Search
Results
How to set up DRb over SSL
Bill Stearns' web site
WallWatcher
[http://www.wallwatcher.com/] - - public:zhesto
runs under Microsoft Windows 98 and above. It collects, displays, and analyzes log information from a variety of Routers
The Peon's Guide To Secure System Development
Self Signed Certs
Linux Kernel Security
Eleven SSH Tricks
Infosecwriters.com
Flyn Computing Project Listing
Sandbox System Call API for Linux
Securing Windows 2000 Terminal Services
[http://www.microsoft.com/technet/prodtechnol/win2kts/maintain/optimize/secw2kts.mspx] - - public:zhesto
The Hacker's Choice :: THC
kernsh
Secure Programming for Linux and Unix HOWTO
dreamland.c
[http://7ka.mipt.ru/~szh/dreamland/dreamland.c] - - public:zhesto
drop privileges, chroot, and run something there
DNS Cache Poisoning Security Research - LURHQ
Writing Snort Rules
Index of /project/papers/shellcodes
priestmasters exploit coding homepage
WLSec - Wireless LAN Security Framework
Attacking and repairing the WinZip "Advanced Encryption" scheme
Hardened-PHP
Distributed Cfengine
Bugghy's pages
Understanding TCP Reset Attacks, Part I
pam_chroot
[http://sourceforge.net/projects/pam-chroot/] - - public:zhesto
pam_chroot is a Linux PAM module that allows a user to be chrooted in auth, account, or session.
Security-related zines list
PuTTY Links
vanheusden.com Linux-kernel security patch
Top 10 ways to crash PHP
knock
Rootkit.nl - Protect your machine
The Art of Rootkits (2nd ed)
Minimization of network services on Windows systems
XPLizer - Windows Hardning Frontend Tool
Slackware security
USRBAC Home
Windows 2000 Firewall
WinBlox @ UMBRELLA.NAME
WiFi Hacking Net
Web-Insights
imprison: imprisons processes to jail
SecurityFocus HOME Columnists: Googling Up Passwords
exploits through a web browser
[http://www.groovyweb.uklinux.net/index.php?page_name=exploits%20through%20a%20web%20browser] - - public:zhesto
R-fx Networks - Internet Security Solutions - Projects
phpSecure.info
[http://www.phpsecure.info/v2/.php] - - public:zhesto
open source php security related articles and vulnerabilities