lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAO3uKSuVT_nWfCNpbd_r8igrmUGC1spVXqNSEL0xJc2+NXp=GA@mail.gmail.com>
Date: Thu, 17 Jan 2013 12:59:11 +0400
From: Andrew Terekhov <ultraata@...il.com>
To: Almaz <almaz@...yo.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: White Paper: Detecting System Intrusions

Why is this here?
There's nothing new/interesting in datasheets.

On Wed, Jan 16, 2013 at 9:39 PM, Almaz <almaz@...yo.com> wrote:

> How to detect system intrusions? What are the techniques? Can one
> character difference in the output be an indicator of compromise? Download
> and read a white paper below if you want answers to these questions and
> more.
>
> http://www.demyo.com/downloads/white-papers/
>
> --
> Almantas Kakareka, CISSP, GSNA, GSEC, CEH
> CTO
> Demyo, Inc.
> Miami, FL, USA
> Cell: +1 201 665 6666
> Desk: +1 786 203 3948
> Email: almaz@...yo.com
> Twitter: @DemyoSec <https://twitter.com/#!/demyosec>
> Web: www.demyo.com
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
Regards,
Andrew Terekhov.

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