Posted on 12/18/201212/06/2013 Beating Signature Based Security – Dynamic Software That Obfuscates Malware
Posted on 12/07/201212/06/2013 Cool Book : Nmap 6 – Network Exploration and Security Auditing Cookbook
Posted on 11/29/201207/11/2016 Building a Active Identity HID Global Two-Factor Card Authentication Lab : ActivID CMS Overview
Posted on 10/02/201204/24/2014 Defending Against Google Hacking : Know What Can Be Found On Search Engines
Posted on 09/24/201211/29/2013 Lock Picking Tools : How Much Skill Do You Really Need? Bump Keys, Lock Picks, Lock Guns