July 2011

The Indian military fears a ‘Chinese aggression’ in 2017

The Indian military fears a ‘Chinese aggression’ in less than a decade.

International Affairs, Counterintelligence and National Security: Jim & Anna Hyonjoo Lint Scholarship $1,500

This program is offered to help further the education and career development of scholars, especia

Gregory D. Evans is active again, i just received the e-mail below in my inbox. First it was Joe Black that almost tricked me and now Gregory D. Evans is trying to trick me. Noobs. 

Penetration testing is used to test an infrastructure. With the help of a penetration test you can see what kind of vulnerabilities you have in your infrastructure. Once your infrastructure has been tested, the penetration tester will give you advice on what to do with your infrastructure vulnerabilities.


A list with top security tools.

 

1. Nmap –  Get Nmap Here - nmap -v -sS -A xxx.xxx.xxx.xxx

Black and Berg Cybersecurity LLC - fraud

Free online event: Mobile Security Summit on Wednesday, July 13, 2011

Consumer-oriented devices are used to access the enterprise network, email and applications on th

BeEF: The Browser Exploitation Framework

The Browser Exploitation Framework (BeEF) is a powerful professional security tool.