securityblog.gr securityblog.gr

securityblog.gr

IT | Security | Hacking | Programming

A blog about IT, Security, Hacking and Programming!

http://www.securityblog.gr/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR SECURITYBLOG.GR

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

September

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Wednesday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.8 out of 5 with 14 reviews
5 star
4
4 star
5
3 star
4
2 star
0
1 star
1

Hey there! Start your review of securityblog.gr

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

2 seconds

FAVICON PREVIEW

  • securityblog.gr

    16x16

  • securityblog.gr

    32x32

CONTACTS AT SECURITYBLOG.GR

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
IT | Security | Hacking | Programming | securityblog.gr Reviews
<META>
DESCRIPTION
A blog about IT, Security, Hacking and Programming!
<META>
KEYWORDS
1 security
2 hacking
3 programming
4 coding
5 it
6 network
7 computer
8 penetration
9 malware
10 exploits
CONTENT
Page content here
KEYWORDS ON
PAGE
disclaimer,registry snapshots,control dns responses,detect executable dependencies,reversing with dumpbin,next page,follow @maldevel,follow @akarpouzas,follow @securityblog gr,recent posts,popular posts,links,logisek,tag cloud,address,backtrack,change
SERVER
nginx
POWERED BY
PleskLin
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

IT | Security | Hacking | Programming | securityblog.gr Reviews

https://securityblog.gr

A blog about IT, Security, Hacking and Programming!

INTERNAL PAGES

securityblog.gr securityblog.gr
1

Control DNS Responses | PenTesting | Hacking | Coding

http://securityblog.gr/2865/control-dns-responses

Posted on 30/07/2015, 11:40. Mandiant ApateDNS is a tool for controlling DNS responses. As a phony DNS server, Mandiant ApateDNS spoofs DNS responses to a user-specified IP address by listening on UDP port 53 on the local machine. Mandiant ApateDNS also automatically sets the local DNS to localhost. Upon exiting the tool, it sets back the original local DNS settings. Larr; Detect executable dependencies. Registry snapshots →. Active Directory enumeration from non-domain system. Hardening SSH on Debian.

2

Top 5 Free Port Scanners | PenTesting | Hacking | Coding

http://securityblog.gr/1808/top-5-free-port-scanners

Top 5 Free Port Scanners. Posted on 05/03/2013, 22:30. Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network,. 2 Angry IP Scanner. Here are some of the new features in this version.

3

Reversing with DumpBin | PenTesting | Hacking | Coding

http://securityblog.gr/2841/reversing-with-dumpbin

Posted on 16/07/2015, 11:29. The Microsoft COFF Binary File Dumper ( DUMPBIN. Displays information about Common Object File Format (COFF) binary files. You can use DUMPBIN to examine COFF object files, standard libraries of COFF objects, executable files, and dynamic-link libraries (DLLs). For more…. HEADERS x: path to object file. DISASM x: path to object file. Display all exported definitions. EXPORTS x: path to object file. Display all imported definitions. IMPORTS x: path to object file. Post was not...

4

Compress buffer with zlib in C | PenTesting | Hacking | Coding

http://securityblog.gr/2847/how-to-compress-a-buffer-with-zlib-in-c

How to compress a buffer with zlib in C. Posted on 17/07/2015, 12:33. To build the following code, you first have to link zlib library, zlibstat.lib. File, with your project and define ZLIB WINAPI. In your project’s properties - c/c - preprocessor definitions. Define GZIP ENCODING 16. Z stream stream ;. Z DEFAULT COMPRESSION ,. Z DEFLATED ,. GZIP ENCODING ,. Z DEFAULT STRATEGY ). HEAP ZERO MEMORY ,. Stream. next in. Z const Bytef *. Stream. avail in. Stream. next out. Stream. avail out. Z FINISH ). Enter...

5

Backtrack | PenTesting | Hacking | Coding

http://securityblog.gr/tag/backtrack

Two alternatives for Backtrack. Kali Linux From the creators of BackTrack comes Kali Linux, the most advanced and versatile penetration testing distribution ever created…. WEP cracking using Gerix Wifi Cracker in BackTrack. GerixWiFiCracker is GUI for Aircrack-ng suite, is designed for pentesting in a realworld with efficent and userfriendly graphic interface. Get…. WEP cracking using fern wifi cracker in BackTrack. Change mac address in BackTrack. Installing Software Center and Synaptic on Backtrack.

