opexxx
Follow
77.0K views | +1 today
 
Scooped by alexander knorr
onto opexxx
Scoop.it!

TekDefense - News - Tektip ep23 - MASTIFF with a splash of Maltrieve

TekDefense - News - Tektip ep23 - MASTIFF with a splash of Maltrieve | opexxx | Scoop.it
In this episode of TekTip we take a look at performing basic static analysis with MASTIFF . Wh...
more...
No comment yet.
opexxx
Your new post is loading...
Your new post is loading...
Scooped by alexander knorr
Scoop.it!

Security & Privacy Best Practices | Online Trust Alliance

Security & Privacy Best Practices | Online Trust Alliance | opexxx | Scoop.it
Released January 21, 2015 Download as a PDF  See 2015 Data Breach Readiness GuideOTA recommends that all organizations implement the following best practices:
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Malware Prevention through DNS Redirection (DNS Sinkhole)

Malware Prevention through Black-Hole DNS
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

ToolsWatch.org – The Hackers Arsenal Tools Portal » 2014 Top Security Tools as Voted by ToolsWatch.org Readers

ToolsWatch.org – The Hackers Arsenal Tools Portal » 2014 Top Security Tools as Voted by ToolsWatch.org Readers | opexxx | Scoop.it
The Hackers Arsenal Tools
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Malware analysis with ... Gephi?

Malware analysis with ... Gephi? | opexxx | Scoop.it
One of the more difficult questions that cyber security and cyber risk
teams need to convey to their leadership is to answer the question of
whether their organization is being targeted specifically by cyber
attackers or just mass malware.

One obvious way to look at this question is to provide a break down of
malware infections observed by the organization's security infrastructure
(let's say FireEye, Sourcefire, Symantec EP) by the level of sophistication
of malware. But, this doesn't wo
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Bayesian Methods for Hackers

Bayesian Methods for Hackers | opexxx | Scoop.it
Bayesian Methods for Hackers : An intro to Bayesian methods + probabilistic programming with a computation/understanding-first, mathematics-second point of view.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Using the Official Dropbox Command Line Interface (CLI) - The Unofficial Dropbox Wiki

This article assumes you have already installed Dropbox as per the instructions here. Contents 1 Installation2 Getting Started3 Commands3.1 STATUS3.1.1 Description3.1.2 Usage3.1.3 Sample output3.2 HELP3.2.1 Description3.2.2 Usage3.2.3 Sample output3.3 PUBURL3.3.1...
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Sphinx | Open Source Search Engine

Sphinx is an open source full text search server, designed with performance, relevance (search quality),
and integration simplicity in mind. Sphinx lets you either batch index and search data stored in files, an SQL database, NoSQL storage --
or index and search data on the fly, working with Sphinx pretty much as with a database server.
more...
No comment yet.