DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Documents MSUpdaterTrojanWhitepaper

        The  “MSUpdater”  Trojan     And  Ongoing  Targeted  Attacks   A  Zscaler  and  Seculert  Joint  Report       Contents     CONTENTS  ...................................................................................................................…

Documents Unit Testing With JUnit and EasyMock

Unit testing with JUnit and EasyMock We all have it. It's that piece of code in our project that everyone is afraid to change. It's so confusing no one truly understands…

Documents 08 - Ethernet Switch Configuration

08 - Ethernet Switch Configuration By Muhammad Asghar Khan Reference: CCENT/CCNA ICND1 Official Exam Certification Guide By Wendell Odom 1/2 Agenda   Configure Topology…

Technology Open source network forensics and advanced pcap analysis

1. OR So we have a Pcap, now what? By: GTKlondike 2. Oh hey, that guy… 3. I Am…  Local hacker/independent security researcher  Several years of experience in network…

Documents Google Hacks

Hacking Objective Google Hacking uses Google Search to find security holes in the configuration and code that websites use. Utilize searches to reveal sensitive information,…

Documents Installation Guide

D JIGZO EMAIL ENCRYPTION Djigzo Gateway Installation Guide November 4, 2011, Rev: 6572 Copyright © 2008-2011, djigzo.com. Acknowledgments: Thanks goes out to Andreas Hödle…

Technology Talk about apache cassandra, TWJUG 2011

1. Talk About Apache Cassandra Boris Yen [email protected] 2. Outline• Overview• Architecture Overview• Partitioning and Replication• Data Consistency 3. Overview•…

Documents 2010.03.21 mobileweb forbusiness_slideshare

1. The Mobile Web Taking world dominationto new levels … 2. "Mobile is the fastest and cheapest way to reach the largest number of people. There are billions of…

Technology Talk About Apache Cassandra

1. Talk About Apache Cassandra Boris Yen [email protected] 2. Outline• Overview• Architecture Overview• Partitioning and Replication• Data Consistency 3. Overview•…

Technology Computer Forensics and Social Media

1. Lorain County Bar AssociationComputer Forensics and Social Media May 17, 2012Timothy M. Opsitnick, Esq.Senior Partner and General CounselJurInnov Ltd.John Liptak, ACE,…