking. Groundbreaking, insightful, and
practical, this guide serves to inform IT professionals about and challenge
existing conceptions of hacking, its victims, and its consequences, but with
an eye to empowering prospective victims with the knowledge they need to
thwart the criminal elements in cyberspace. Whether you work in a Fortune
500 company or if you're just looking to protect your home office from
hackers, this book will provide you with all the information you need to
protect your valuable information. Don't be a victim; be ready!

Live Hackingis straightforward, easy to read, and a reference that you'll
use again and again. It's the kind of book you'll want to keep in your back
pocket! With a user-friendly writing style and easy-to-follow diagrams and
computer screenshots, Dr. Jahangiri expounds on all of the major issues -
and more - n hacking:

- Basic Hacking Terminology
- Reconnaissance
- Google Hacking
- Scanning
- Enumeration
- Password Cracking
- Windows Hacking
- Malware
- Data Packet Sniffers
- Web Server and Web Application Hacking
- Denial of Service
- Wireless Network Hacking

Dr. Jahangiri conducts thousands of hours of training per year, has patents
in network security, and speaks on a variety of computer security-related
issues all over the world. He even offers advice on his web site
www.alijahangiri.org<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.alijahangiri.org>.
His new book Live Hackingis like having your own private IT security guard.
With his knowledge at your fingertips, you can fight back and stay on the
offensive!


   *Free Online Security Scan
Scan for XSS, SQL Injection, Web Errors*
------------------------------

The Protector Ultimate UTM Appliance

Award Winning Anti Spam - Anti Virus - Web Filter - Web Proxy - IPS -
Content Filter
The Protector solves your entire network's spam and security problems with
just one appliance!

All in one at one cost

For more information please see the link to
http://shop.secpoint.com/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--shop.secpoint.com/shop/protector-utm-with-53c1.html>

Request a free evaluation unit at:
http://www.secpoint.com/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.secpoint.com/secpoint-evaluation-unit.html>

Request a free scan:
http://www.secpoint.com/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.secpoint.com/free-security-audit.html>


   *The Secret of Ethical Hacking*
------------------------------

<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.thesecretofhacking.com>
    *Learn Advanced Hacking and Exploitation Techniques*
------------------------------

As zero-day vulnerabilities are discovered more frequently, malicious
computer attackers are constantly writing exploits to attack them. But when
a new flaw is discovered, it is often difficult to determine whether it is
truly exploitable, making an analysis of business risk difficult, if not
impossible.

Things get even murkier when the flaw is discovered in home-grown
applications supporting an enterprise. In this course, we bridge the gaps
and take a step-by-step look at Linux and Windows operating systems and how
exploitation truly works under the hood. This five-day course rapidly
progresses through exploitation techniques used to attack stacks, heaps, and
other memory segments on Linux and Windows.

This is a fast-paced course that provides you with the skills to hit the
ground running with vulnerability research. We end the course with a Capture
the Flag (CTF) exercise requiring you to discover and exploit
vulnerabilities on remote systems. Attendees can apply the skills developed
in this class to create and customize exploits for penetration tests of
homegrown software applications and newly discovered flaws in widespread
commercial software.

Understanding the process of exploit development can help enterprises
analyze their actual business risks better than the ambiguous hypotheticals
we often contend with in most traditional vulnerability assessments.

http://www.sans.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.sans.org/training/developing-exploits-penetration-testers-and-security-researchers-1107-mid>


   *Free IP Scan:
Get a detailed report on 1 publicly facing IP address*
------------------------------

<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.qualys.com/forms/trials/qualysguard_free_scan/--Q-leadsource--E-333514>Detect
vulnerabilities on your Internet-facing server with this free tool from
Qualys

FreeScan allows you to quickly and accurately scan your server for thousands
of vulnerabilities that could be exploited by an attacker.

If vulnerabilities exist on the IP address provided, FreeScan will find them
and provide detailed information on each risk - including its severity,
associated threat, and potential impact.

 Scan 
now!<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.qualys.com/forms/trials/qualysguard_free_scan/--Q-leadsource--E-333514>

   *SAINT
**Securing **Y**our **N**etwork **J**ust **G**ot **E**asier*
------------------------------

<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.saintcorporation.com>



*Download Article "My ERP got hacked - An Introduction to Computer Forensics
- Part II " For Free*
------------------------------

Now we are finally getting closer to know if there was any unauthorised
access to the Web-based Enterprise Resource Planning (ERP) server, how it
happened and what was the extent of the damage...

Read the second part of Ismael Valenzuela's article online!
http://hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/918-21st-century-hacking-techniques>

*Windows FE Forensic Live CD
in stores!*
------------------------------
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/947-windows-fe-forensic-live-cd>

-Windows FE A Windows-PE Based Forensic Boot CD
-Network Forensics: More Than Looking For Cleartext Passwords
-Unified Communications Intrusion Detection Using Snort
-Protocol Channels
-Fuzzing Finding Vulnerabilities with rand()
-Windows Timeline Analysis, Building a Timeline, Part 2
-Anatomy of Malicious PDF Documents, Part 2
-Recovering Debugging Symbols From Stripped Static Compiled Binaries
-Simple DLP Verification Using Network Grep
-A Look at How the Mobile Phone Opens the Door to Location (LBS) Tracking,
Proximity Marketing and Cybercrime
-Interview with Michael Helander
-Viva la Revolucion!

*Hakin9 The Real World Clickjacking Magazine! *
------------------------------
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/810-the-real-world-clickjacking>

*The 6 FREE Hakin9 Issues! Read Online Now!*
------------------------------
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/904-http-authentication-vulnerability>

http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/904-http-authentication-vulnerability>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/334-anatomy-of-pharming-how-your-money-is-stolen>

http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--hakin9.org/magazine/334-anatomy-of-pharming-how-your-money-is-stolen>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/900-vpn-discovery-6-2005>

http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/900-vpn-discovery-6-2005>

<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/907-hacking-ibm-as-400>

http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/907-hacking-ibm-as-400>

<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/908-haking-wi-fi-1-2006>

http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/908-haking-wi-fi-1-2006>

<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/906-shatter-attack-vulnerable-windows>

http://www.hakin9.org/<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/magazine/906-shatter-attack-vulnerable-windows>

Please spread the word about Hakin9.
Hakin9 team
www.hakin9.org<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--www.hakin9.org/en>
[email protected]
tel. +1 917 338 36 31
     
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--psdmag.org/en>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--lpmagazine.org/en>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--photoshopdigitalpainting.com/>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--photoshopretouchmag.com/>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--ffdmag.com/>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--bsdmag.org/>
<http://www.payrankings.com/12all/lt/t_go.php?i=3765&e=NDIxNTc0Mg==&l=-http--gomotionmag.com/>

To Unsubscribe, please click
here<http://www.payrankings.com/12all/box.php?funcml=unsub2&nl=10&mi=3765&email=myusnizam%40opensource.org.my>
.

--~--~---------~--~----~------------~-------~--~----~
Join Open Source Developers Club Malaysia http://www.osdc.my/

Facebook Fan page

http://www.facebook.com/group.php?gid=98685301577

http://www.facebook.com/OSDC.my

You received this message because you are subscribed to the Google

Groups "OSDC.my Mailing List" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/osdcmy-list?hl=en
-~----------~----~----~----~------~----~------~--~---

Kirim email ke