Page of 48
First page | Prev | Next | Last page |

Breaking_ScriptEncoder.shtml

Category: Cryptography, Encryption

Title: Breaking_ScriptEncoder.shtml

Description: The Windows Script Encoder (screnc.exe) is a Microsoft tool that can be used to encode your scripts (i.e. JScript, ASP pages, VBScript). Yes: encode, not encrypt. The use of this tool is to be able to prevent people from looking at, or modifying, your scripts. Microsoft recommends using the Script Encoder to obfuscate your ASP pages, so in case your server is compromised the hacker would be unable to find out how your ASP applications work.

View Now



efs_vuln.shtml

Category: Cryptography, Encryption

Title: efs_vuln.shtml

Description: When files which were previously in plain text are encrypted using EFS, either by encrypting the file or the directory the file is in, or by moving the file into a directory with EFS applied, a plain-text (as distinct from cipher-text) copy of the file is made on the disk. In addition to this plain-text fragments of the original file may also persist.

View Now



BufferOverflow_Basics.shtml

Category: Denial_Of_Service, Buffer Overflow

Title: BufferOverflow_Basics.shtml

Description: A buffer overflow problem is based in the memory where the program stores it's data. Why's that, you ask. Well because what buffer overflow do is overwrite expecific memory places where should be something you want, that will make the program do something that you want. Well some of you right now are thinking WOW, I know how buffer overflow works, but you still don't know how to spot them. Let's follow a program and try to find and fix the buffer overflow

View Now



Deadly DOS attack - by Abhisek Datta (.doc)

Category: Denial_Of_Service, Miscellaneous

Title: Deadly DOS attack - by Abhisek Datta (.doc)

Description: Anyway to start with I must say that this article explain most of the commonly used DoS attack and we will take a clear look at the intricacies of these DoS attacks and how one can protect himself from these attacks.

View Now



officexp.shtml

Category: Denial_Of_Service, Windows Miscellaneous

Title: officexp.shtml

Description: If a user visits a specially designed html page with IE or opens or previews a message with Outlook XP arbitrary commands may be executed on his computer. This may lead to taking full control over user's computer. Using another approach to this bug allows reading, modifying and deleting messages in user's Outlook XP folders.

View Now


First page | Prev | Next | Last page |