khairul07.wordpress.com
May | 2013 | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2013/05
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Archive for May, 2013. Spyware. HackingTeam…. May 9, 2013. HackingTeam first caught our attention back in 2011, when WikiLeaks released documents. Describing the functions of the spyware programs the company offers to government agencies in 2008. The program’s description from HackingTeam’s website. Http:/ www.hackingteam.it/images/stories/RCS2012.pdf. Our email address newvirus@kasperksy.com. Soon, nea...
khairul07.wordpress.com
February | 2014 | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2014/02
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Archive for February, 2014. TCP Idle Scans in IPV6…. February 10, 2014. After discovering how to conduct the TCP Idle Scan in IPv6, 21 dif-ferent operating. Systems and versions have been analyzed regarding their properties as idle host. Among those, all nine tested Windows systems could be used as idle host. This shows. That the mistake of IPv4 to use predictable identification fields is being repeated.
khairul07.wordpress.com
April | 2015 | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2015/04
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Archive for April, 2015. Windows Group Policy…. April 28, 2015. Each new version of the Windows operating system introduces policy changes. Sometimes these changes have made older policies obsolete on newer versions of Windows. In this case the policy works only on specific versions of the Windows. Vista aren’t applicable to Windows 2000 or Windows XP Professional. The storage techniques and replication...
khairul07.wordpress.com
Managing NFS and NIS….. | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2015/01/29/managing-nfs-and-nis
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Laquo; Computer Forensic…. Managing NFS and NIS…. January 29, 2015. P/s:- Some of the article are taken from the excerpt – Managing NFS and NIS – O’reilly Associates writen by Hal Stern. Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out.
khairul07.wordpress.com
Windows Group Policy….. | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2015/04/28/windows-group-policy
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Laquo; GWT In Practice……. Computer Organization and Architecture – Designing for Performance…. Windows Group Policy…. April 28, 2015. Each new version of the Windows operating system introduces policy changes. Sometimes these changes have made older policies obsolete on newer versions of Windows. In this case the policy works only on specific versions of the Windows. The storage techniques and replicati...
khairul07.wordpress.com
UNIX Network Programming…. | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2014/12/16/unix-network-programming
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Laquo; VMware Infrastructure 3……. UNIX Network Programming…. December 16, 2014. Just borrowed a book from National Library (PNM) entitled UNIX Network Programming by Stevens , Fenner and Rudoff. Previously I had post a blog about the book , that covers about TCP Client/Server. Now , I’m going to touch on the chapter about I/O Multiplexing and Socket Options. We first enable the socket for signal-driven ...
khairul07.wordpress.com
September | 2013 | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2013/09
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Archive for September, 2013. Practical Malware Analysis using IDA Pro…. September 15, 2013. Two versions of IDA Pro are commercially available. While both versions support x86, the advanced version supports many more processors than the standard version, most notably x64. IDA Pro also supports several file formats,. The IDA Pro Interface. Number of Opcode Bytes to 6. Because most instructions contai...
khairul07.wordpress.com
October | 2014 | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2014/10
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Archive for October, 2014. Fuzzing…Brute Force Vulnerability Discovery……. October 24, 2014. Network Protocol Fuzzing – I would like to touch this chapter- chapter 14 regarding network protocol fuzzing that requires identifying the attack surface , mutating or generating error-inducing fuzz values , transmitting those fuzz values to a target , and monitoring that target for faults. If your fuzz...The boo...
khairul07.wordpress.com
March | 2015 | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2015/03
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Archive for March, 2015. GWT In Practice……. March 30, 2015. Lastly , GWT is great in making project websites that uses Javascript. GWT borrows from the approaches that have come before it and takes things in a new direction, expanding the web development frontiers. All the while, GWT maintains the advantages of traditional compiled-language development by starting out from Java; and it adopts th...In ad...
khairul07.wordpress.com
January | 2015 | Knowledge is important,and it's free..
https://khairul07.wordpress.com/2015/01
Knowledge is important,and it’s free. This is because information is everywhere in the NET. Trust me . Archive for January, 2015. Managing NFS and NIS…. January 29, 2015. P/s:- Some of the article are taken from the excerpt – Managing NFS and NIS – O’reilly Associates writen by Hal Stern. January 8, 2015. The first step in any computer forensic investigation is to identify the type of media you’re working with. The various types of media you might encounter are described in this list:. Or flash memory dr...