[Lab] Off Topic: Great, free, IT Security online magazine

eric.schmidt at rogers.com eric.schmidt at rogers.com
Thu Nov 18 11:14:22 EST 2010


Hey everyone;

At yesterday's meeting, I outed myself as an IT Security guy ... I just wanted 
to pass along a great free resource for anyone interested in IT Security issues, 
malware, hacking, etc. See below. I do get some marketing-spam from them re: 
training and stuff, but I consider that to be the cost of the publication...

In order to download the pdf version, you do need to provide an email address 
(note: "an")

cheers,

Eric


----- Forwarded Message ----
From: Hakin9 Magazine <newsletteren at hakin9.org>
To: eric.schmidt at rogers.com
Sent: Wed, November 17, 2010 11:12:52 AM
Subject: H9: November issue of Hakin9; Spyware - Someone is always watching...

hakin9 Newsletter 
     
 
  
     

________________________________

 
November issue of Hakin9 
Spyware - Someone is always watching...
________________________________
 
Secure Hash® Integrity Verification Utility  
________________________________
 
Secure 1st have announced the release of Secure Hash V1.0. This new Windows 
application is designed to generate, store and analyse digital signatures. These 
digital signatures can then be used during a cyber forensic investigation to 
insure the integrity of the investigation.

Secure Hash scans the hard disk (or any storage media) on a Windows PC and 
calculates the MD5, SHA1 and SHA2 hashes of the files and builds a list with 
other vital information such as file size, location, date of creation and date 
of modification. The resulting list can be used during a cyber forensic 
investigation. For example, the investigator may use Secure Hash to save the 
names, locations and hashes of all the files on a PC during the first stage of 
the investigation, after the PC has been removed from the crime scene. Later, 
the investigator could use this information in a court of law or in a lab to 
generate a report and file list to insure the integrity of the investigation.

Secure Hash is 100% compatible with all versions of Microsoft Windows from 
Microsoft Windows 95 to Microsoft Windows 7 including the 64 bit variants.

http://secure1st.com
  
SpyShelter - Protect Your Privacy. Feel Secured. 
________________________________
 
SpyShelter is the anti-keylogging, anti-spyware program that protects your data 
from all types of keylogging and spy programs: known, unknown, and 
under-development. 

Whenever you use the ATM, you cover the keyboard to protect your pin. Spyshelter 
performs the same for your computer, it detects and block dangerous and 
malicious programs from reading what your typing on your personal keyboard.
By constantly scanning your machine for any malicious programs that attempt to 
capture and store your private and sensitive information, Spyshelter will keep 
you safe and secure. 

Unlike other anti-malware programs, Spyshelter doesn't rely on comparing items 
to another database, it has its own special in-built fast algorithms that won't 
slow down your computer while still keeping you safe.
Every day cybercriminals are releasing custom-made keyloggers to try and steal 
your personal and private information from your personal computer. Stop this now 
by installing Spyshelter, and never face this threat again.
With its simple and easy-to-use intuitive GUI, you'll be protected in no time at 
all.
Spyshelter is Windows x32/x64 compatible.(World first 64 bit anti keylogger)
For detailed description of SpyShelter please visit www.spyshelter.com
  
FREE White Papers to help protect your company information - STOP document 
leakage and information theft 

________________________________
 
Information Leakage - the enemy is within

This paper covers why DRM is required for data leakage prevention from within 
and outside of the enterprise for use as an effective document control system. 
It covers why encryption and access control are only effective inside the 
enterprise to secure information.
Document Security - a guide to securing your documents

This paper explains what components make up a document security solution and 
which one is right for you. It covers the use of encryption, copy protection, 
digital rights management and document collaboration as the methods available to 
protect information.
10 things you wished you had known about PDF Security, but they didnt tell you!

Is the PDF security software you are looking to purchase really secure?  If the 
PDF security software you are evaluating can be simply broken then you might as 
well save your money.  What PDF security vendors are not telling you about their 
products and solutions, and what questions you should be asking.
  
Netsparker Web Application Security Scanner 
________________________________
 
 Netsparker Web Application Security Scanner uses exploitation in its core 
engine to detect vulnerabilities and eliminate false positives. All critical and 
important vulnerabilities have a direct impact, Netsparker uses this impact to 
prove that identified vulnerabilities are not false positives and demonstrates 
this impact to you. 


Finally a scanner that you can trust, a scanner that doesn't guess but knows, a 
scanner that you can say "Yeah!" when it reports a vulnerability rather than 
"Meh..., Let's investigate if it's real or not.", 


Try Netsparker Professional Today and see it with your own eyes:
https://www.mavitunasecurity.com/demo/ 
  
Vulnerability Management Buyers Checklist
________________________________
 
Key Questions to Ask Before You Select a VM Solution
Choosing a solution for VM is a critical step toward protecting your 
organizations network and data. Without proven, automated technology for precise 
detection and remediation, no network can withstand the daily onslaught of new 
vulnerabilities that threaten security.
To help finalize your decision on which solution to buy, download this 12-point 
short list of considerations that will help you determine what will work best 
for your organization. 

URL: https://www.qualys.com/
  
eLearnSecurity Penetration Testing Course 
________________________________
 
"eLearnSecurity Penetration Testing Course is the course for professionals who 
want to study and practice the most advanced hacking skills, the best project 
management methodology and the guidelines for state of the art reporting.

Get 1 free SQL Injection module here: http://www.elearnsecurity.com 

"I kept thinking "this is what the CEH/LPT should have been," and I am delighted 
to say that if students can master the topics and techniques in eLearnSecuritys 
Penetration Testing Pro, they should be well on their way to being an 
accomplished pentester" Jason Haddix - SecurityAegis"
   Spyware - Someone is always watching... 

DOWNLOAD  
________________________________

See the full list of articles at 
hakin9 website
________________________________

Advertise with Hakin9 magazine
Visit our website or contact us directly at karolina.lesinska at hakin9.org 
________________________________

Download 2009/2010 archives of Hakin9 magazine
Click here!
________________________________
NetClarity 


http://www.netclarity.net
________________________________

Email marketing by
  
Please spread the word about Hakin9.
Hakin9 team
www.hakin9.org
en at hakin9.org
tel. +1 917 338 36 31 Find hakin9 magazine on:  
Click here to unsubscribe from future mailings.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://artengine.ca/pipermail/lab/attachments/20101118/8285e73f/attachment-0001.htm>


More information about the Lab mailing list