A system for stealthy authentication across closed ports, communication in which information arrives encoded in the form of connection attempts to closed ports.
As CD's are not 100% indestructible many people want to make a backup of their games. Using the backup to play the game thus saving the original. (Fight the DRM)
in Uninformed Vol1 2005.May by Nikos Drakos, Computer Based Learning Unit, University of Leeds. + Ross Moore, Mathematics Department, Macquarie University, Sydney.
PktFilter is a software that can configure the IP filtering device driver found in Windows 2000/XP/Server 2003, with filtering rules following a syntax similar to IP Filter
The Campaign to Eliminate DRM. There is no more important cause for electronic freedoms and privacy than the call for action to stop DRM from crippling our digital future.
a script that uses brute force to crack passwords through "true/false" SQL injection vulnerabilities. With "true/false" SQL injection vulnerabilities, you cannot actually query data out of the database, only ask a statement that is returned "true" or "fal
a platform for people seriously interested in anti-virus research, network security and computer security to communicate with each other, to develop solutions for various security problems, and to develop new security technologies.
lets you instantly set up secure conversations. It's an open source encrypted, private alternative to WEB chat systems. Messages are encrypted inside your own browser using AES-256. Encrypted data is securely wiped after one hour of inactivity. Runs as a Tor hidden service.
combines Comodo's sturdy firewall and state-of-the-art antivirus protection in one suite. Defends your PC against 1 billion executables including viruses, root kits, Trojans, and zero-day attacks. And even with all these great features, CIS is free. Users are also asked to install the Comodo SafeSearch and Ask.com toolbars, so be careful.
site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
works like a transparency layer. Programs write on the transparency layer. When you delete the sandbox, it's like removing the transparency layer the system stays as it was.
a simple, fast offline-mode VNC password cracker. It takes a set of challenge-response pairs of the type passed during a VNC authentication attempt, and attempts to recover the passwords using a dictionary file.
useful resource for checking whether your popup blocker is working well. Also seems like a good way to make sure you are developing "good" popups for when you need them.
automatically hardens software applications against a wide range of bugs. These bugs — known as memory errors — often end up as serious security vulnerabilities, cause crashes, or lead to unpredictable behavior.
a general purpose monitoring platform. provides a framework dealing with (among others) packet demultiplexing, timers, threads and communication. This allows programmers to concentrate on the precise functionnalities they want to implement...
a 32-bit assembler level analysing debugger for Microsoft® Windows®. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable.