Communauté du Libre partage
foto forensics, photo forensics, error level analysis
Actualité de la sécurité informatique, fiches virus et hoax, alertes par email, antivirus gratuit en ligne, protection de vos données et de votre vie privée.
Once a MySQL database server has been compromised at root level, it's often possible to escalate this access to full system level access using User Defined
sqlmap - Automatic SQL injection and database takeover tool
Perverting Embedded Devices - ZKSoftware Fingerprint Reader (Part I) - Infobyte Security Research Labs
Lets test some password breaking tools. Password's are often the weakest link in any system. Testing for weak passwords is an important part of security as
L'Agence Nationale de Sécurité des Systèmes d'Information (ANSSI) a publié jeudi des recommandations destinées principalement aux entreprises, concernant les
binwalk - Firmware Analysis Tool
Presentations - Public presentations
Building secure systems is difficult. It would be nice if we had a bunch of well-designed crypto building blocks that we could assemble in all sorts of ways and be certain that they would, no matter what, yield a secure system overall. There are, in fact, folks working on such things at a theoretical level…