Главная » Статьи

Всего материалов в каталоге: 31
Показано материалов: 7-12
Страницы: « 1 2 3 4 5 6 »

Very important points when you use network equipment are factors such as its installation and setup. Here are some tips for installing and configuring your router, to get the most out of its use.

Мои статьи | Views: 884 | Added by: d1gger | Date: 29.08.2016 | Comments (0)

One of the main tasks of administrators and specialists in network security is controlling Network, network connections in real-time. This is what we will talk today, and we will consider three simple solutions to solve this problem. 

Мои статьи | Views: 1810 | Added by: d1gger | Date: 15.06.2016 | Comments (0)

WebRTC, which translates to English as "the real-time communication on the Internet" (Web real-time communications), refers to technology of exchanging data between browsers and other applications on the technology peering, aka "point to point". Two browsers two users can communicate with each other directly, bypassing any Central servers. WebRTC is the W3C recommendation and supported by all major browsers, including Chrome, Firefox and Opera.

Мои статьи | Views: 3044 | Added by: d1gger | Date: 17.03.2016 | Comments (0)

In itself, the definition of VPN (virtual private network) is quite wide, and straight off it is difficult to say what can be considered VPN and what not. With a certain reserve VPN can be called the ancestor of the Internet ARPANET. Interestingly, almost all of the technology, and more often still, the protocols initially used for building distributed enterprise networks, has gradually become the main means of access to Network for standard users. Today, we meet with the variations VPN, are unprepared and not very knowledgeable in networking technologies, the user will be able to meet on the way.

Мои статьи | Views: 871 | Added by: d1gger | Date: 11.03.2016 | Comments (0)

Sn1per – a tool to automate the process of collecting data for the exploration and penetration testing. In their work sn1per involves such well-known tools like: amap, arachni, amap, cisco-torch, dnsenum, enum4linux, golismero, hydra, metasploit-framework, nbtscan, nmap smtp-user-enum, sqlmap, sslscan, theharvester, w3af, wapiti, whatweb, whois, nikto, wpscan.

Мои статьи | Views: 4539 | Added by: d1gger | Date: 23.02.2016 | Comments (0)

Nmap is a free, open source utility for network exploration and auditing security. It is widely used in the community of Linux users because it is easy to use, but at the same time very powerful. The principle of operation of Nmap, simply put, involves sending packets of data at the specified target (by IP), and in interpreting the returned packets to determine which ports are open/closed, what services are running on the scanned system is installed and enabled firewalls or filters and, finally, what operating system is running.

Мои статьи | Views: 1164 | Added by: d1gger | Date: 06.02.2016 | Comments (0)

Investigationes
CHARLES S. ANDREWS
3139 Brownton Road
Long Community, MS 38915



+7 495 287-42-34 info@ucoz.com
Mirum
sample map