Skip to main content

Posts

Showing posts from June 27, 2010

Checking for root kits

There are many applications that check for root kits. (A rootkit is a software or hardware device designed to gain administrator-level control over a computer system without being detected. The term implies that the motive of using a rootkit is to perform malicious operations on a target host computing system without the knowledge of the administrators or users of that system. Rootkits can target the BIOS, hypervisor, boot loader, kernel or less commonly, libraries or applications.) From Wikipedia. File Name: Checking for rootkit.pdf File Type: PDF File Size: 797 KB Download Now

New DTS Enterprise Inferface

I been busy redesigning my other website @ dtsenterprise.tech.officelive.com . That is one of the reason I haven't posted a PDF last week. If you ever need to find a PDF that I posted just click the link above that says "Missed a documentation then go to DTS Enterprise Documentation" and it will take you all the PDF that's been.

How To Install and Use Nessus

The Nessus vulnerability scanner is the world-leader in active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks. Download the PDF to read more about File Name: How to install and use nessus.pdf Date Created: 06/29/10 File Size: 3210KB Download Now

Penetration Testing in the Real World

Penetration Testing in the real world. If you are tired of “Hacking with Netcat” webcasts or “Penetration Testing with RPC DCOM”, then this movie is for you. It’s a quick reconstruction of a Security Audit that Offensive Security had preformed over a year ago, replicated in our labs. The video is under 20 minutes long, and highly edited attacks rarely go as quickly and smoothly as this. To see the video click the link below: Watch as the user gets access to a MySQL and a Windows Server 2003. Of course this is a controlled environment. Watch Video