This website uses cookies for security purposes only. We do not track you or see your data.
While I was reading the shallow description of the plugbot (http://theplugbot.com/about) I was wandering if those guys are making the…
Bug hunting programs seem to gain more and more popularity those days. The new kid on the block is the…
Here it is folks, the new hacking challenge form Ethical Hacker Netowrk. The deadline is 03.01.2011 so hurry up and…
Few days ago I had several conversations with different people on the same topic – social networks and the result…
While checking my enormous bookmark list whit the intent to clean it from old and not that interesting links I…
IBM statistical based CRUSH system is going to be tested in real life: http://www.techwatch.co.uk/2010/07/26/police-to-use-%E2%80%9Cminority-report%E2%80%9D-style-crime-prediction-software/
Purely technical The attacker count on weaknesses in protocol implementation, application, OS, firmware etc.. Those attacks can be easily automated…
No matter if you want to be the best technical guru or you dream of becoming the greatest IS manager…
I’m not too familiar with the quantum cryptography, but it seems neat to me. The authors of the following article…