A system for stealthy authentication across closed ports, communication in which information arrives encoded in the form of connection attempts to closed ports.
As CD's are not 100% indestructible many people want to make a backup of their games. Using the backup to play the game thus saving the original. (Fight the DRM)
The men and women running SAC in 1960 essentially put the entire planet’s population at risk by deliberately disabling the PAL safety mechanisms. Perhaps we should keep that in mind before we put too much trust in the people charged with our nation’s
A joint project of the Electronic Frontier Foundation and Harvard, Stanford, Berkeley, University of San Francisco, University of Maine, George Washington School of Law, and Santa Clara University School of Law clinics
in Uninformed Vol1 2005.May by Nikos Drakos, Computer Based Learning Unit, University of Leeds. + Ross Moore, Mathematics Department, Macquarie University, Sydney.
PktFilter is a software that can configure the IP filtering device driver found in Windows 2000/XP/Server 2003, with filtering rules following a syntax similar to IP Filter
from Sysinternals Freeware, a Registry monitoring utility that will show you which applications are accessing your Registry, which keys they are accessing, and the Registry data that they are reading and writing - all in real-time.
a script that uses brute force to crack passwords through "true/false" SQL injection vulnerabilities. With "true/false" SQL injection vulnerabilities, you cannot actually query data out of the database, only ask a statement that is returned "true" or "fal
works like a transparency layer. Programs write on the transparency layer. When you delete the sandbox, it's like removing the transparency layer the system stays as it was.
a free, open-source, light-weight and easy-to-use password safe for Windows. You can store your passwords in a highly-encrypted database locked with one master key or key-disk.
combines Comodo's sturdy firewall and state-of-the-art antivirus protection in one suite. Defends your PC against 1 billion executables including viruses, root kits, Trojans, and zero-day attacks. And even with all these great features, CIS is free. Users are also asked to install the Comodo SafeSearch and Ask.com toolbars, so be careful.
site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
a general purpose monitoring platform. provides a framework dealing with (among others) packet demultiplexing, timers, threads and communication. This allows programmers to concentrate on the precise functionnalities they want to implement...
a simple, fast offline-mode VNC password cracker. It takes a set of challenge-response pairs of the type passed during a VNC authentication attempt, and attempts to recover the passwords using a dictionary file.
useful resource for checking whether your popup blocker is working well. Also seems like a good way to make sure you are developing "good" popups for when you need them.
automatically hardens software applications against a wide range of bugs. These bugs — known as memory errors — often end up as serious security vulnerabilities, cause crashes, or lead to unpredictable behavior.