Friday, April 29, 2016

List of books on offensive information security.



Any sufficiently advanced technology can be compared with the weapons: when the enemy has a gun and you don't, necessarily want to change the balance of power in their favor. IT security knowledge transmitted in different ways, and there are weapons whose use is limited to ethical choices.

It is impossible to become a professional in the field of information security, not understanding the intricacies of penetration and detecting vulnerabilities. All the books that I will list similar to the charged rifle, which wants to have as a defense: they are required to examine for security researchers and professionals wishing to expand the boundaries of knowledge.

Part 1. Overall methodological description of penetration testing and detection of vulnerabilities

Penetration testing, A hands-on introduction to hacking

  

In a practical guide to penetration testing security expert Georgia Weidman tells about the main methods of hack-testing, as well as carrying out a series of practical exercises with tools such as Wireshark, Nmap and Burp Suite. Tests are conducted on the basis of the platform for Linux-basic Kali operating system (OS) for tests on.

Penetration Tester's Open Source Toolkit




















To be continued!

Monday, June 29, 2015

Received today a e-mail from Mobil Action. Like all such firms offer services to promote applications. Looked through their site and understood nothing. What they want and how much it costs them to help?

Tuesday, February 4, 2014

Message from Godady

Godaddy, where registered this domain, sent me message, that need to pay of using this domain.
My contract ends in May of this year. So working Godaddy.

Sunday, June 24, 2012

Hello Everyone
I have been designing applications for android smartphones. I'll try to describe the process of creating and monetization applications.