UPGRADE TO PREMIUM TO VIEW 15 MORE

TOTAL PAGES IN THIS WEBSITE

20

LINKS TO THIS WEBSITE

karpouzas.com karpouzas.com

IT Services | Logisek

http://www.karpouzas.com/it-services

At Logisek, we have developed an original methodology to address IT infrastructure investment.Using this methodology, we can help you to identify the maturity level of your infrastructure and plan longterm improvements. R review methodology includes:. IT policies and processes. We can help you to optimise your IT infrastructure and transform it into a valuable business enabler through the following comprehensive portfolio of services. Operation Maintenance and Support Services. Logisek 2016 Privacy Policy.

logisek.com logisek.com

Security Services | Logisek

http://www.logisek.com/node/74

Can help determine if operations are carried out economically and efficiently and if security controls and system access are adequate to protect your data and assets. These reviews can encompass all of your information. E-mail: info [at] logisek.com. Logisek 2016 Privacy Policy.

logisek.com logisek.com

Infrastructure Virtualization Services | Logisek

http://www.logisek.com/node/96

Virtualization addresses this need by allowing multiple applications to share one physical server resource while eliminating the interaction between them. Streamline deployment and management by. Delivering Desktops as a service. For easier OS migration as you package once, deploy everywhere. Give Secure Remote Access. To teleworkers and temporary workers without sacrificing performance or security. Business Impact of Virtualization. Desktop as a Service. E-mail: info [at] logisek.com.

logisek.com logisek.com

Security Services | Logisek

http://www.logisek.com/security-services

Can help determine if operations are carried out economically and efficiently and if security controls and system access are adequate to protect your data and assets. These reviews can encompass all of your information systems or focus on specific areas. IS General Controls Review. Not using an in-house system? We've developed a service to meet your unique needs. We review and analyze the system of internal controls over your on-line system and Internet-based electronic financial services, including ...

mnxsolutions.com mnxsolutions.com

Two Factor SSH with Google Authenticator | MNX Solutions

https://www.mnxsolutions.com/security/two-factor-ssh-with-google-authenticator.html

Two Factor SSH with Google Authenticator. Posted on February 18, 2011 / IN Security. Last week, Google enabled two factor authentication for everyone. This article explains how to install and configure Google Authenticator in conjunction with SSH for two factor authentication. Two-factor authentication relies on something you know (a password) and something you have (your phone). I have posted another article. Describing this same implementation with a Yubikey. Sudo vi /etc/pam.d/sshd. Your verification ...

logisek.com logisek.com

Company | Logisek

http://www.logisek.com/company

Company is a leading Security. Solution provider. We specialize in building customized, scalable solutions to meet your unique business demands. We combine Security, IT, Software Development, Web, VoIP, Hosting and Business services to provide high quality and cost effective solutions. E-mail: info [at] logisek.com. Logisek 2016 Privacy Policy.

karpouzas.com karpouzas.com

IT Services | Logisek

http://www.karpouzas.com/node/75

At Logisek, we have developed an original methodology to address IT infrastructure investment.Using this methodology, we can help you to identify the maturity level of your infrastructure and plan longterm improvements. E-mail: info [at] logisek.com. Logisek 2016 Privacy Policy.

buysoftware.gr buysoftware.gr

Company | Logisek

http://www.buysoftware.gr/company

Company is a leading Security. Solution provider. We specialize in building customized, scalable solutions to meet your unique business demands. We combine Security, IT, Software Development, Web, VoIP, Hosting and Business services to provide high quality and cost effective solutions. E-mail: info [at] logisek.com. Logisek 2016 Privacy Policy.

karpouzas.com karpouzas.com

Infrastructure Virtualization Services | Logisek

http://www.karpouzas.com/node/96

Virtualization addresses this need by allowing multiple applications to share one physical server resource while eliminating the interaction between them. Streamline deployment and management by. Delivering Desktops as a service. For easier OS migration as you package once, deploy everywhere. Give Secure Remote Access. To teleworkers and temporary workers without sacrificing performance or security. Business Impact of Virtualization. Desktop as a Service. E-mail: info [at] logisek.com.

