Ghost in the Wires By Kevin Mitnick
Posted by Nikhil Chawra 5/30/2012
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Download

Download
24 Deadly Sins of Software Security free download
Posted by Nikhil Chawra 5/30/2012
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems.

Download
This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution

Download
This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code: SQL injection Web server- and client-related vulnerabilities Use of magic URLs, predictable cookies, and hidden form fields Buffer overruns Format string problems Integer overflows C++ catastrophes Insecure exception handling Command injection Failure to handle errors Information leakage Race conditions Poor usability Not updating easily Executing code with too much privilege Failure to protect stored data Insecure mobile code Use of weak password-based systems Weak random numbers Using cryptography incorrectly Failing to protect network traffic Improper use of PKI Trusting network name resolution
Hacking - The Next Generation free download
Posted by Nikhil Chawra 5/30/2012
Hacking – The Next Generation (2009) | 6.7 MB
O Reilly Media, Inc. | 2009 | ISBN: 0596154577 | 296 pages | PDF | 6.7 MB With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

Download
Recognize weaknesses in today s powerful cloud infrastructures and how they can be exploited
Prevent attacks against the mobile workforce and their devices containing valuable data
Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations.

O Reilly Media, Inc. | 2009 | ISBN: 0596154577 | 296 pages | PDF | 6.7 MB With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.
Download
Recognize weaknesses in today s powerful cloud infrastructures and how they can be exploited
Prevent attacks against the mobile workforce and their devices containing valuable data
Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations.
Practical Malware Analysis free download
Posted by Nikhil Chawra 5/30/2012
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
You'll learn how to:
Download
Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
You'll learn how to:
Download
- Set up a safe virtual environment to analyze malware
- Quickly extract network signatures and host-based indicators
- Use key analysis tools like IDA Pro, OllyDbg, and WinDbg
- Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques
- Use your newfound knowledge of Windows internals for malware analysis
- Develop a methodology for unpacking malware and get practical experience with five of the most popular packers
- Analyze special cases of malware with shellcode, C++, and 64-bit code
Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
PCSX2 0.9.8 PLAYSTATION 2 EMULATOR FREE DOWNLOAD [UPDATED]
Posted by Nikhil Chawra 5/29/2012
This latest download is most stable version of playstation emulator. There has been lot of new things in this release which you can find on official website of the emulator.
I am not going to give you all details and we don’t need to see right now because I know you are more keen to downloading it and installing it to enjoy the ps2 games on your computer.
You have to read below before clicking download link for pcsx2 0.9.8 playstation 2 emulator.
- New version also complements a new memory card manager so that you can have more saves on one card
- More improved host file system and ELF loading support
- Homebrewers can work with a more featured complete virtual PS2 to test your tools.
- Patches and compatibility hacks are applied by default automatically.
- Another excellent and notable feature is new VU recompiler called microVU, which is an effort to bring higher compatibility over the older SuperVU recompiler.
- New version also have a new VIF Unpack recompiler which is more accurate and safer than the previous ASM implementation.
- Another big change is within the SPU2-X sound plugin, which has been worked on thoroughly to improve the sound generation, provides different audio output options and filtering.
- There are also internal changes to improve the compatibility with games such as Burnout 3 which had never booted on any previous version of PCSX2
- In summary there are over 1500 of the tested games that are now are fully playable.
- GSdx is faster, more stable and has more configuration options than ever before.
- SPU2-X is the preferred SPU2 plugin now.
- It has matured into almost completely emulating all the SPU2 quirks, making many more games work
So this was a brief description of PCSX2, now you can download from below links.
?
+
X
Recommended for you
Loading..










