• free download ebook Ethical Hacking (EC-Council Exam 312-50): Student Courseware

    EC-Council E-Business Certification SeriesCopyright © by EC-Council Developer - Thomas MathewPublisher - OSB PublisherISBN No - 0972936211 By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide provides the tools ...
  • Password Cracking Guide

    The goal is to unify all of the good information found in various bits and pieces into 1 large document. This document is for people who want to learn to the how and why of password cracking. There is a lot of information being presented and you should READ IT ALL BEFORE...
  • 17 years old hacker will demonstrate Linux ELF Virus at 'The Hackers Conference 2012'

     The Biggest Hacking Mania has arrived - 'The Hackers Conference 2012'.  In this first of its kind conference in India, Blackhat hackers drawn from around the world will demonstrate how they access a victim's personal information, and even confidential data available on the...
  • The Hacker’s Underground Handbook | ebook on hacking

    The Hacker’s Underground Handbook The Hacker’s Underground HandbookLearn What it Takes to Crack Even the Most Secure SystemsBy: David Melnichuk The Hacker’s Underground Handbook will guide you through password hacking, windows hacking, malware, phising, web hacking, network hacking and Linux...
  • How To Keep Your Bookmarks Synced Across Computers With Firefox 4

    To utilize the sync feature, make sure that all of your computers have Firefox 4 installed. If your Firefox is still the older version, you need to download the latest version first. After Firefox 4 is installed, open it up and go to the “Set Up Sync” menu. In the Mac version, this menu is located...
  • Hacking a website or its member section

    First of all,why you want to hack a webpage?Is it a certain webpage or any site at all? There are many reasons to hack a website, or a webmaster.Maybe you want to take a revenge or maybe you want to have fun or just learn how to do it ! You can deface the website which means replace the original...

Tuesday, June 7, 2011

Virtual LAN Security Best Practices Independent security research firm @stake [9] recently conducted a Security Review [1] of the virtual LAN (VLAN) technology on the Cisco Catalyst 2950, Catalyst 3550, Catalyst 4500, and Catalyst 6500 series switches. Although no intrinsic security weaknesses emerged from this review, it has been pointed out that an improper or inadequate switch configuration...