Features

Features

Windows applications

  • Network footprinting

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Initial compromise

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Hacking other machines

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Elevating privileges

    This excerpt from Chapter 2 of "Protect Your Windows Network from Perimeter to Data," by Jesper Johansson and Steve Riley, is about.securing networks by understanding how hackers take advantage of your mistakes.  Continue Reading

  • Google queries for manual hacking tests

    If you want to perform your own manual Google queries, here are some basic tips to get you started  Continue Reading

  • The security landscape

    This excerpt from "The administrator shortcut guide to patch management" lists the top vulnerability categories and discusses the growing number of computer security threats that require patching.  Continue Reading

-ADS BY GOOGLE

SearchVirtualDesktop

SearchWindowsServer

Close