opexxx
99.0K views | +17 today
 
opexxx
Your new post is loading...
Your new post is loading...
Scooped by alexander knorr
Scoop.it!

Microsoft Security Development Lifecycle

Learn about the Microsoft Security Development Lifecycle (SDL) and how it can improve software development security.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Best Hacking OS For a Hacker-2016

Best Hacking OS For a Hacker-2016 | opexxx | Scoop.it
This blog is fully dedicated to the Best Hacking OS  for a Hacker.Which type of OS will be suitable for a professional or a beginners Hacker you will get answer of all this type of question after reading this blog.
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

PowerShell Video Training from Microsoft

PowerShell Video Training from Microsoft | opexxx | Scoop.it
People frequently ask me, “Where can I learn more about PowerShell?” Today’s post will highlight popular video training options available directly from Microsoft. Microsoft Virtual Academy (MVA) There are many free, publicly available PowerShell video courses on Microsoft Virtual Academy. These cover a range of topics from core PowerShell features to Desired State Configuratio
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Journal of Cloud Computing

Journal of Cloud Computing | opexxx | Scoop.it
Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) is a peer-reviewed open access journal published under the brand SpringerOpen. It publishes research spanning all aspects of Cloud Computing. Principally focused on core elements, including Cloud applications, Cloud systems and the advances that will lead to the Clouds of the future, the journal will also present review and survey papers that offer up new insights, and lay the foundations for further exploratory and experimental work. The journal disseminates research that imparts advanced theoretical grounding and practical application of Clouds and related systems, as enabled by combinations of internet-based software, development stacks and database availability, and virtualized hardware for storing, processing, analysis and visualizing data. Coverage will examine Clouds alongside such other paradigms as Peer to Peer (P2P) computing, Cluster computing and Grid computing. Coverage extends to issues of management, governance, trust and privacy, and interoperability of Clouds. 
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Mobile Security and Risk Review für das 4. Quartal 2015 | MobileIron

Mobile Security and Risk Review für das 4. Quartal 2015 | MobileIron | opexxx | Scoop.it
Mobile Security and Risk Review für das 4. Quartal 2015:
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

How I learned to stop worrying and love the cloud: Azure Forensics for the Security Responder

How I learned to stop worrying and love the cloud: Azure Forensics for the Security Responder | opexxx | Scoop.it
This blog post is from Troy Larson, a true leader in the field of digital forensics and engineer on the Microsoft Security Response Center’s Azure team.  Troy is focused on building and measuring forensic capabilities in the Azure platform, and executing advanced security investigations.  Troy has been on the front lines of critical cases for Microsof
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Systems Admins: We Need To Talk.

Systems Admins: We Need To Talk. | opexxx | Scoop.it
I'm frustrated. Frustrated because I keep seeing articles about businesses, specifically hospitals, being ransom-wared into submission. In the past month, I can recall three specific instances. Some paid the ransom. One is still in limbo. Each system claims that their data is being held hostage, and that the ransomer is demanding somewhere between $1600 and…
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

SecLists.Org Security Mailing List Archive

SecLists.Org Security Mailing List Archive | opexxx | Scoop.it
Security mailing list archive for the Nmap lists, Bugtraq, Full Disclosure, Security Basics, Pen-test, and dozens more. Search capabilities and RSS feeds with smart excerpts are available
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Tools for Building Professional Cloud Architecture Diagrams

Tools for Building Professional Cloud Architecture Diagrams | opexxx | Scoop.it
I’m frequently asked about templates, stencils and shapes that are available for documenting the architecture of cloud-based solutions on Microsoft Azure, Azure Pack and Office 365. Using the tools described in this article, you can quickly build professional architecture diagrams for cloud scenarios. These tools are also useful when creating presentation decks, training materials
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Abusing bugs in the Locky ransomware to create a vaccine - Lexsi Security Hub

Abusing bugs in the Locky ransomware to create a vaccine - Lexsi Security Hub | opexxx | Scoop.it
Back in 2009, we applied the notion of vaccine to Conficker.C to protect workstations and servers against this rapidly propagating worm. Let’s check whether we can apply the same concep
more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

Extracting Tables from PowerShell’s Invoke-WebRequest | Precision Computing

Extracting Tables from PowerShell’s Invoke-WebRequest | Precision Computing | opexxx | Scoop.it

param(     [Parameter(Mandatory = $true)]     [Microsoft.PowerShell.Commands.HtmlWebResponseObject] $WebRequest,         [Parameter(Mandatory = $true)]     [int] $TableNumber ) ## Extract the tables out [...]...

more...
No comment yet.
Scooped by alexander knorr
Scoop.it!

EURASIP Journal on Information Security

EURASIP Journal on Information Security | opexxx | Scoop.it
EURASIP Journal on Information Security is a peer-reviewed open access journal published under the brand SpringerOpen. The overall goal of the EURASIP Journal on Information Security, sponsored by the European Association for Signal Processing (EURASIP), is to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools to enable the security of digital contents. As such, it addresses any work whereby security primitives and multimedia signal processing are used together to ensure the secure access to the data. Enabling technologies include watermarking, data hiding, steganography and steganalysis, joint signal processing and encryption, perceptual hashing, identification, biometrics, fingerprinting, and digital forensics.
The average time to first decision is less than 30 days
more...
No comment yet.