a script that uses brute force to crack passwords through "true/false" SQL injection vulnerabilities. With "true/false" SQL injection vulnerabilities, you cannot actually query data out of the database, only ask a statement that is returned "true" or "fal
A system for stealthy authentication across closed ports, communication in which information arrives encoded in the form of connection attempts to closed ports.
As CD's are not 100% indestructible many people want to make a backup of their games. Using the backup to play the game thus saving the original. (Fight the DRM)
in Uninformed Vol1 2005.May by Nikos Drakos, Computer Based Learning Unit, University of Leeds. + Ross Moore, Mathematics Department, Macquarie University, Sydney.
PktFilter is a software that can configure the IP filtering device driver found in Windows 2000/XP/Server 2003, with filtering rules following a syntax similar to IP Filter
KeePass is a free/open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk.
lets you instantly set up secure conversations. It's an open source encrypted, private alternative to WEB chat systems. Messages are encrypted inside your own browser using AES-256. Encrypted data is securely wiped after one hour of inactivity. Runs as a Tor hidden service.
a simple, fast offline-mode VNC password cracker. It takes a set of challenge-response pairs of the type passed during a VNC authentication attempt, and attempts to recover the passwords using a dictionary file.
useful resource for checking whether your popup blocker is working well. Also seems like a good way to make sure you are developing "good" popups for when you need them.
combines Comodo's sturdy firewall and state-of-the-art antivirus protection in one suite. Defends your PC against 1 billion executables including viruses, root kits, Trojans, and zero-day attacks. And even with all these great features, CIS is free. Users are also asked to install the Comodo SafeSearch and Ask.com toolbars, so be careful.
site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
works like a transparency layer. Programs write on the transparency layer. When you delete the sandbox, it's like removing the transparency layer the system stays as it was.
a free, open-source, light-weight and easy-to-use password safe for Windows. You can store your passwords in a highly-encrypted database locked with one master key or key-disk.
automatically hardens software applications against a wide range of bugs. These bugs — known as memory errors — often end up as serious security vulnerabilities, cause crashes, or lead to unpredictable behavior.