Software cracking

Results: 112



#Item
41Cross-platform software / Nmap / Gordon Lyon / Transmission Control Protocol / Port / Computer network security / Idle scan / Cracking of wireless networks / Software / System software / Computing

Insecure.Org The New Nmap Gordon “Fyodor” Lyon iSec Open Security Forum – August 21, 2008

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:12:55
42Port scanner / Nmap / Transmission Control Protocol / Computer network security / Gordon Lyon / Netstat / Idle scan / Cracking of wireless networks / Software / System software / Computing

Insecure.Org Advanced Network  Reconnaissance with Nmap by Fyodor

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:13:13
43Wireless networking / IEEE 802.11 / IEEE 802.1X / Wireless LAN / EAP-SIM / Nmap / Cracking of wireless networks / ProCurve Products / Software / Computing / Computer network security

KEY BENEFITS: Radio certification obtained for legal operation of nMAP on aircraft Client roaming support between nMAPs End to end network security with latest 802.1x authentication, WPA2 or WPA

Add to Reading List

Source URL: mymiltope.com

Language: English - Date: 2014-10-24 11:45:10
44Warez / 9 / Free software / Warez groups / Computing / Software cracking / Copyright infringement of software / Internet slang

Following is a discussion taken from the news area of an unspecified Hotline[removed]server during January of[removed]The news posts have been rearranged, from oldest to newest, (unlike Hotline news which is reversed), so th

Add to Reading List

Source URL: cdn.preterhuman.net

Language: English - Date: 2012-10-01 16:20:23
45Crime / Internet in the United States / Internet access / Copyright infringement of software / Software cracking / Warez / The Pirate Bay / Copyright infringement / Piracy / Law / Computer law / Criminal law

7 IN 10 YOUNG SINGAPOREANS AGED[removed]ENGAGE IN DIGITAL PIRACY OUT OF HABIT SINGAPORE – Tuesday, March[removed]: Findings by research consultancy Sycamore Research and Marketing revealed today that 7 out of 10 young Sin

Add to Reading List

Source URL: www.casbaa.com

Language: English - Date: 2014-04-02 22:30:21
46Cryptographic software / Computer law / Password cracking / Password / Rainbow table / Salt / Key stretching / Crypt / Bcrypt / Cryptography / Cryptographic hash functions / Key management

Password Hashing Competition - Survey and Benchmark George Hatzivasilis1 , Ioannis Papaefstathiou1 , and Charalampos Manifavas2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-22 05:43:55
47Warez / Law / Digital rights management / Electronics / Copyright infringement / Copy protection / Software cracking / Shareware / Email / Software licenses / Computing / Copyright infringement of software

No: Date: Software Protection, an impossible dream? All the advices you may need 1 Never use meaningful file or procedure names such as IsValidSerialNum (duh.) If you do use functions

Add to Reading List

Source URL: www.pishgamsoft.com

Language: English - Date: 2013-10-30 19:59:50
48Computer security / Cyberwarfare / Passphrase / Lorrie Cranor / Password policy / Password cracking / Cryptography / Security / Password

Creating Usable Policies for Stronger Passwords with MTurk Richard Shay February 2015 CMU-ISR[removed]Institute for Software Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-02 16:44:46
49Computer network security / Nmap / Gordon Lyon / Transmission Control Protocol / Ping / Firewall / Stateful firewall / Idle scan / Cracking of wireless networks / Software / System software / Computing

Insecure.Org Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA – August 6, 2008; 10AM

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:15:31
50Computer network security / Port scanner / Nmap / Computer security / Traceroute / Ping / Transmission Control Protocol / Cracking of wireless networks / Paping / Software / System software / Computing

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-12-06 20:00:57
UPDATE