web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are
(Mostly HP JetDirects, but a little info on the Ricoh Savins), This article will attempt to point out some of the more interesting things that can be done with a network based printer to make it reveal information about its users, owners and the network i
comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of
a software framework that allows for advanced sequence and protocol stream analysis by utilizing bioinformatics algorithms. The sole purpose of this software is to identify protocol fields in unknown or poorly documented network protocol formats.
social bookmarks manager; allows you to easily add sites you like to your personal collection of links, to categorize those sites with keywords, and to share your collection not only between your own browsers, but also with others.
project is about concealing valuables, secrets in our workplaces. Here, hidden spaces/ messages were created within 8 general objects such as wood boards, lamps and disposable coffee cups.
The numbers that control your life. You're identified by dozens of numbers. Your phone number, your driver's license number, your social security number, your zip code, your license plate, your credit card numbers. I find these numbers fascinating. Who distributes them? What can they be used for? How can you use them? How are they issued?
"locks down" an operating system, proactively configuring the system for increased security and decreasing its susceptibility to compromise. Bastille can also assess a system's current state of hardening, granularly reporting on each of the security setti