UPGRADE TO PREMIUM TO VIEW 44 MORE

TOTAL LINKS TO THIS WEBSITE

53

SOCIAL ENGAGEMENT



OTHER SITES

securityblog.ch securityblog.ch

Security Blog | A slight bit about security

July 21, 2014. Okay, I found this in my leftover posts, and I never finished it. I’m going to post it, in case anyone is interested. The WRCCDC this year was tons of fun, and I saw a lot of new tricks from black team on the linux boxes. I’ll try to list what I can recall on them now so that other teams can cross reference to see if they missed things:. Running DokuWiki – Vulnerable, but I didn’t take the time to figure out how. The /opt/bin/ directory was pretty bad. All of /opt/ was. That sucked bigtime...

securityblog.co.uk securityblog.co.uk

Securityblog.co.uk

securityblog.com securityblog.com

SecurityBlog.com

Sign Up Now For Early Access. Is launching soon. Enter your email address below to instantly create your account and get early access. Enter your email address:. Click here to contact us.

securityblog.com.au securityblog.com.au

securityblog.com.au - This domain may be for sale!

Find the best information and most relevant links on all topics related to securityblog.com.au. This domain may be for sale!

securityblog.defendersystem.com securityblog.defendersystem.com

Security Blog - Delaware County, Security Alarm & Monitoring Specializing in Security System Monitoring, Alarm SECURITY Systems and Solutions

Residential, Commercial, Retail, Manufacturing, Healthcare, etc. We are committed 24/7 365 days to help. See our referral incentive program. Everyone wins! This is an example of a WordPress page, you could edit this to put information about yourself or your site so readers know where you are coming from. You can create as many pages like this one or sub-pages as you like and manage all of your content inside of WordPress. Security Blog is proudly powered by WordPress.

securityblog.gr securityblog.gr

IT | Security | Hacking | Programming

IT Security Hacking Programming. Kill chain attacks with Kali. The term kill chain was originally used as a military concept related to the structure of an attack; consisting of…. Create fake services for malware analysis. INetSim is a software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour…. Regshot is an open-source (LGPL) registry compare utility that allows you to quickly take a snapshot of your registry and…. Parsing JSON in C. To compile...

securityblog.iatric.com securityblog.iatric.com

Bluehost.com

2003-2017 Bluehost.Com. Toll Free (888) 401-HOST(4678).

securityblog.igearnetwork.com securityblog.igearnetwork.com

BITZ Secure Security Blog

BITZ Secure Security Blog. Matrix of Security News. August 13, 2015. IT Specialist – Technical Support . O Network Security. Maintain confidentiality with regard to the information being processed, stored or accessed by the network. From St. August 13, 2015. Tableau BI Developer – Wells Fargo. Tableau server experience posting dashboards, configuring permissions and setting row level security. Enjoys assimilating complex information into cle. August 13, 2015. Bookkeeper – Main Event USA &#8211. Comments ...

securityblog.info securityblog.info

securityblog.info - This domain may be for sale!

Securityblog.info has been informing visitors about topics such as Security Alarm Companies, Network Security Threats and Home Security System Companies. Join thousands of satisfied visitors who discovered Home Security Home Security, Home Security Alarm Monitoring and General Liability Insurance. This domain may be for sale!

securityblog.ir securityblog.ir

امنیت سایت | امنیت سرور - مقالات آموزشی امنیت

امنیت سایت امنیت سرور. آموزش نصب mod pagespeed. 2015-09-20 / securityblog / 1 Comment. افزونه pagespeed از سمت تیم توسعه دهنده وب گوگل برای وب سرور آپاچی ارائه شده است. این افزونه با عمل Cache سایت ها را بهینه سازی کرده و سرعت آنها را بهبود می بخشد.استفاده از این افزونه علاوه بر بالا بردن سرعت لود سایت ، باعث کاهش فشار به سرور می شود. آموزش نصب mod pagespeed. آموزش نصب mod pagespeed در سی پنل. برای نصب و فعالسازی mod pagespeed در WHM/cPanel بصورت زیر اقدام کنید. Cd & rm -rf /tmp/pagespeed. Wget https:/ d...

securityblog.it securityblog.it

securityblog.it - Questo dominio potrebbe essere in vendita!

Find the best information and most relevant links on all topics related to securityblog.it e Security Tab. Questo dominio potrebbe essere in vendita!