Profile cover photo
Profile photo
Cloud Learnr
IT Security Library - E-Books, Videos and Torrents
IT Security Library - E-Books, Videos and Torrents
About
Posts

Post has shared content
    Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and…
Add a comment...

Post has shared content
    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation…
Add a comment...

Post has shared content
The Storm Worm (dubbed so by the Finnish company F-Secure) is a backdoor[1][2] Trojan horse that affects computers using Microsoft operating systems,[3][4][5] discovered on January 17, 2007.[3] The worm is also known as: Small.dam or…
Add a comment...

Post has shared content
  The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and…
Add a comment...

Post has shared content
The complete guide to todays hard-to-defend chained attacks: performing them and preventing them Nowadays, its rare for malicious hackers to rely on just one exploit or tool; instead, they use chained exploits that integrate multiple forms of attack to…
Add a comment...

Post has shared content
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are…
Add a comment...

Post has shared content
The Storm Worm (dubbed so by the Finnish company F-Secure) is a backdoor[1][2] Trojan horse that affects computers using Microsoft operating systems,[3][4][5] discovered on January 17, 2007.[3] The worm is also known as: Small.dam or…
Add a comment...

Post has shared content
  Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today’s ninja, the hacker As a penetration tester or security consultant you no doubt perform tests both externally and internally for your…
Add a comment...

Post has shared content
  The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and…
Add a comment...

Post has shared content
  Introducing to the world of Wireshark.  Analyze unique communications to/from a bot-infected host, reassembles an IRC communication over a non-standard port, and identifies what bot is on the infected host and spot unusual DNS replies.. This analysis is…
Add a comment...
Wait while more posts are being loaded