gray-world.net
Gray-World.net Team
http://www.gray-world.net/team.shtml
Unusual firewall bypassing techniques, network and computer security. Lewis Carroll "Alice In Wonderland". We are people interested by the computer and network security research field. Our main interest lies in the topic of NACS bypassing - Tunneling, Covert channels, network related steganographic methods - but we also work or are interested to work on other security projects. Team members, listed in random order :. Alex [gw] gray-world.net. Icbm [gw] venustech.com.cn. Scastro [gw] entreelibre.com.
acksyn.infosecwriters.com
Information Security of Apple Devices: Mac’s and IPhone’s | InfoSecWriters.com
http://acksyn.infosecwriters.com/articles/2016/06/28/information-security-apple-devices-mac’s-and-iphone’s
Information Security of Apple Devices: Mac’s and IPhone’s. Information Security of Apple Devices: Mac’s and IPhone’s. On Tue, 06/28/2016 - 15:04. Contributed by Samuel Sanchez. This document is in PDF format. To view it click here. Give Information Security of Apple Devices: Mac’s and IPhone’s 1/5. Give Information Security of Apple Devices: Mac’s and IPhone’s 2/5. Give Information Security of Apple Devices: Mac’s and IPhone’s 3/5. Give Information Security of Apple Devices: Mac’s and IPhone’s 4/5. Rootk...
acksyn.infosecwriters.com
Hacked Again | InfoSecWriters.com
http://acksyn.infosecwriters.com/articles/2017/02/06/hacked-again
On Mon, 02/06/2017 - 11:16. Written by Scott N. Schober. Pros: Excellent introduction to information security for beginners. It covers many of the popular items like phishing, proper passwords, and website security. This is a great resource for a small business owner to get up to speed on some current concerns, as well as offers advice on specific topics. However, if you are curious about infosec, and have no knowledge, this is a great first read. Give Hacked Again 1/5. Give Hacked Again 2/5. Survey of S...
acksyn.infosecwriters.com
Red Tape | InfoSecWriters.com
http://acksyn.infosecwriters.com/articles/red-tape
PCI and Why it is Important. On Thu, 03/02/2017 - 09:24. Contributed by Michael Mozingo. This document is in PDF format. To view it click here. Risk Management for Healthcare Systems. On Tue, 08/09/2016 - 09:27. Contributed by Lamaris Davis. Incident Response Planning In Industrial Control Systems. On Mon, 08/08/2016 - 07:53. Contributed by Bill Clark. This document is in PDF format. To view it click here. Better Passwords and Policies. On Thu, 07/21/2016 - 09:37. Contributed by David Patten. Impact of N...
acksyn.infosecwriters.com
PCI and Why it is Important | InfoSecWriters.com
http://acksyn.infosecwriters.com/articles/2017/03/02/pci-and-why-it-important
PCI and Why it is Important. PCI and Why it is Important. On Thu, 03/02/2017 - 09:24. Contributed by Michael Mozingo. This document is in PDF format. To view it click here. Give PCI and Why it is Important 1/5. Give PCI and Why it is Important 2/5. Give PCI and Why it is Important 3/5. Give PCI and Why it is Important 4/5. Give PCI and Why it is Important 5/5. Subscribe to our RSS Feed. Follow us on Twitter. Friend us on Facebook. Advertise with ISW if you feel you have a good cause. All Time Most Popular.
acksyn.infosecwriters.com
Google UI-Redressing Bug That Discloses The User's Email Address | InfoSecWriters.com
http://acksyn.infosecwriters.com/articles/2016/04/11/google-ui-redressing-bug-discloses-users-email-address
Google UI-Redressing Bug That Discloses The User's Email Address. Google UI-Redressing Bug That Discloses The User's Email Address. On Mon, 04/11/2016 - 10:24. Contributed by Mazin Ahmed. In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an attacker to trick the victim into revealing his email address using UI-Redressing techniques. This document is in PDF format. To view it click here.
acksyn.infosecwriters.com
Cloud Computing and Homomorphic Encryption | InfoSecWriters.com
http://acksyn.infosecwriters.com/articles/2016/07/25/cloud-computing-and-homomorphic-encryption
Cloud Computing and Homomorphic Encryption. Cloud Computing and Homomorphic Encryption. On Mon, 07/25/2016 - 14:55. Contributed by Vicki Holzknecht. How safe is the Cloud? The research within this paper will explain how a form of encryption known as homomorphic can be interlaced into the software for truly encrypting data without it ever being decrypted when stored within the cloud. This document is in PDF format. To view it click here. Give Cloud Computing and Homomorphic Encryption 1/5. Session Hijacki...
acksyn.infosecwriters.com
User account | InfoSecWriters.com
http://acksyn.infosecwriters.com/user/password
Username or e-mail address *. Subscribe to our RSS Feed. Follow us on Twitter. Friend us on Facebook. Advertise with ISW if you feel you have a good cause. CBH Technologies, Corp. Jump back to navigation. The Connected Vehicle: Vulnerabilities, Future, and Security. Open Stack and Open Source Software Vulnerabilities. All Time Most Popular. An Inquiry into Privacy Concerns: Memex, the Deep Web, and Sex Trafficking. Session Hijacking: Exploiting TCP, UDP and HTTP Sessions. Jump back to navigation. 2 days ...
acksyn.infosecwriters.com
Recommended Reading | InfoSecWriters.com
http://acksyn.infosecwriters.com/articles/recommended-reading
On Mon, 02/06/2017 - 11:16. Written by Scott N. Schober. Pros: Excellent introduction to information security for beginners. It covers many of the popular items like phishing, proper passwords, and website security. This is a great resource for a small business owner to get up to speed on some current concerns, as well as offers advice on specific topics. R00ting the hacker: An Interview with Dan Verton. On Wed, 10/21/2015 - 14:39. Dan Verton, author of The Hacker Diaries. On Fri, 10/09/2015 - 08:44.
acksyn.infosecwriters.com
Cryptography | InfoSecWriters.com
http://acksyn.infosecwriters.com/articles/cryptography
On Thu, 04/13/2017 - 09:54. Contributed by an Anonymous source. This paper is a good introduction to Bitlocker. Microsoft bitlocker is a full disk encryption tool/software to help protect data that is saved on the hard drive that has Microsoft windows installed on the system. This document is in PDF format. To view it click here. On Mon, 08/22/2016 - 14:44. Contributed by Aelphaeis Mangarae. This document is in PDF format. To view it click here. Cloud Computing and Homomorphic Encryption. Fastflex is a f...
SOCIAL ENGAGEMENT