TheXploit's profile picture. A security blog about computer security, network security, exploit development, rootkits, malware and much more!

TheXploit

@TheXploit

A security blog about computer security, network security, exploit development, rootkits, malware and much more!

Choosing a Good Web Design Team for Your Business goo.gl/fb/OhcwYO #security #general


Sadly I've noticed since removing @CloudFlare from my blog, it's significantly faster. Used to be the other way around. :(


Hah, this sounds like @taosecurity's book RT @bbaskin: "We have a firewall, an IDS, and an IPS! We're good!" bit.ly/1apiYrP


And so the hunt for backdoors begins. Let the paranoia ensue!


Hmm, interesting. If you type git STATUS (all caps) --> fatal: cannot handle STATUS internally


lol --> RT @i0n1c: I always knew that php.net is NSA sponsored...


RT @TheXploit: Book Review: The Practice of Network Security Monitoring by @taosecurity goo.gl/fb/yFSH7 #security #bookreview


Book Review: The Practice of Network Security Monitoring goo.gl/fb/yFSH7 #security #reviews #bookreview


A little over half way through @taosecurity's The Practice of NSM thanks to @nostarch - a little slow at first but picking up nicely.


Got my review copy of "The Practice of Network Security Monitoring" by @taosecurity - looking forward to a great read.


TheXploit أعاد

The 5 most common #hacking methods:

PrometricCyber's tweet image. The 5 most common #hacking methods:

United States الاتجاهات

Loading...

Something went wrong.


Something went wrong.