HackDig : Dig high-quality web security articles for hackers

Tutorial for Building and Reverse Engineering Simple Virtual Machine Protection

1. IntroductionThe virtual machine protection refers to the kind of software protection technology by which the original executable and readable code are translated into a string of pseudo-code byte stream, and a virtual machine is embedded into the program to interpret and execute that pseudo-code byte stream. The difference between virtual machine pr
Publish At:2017-05-24 18:45 | Read:3779 | Comments:0 | Tags:Virtualization Security

The Internet Drafts and Security Issues Around a Virtual Private Network Infrastructure

All of our articles in this series have reviewed what a Virtual Private Network Infrastructure is all about. Essentially, it is simply another layer of Security that a business or a corporation can implement into their existing Information Technology Infrastructure, also known more specifically as a “VPN.”The design of a VPN can either be q
Publish At:2017-04-20 21:30 | Read:5190 | Comments:0 | Tags:Virtualization Security

An Introduction to tmux

In this introduction, we cover a basic set of features for tmux and a little hands-on using it in some specific use cases. The article was inspired by keeping w3af alive across ssh sessions questions on the w3af mailing list.FeaturesWhat is tmux?Resuming applications after disconnectPane splittingCheat sheetConclusionWhat is tmux?Tmux is a terminal mul
Publish At:2017-01-20 00:55 | Read:7596 | Comments:0 | Tags:Virtualization Security

VoIP Network Recon: Footprinting, Scanning, and Enumeration

The traditional PSTN has been replaced by more advanced and efficient VoIP network. VoIP has quickly made its place in the corporate and home environment as well; there are many advantages of using VoIP network over PSTN. But, the security risk has also increased over the period; securing VoIP network in a corporate environment is the necessity that yo
Publish At:2016-03-18 11:05 | Read:5724 | Comments:0 | Tags:Virtualization Security

Configuring a Test Lab for Data Analysis

The world of IT Security revolves around data. This data mainly consists of logs that are generated, collected, stored and analyzed. Considering the large amount of data security logs can generate; this can put a huge load on storage and processing resources.In a professional production environment, this should be well organised, and there should be en
Publish At:2016-03-14 16:15 | Read:5495 | Comments:0 | Tags:Virtualization Security

Build A Simple Cloud Using the Open Hardware Technology

AbstractData storage has become a critical problem that facing computer scientists. Not only is it the huge amount of data; it is also also the problem of safety and privacy because of the revolution of information technology security. In order to find a possible solution to these problems, this project combines open hardware and open source software.
Publish At:2015-06-10 23:05 | Read:9508 | Comments:0 | Tags:General Security Networking Virtualization Security cloud ge

Announce

Share high-quality web security related articles with you:)

Tools