|
Sign in form |
| | |
[Register now!] [Did you forget your password?]
|
|
|
Store departments |
Subscription
Photoshop Tutorials Electronic versions Aurox Items Club .PRO
|
|
Our magazines |
.psd Photoshop Solutions Hakin9 Linux+ [DVD] Software Developer's Journal
|
|
New Digital Edition |
|
|
|
|
|
|
Attention! |
Attention: as you can see, there are two prices of this subscription. If
you live in Europe, choose the first price (EUR). If you live anywhere
else, choose the second one (USD). |
Contact |
Want to subscribe to our magazines? Call us: +4822 887 14 57 or e-mail us at
subscription@software.com.pl |
Issue specimen | | Magazine: |
ptrace () function - issue: 1/2007 | | Price per issue: |
9.90 EUR
14.99 USD
| Number of copies: |
| Issue content: | -ptrace() function - taking control of a running process
-Shellcodes evolution
-Xpath Injection techniques
-Bybassing kernel 2.6 stack randomness protection
-XSS
-and more
| Want to learn more about the magazine? More information here. |
Issue specimen | | Magazine: |
Fighting malicious code - issue: 2/2006 | | Price per issue: |
9.90 EUR
14.99 USD
| Number of copies: |
| Issue content: | -Hooking technique - fighting malicious code
-IE plugins - useful or dangerous
-Snort in_line- setting a device for particular environment
-Application-layer fingerprinting
-Differential firewall analysis
-and more
| Want to learn more about the magazine? More information here. |
Issue specimen | | Magazine: |
Rootkits under Windows - issue: 1/2006 | | Price per issue: |
9.90 EUR
14.99 USD
| Number of copies: |
| Issue content: |
- rootkits under Windows (how to cope with an intruder in your system)
- network defence (advanced protection against DoS attacks)
- how to cook a covert channel
- cryptography for mail and data
- and many more...
| Want to learn more about the magazine? More information here. |
Issue specimen | | Magazine: |
Anatomy of pharming - issue: 5/2005 | | Price per issue: |
7.50 EUR
9.00 USD
| Number of copies: |
| Issue content: | * Pharming &8211; DNS cache poisoning attacks.
* Voice over IP security &8211; SIP and RTP protocols.
* Exploiting Java VM security vulnerabilities.
* Robot Wars &8211; How Botnets Work.
* Advanced SQL Injection Techniques.
* Linux shellcode optimisation.
* Bad Tools Make Bad Software - an interview with Dan J. Bernstein.
| Want to learn more about the magazine? More information here. |
Issue specimen | | Magazine: |
Bluetooth connection security. - issue: 4/2004 | | Price per issue: |
7.50 EUR
9.00 USD
| Number of copies: |
| Issue content: | * Network steganography – hiding data in TCP/IP headers.
* Recovering data from Linux file systems.
* Dangerous Google – searching for secrets.
* Selected honeypot detection methods.
* Intrusion Detection Systems Internals.
* Outsmarting Windows Personal Firewalls.
* Spam protection methods. | Want to learn more about the magazine? More information here. |
Issue specimen | | Magazine: |
Snooping on Monitor Displays - issue: 3/2005 | | Price per issue: |
7.50 EUR
9.00 USD
| Number of copies: |
| Issue content: | * Removing Spiderwebs - Detecting Illegal Connection Sharing,
* Finding and Exploiting Bugs in PHP Code,
* SQL Injection Attacks with PHP and My SQL,
* Hiding Kernel Modules in Linux,
* TEMPEST - Compromising Emanations,
* OS Fingerprinting - How to Remain Unidentified,
* Honeypots - Worm Traps,
* Protecting Windows Programs from Crackers,
* Physical Security Design.
| Want to learn more about the magazine? More information here. |
Issue specimen | | Magazine: |
Hakin9 - issue: 02/2005 | | Price per issue: |
7.50 EUR
9.00 USD
| Number of copies: |
| Issue content: | The second issue of Hakin9 features
- Java 2 Micro Edition is perceived as a generally safe programming
environment. We will take a look at possible scenarios of attack on
mobile devices using this version of Java.
- Spammers often use poorly secured systems. We teach you how to
protect yourself from them.
- MD5 is probably the most popular hash function – its application
ranges from simple file checksums up to DRM (Digital Rights
Management). It appeared not possible to find a hole in MD5, one has
been found by Chinese scientists.
- If an intruder takes control of our system logs we will not be able
to recreate their actions. The SYSLOG Kernel Tunnel project is
supposed to fill this gap.
- and much more...
| Want to learn more about the magazine? More information here. |
Subscription: Hakin9 | | Subscription price: |
39.00 EUR
49.00 USD
| | Subscription options: | 12 months | number of copies per year: |
6 | Start your subscription from issue number: |
| Number of copies: |
| |
| Hakin9 is a magazine about hacking and IT security, covering
techniques of breaking into computer systems, defence and protection
methods. Our magazine is useful for all those interested in hacking
– both professionals (system administrators, security specialists)
and hobbyists. | Want to learn more about the magazine? More information here |
Subscription: hakin9 + hakin9 StarterKit | | Subscription price: |
69.00 EUR
79.00 USD
| | Subscription options: | 12 months | number of copies per year: |
12 | Start your subscription from issue number: |
| Number of copies: |
| |
| hakin9 (6 issues) and hakin9 StarterKit (6 issues) - both magazines focus on
IT security questions. hakin9 presents in-depht look into advanced hackers
techniques, while starter kit touches generic issues and its an introduction
into IT security world. Subscribe and save $20! | Want to learn more about the magazine? More information here |
Subscription: hakin9 StarterKit | | Subscription price: |
39.00 EUR
49.00 USD
| | Subscription options: | 12 months | number of copies per year: |
6 | Start your subscription from issue number: |
| Number of copies: |
| |
| hakin9 starter kit, 6 issues, bimonthly magazine intended to beginners,
focused on particular IT security problems. | Want to learn more about the magazine? More information here |
Electronic subscription: Hakin9 | | Subscription price: |
49.00 EUR
59.00 USD
| | Subscription options: | 12 months | number of copies per year: |
12 | Start your subscription from issue number: |
| Number of copies: |
| |
| Hakin9 is a magazine about hacking and IT security, covering
techniques of breaking into computer systems, defence and protection
methods. Our magazine is useful for all those interested in hacking
– both professionals (system administrators, security specialists)
and hobbyists.
Order the electronic subscribtion and you will receive a magazine in pdf
version every two months. | Want to learn more about the magazine? More information here |
Electronic version (pdf) | | Magazine: |
Rootkits under Windows - issue: 1/2006 | | Price per issue: |
4.99 EUR
5.99 USD
| Number of copies: |
| Issue content: |
- rootkits under Windows (how to cope with an intruder in your system)
- network defence (advanced protection against DoS attacks)
- how to cook a covert channel
- cryptography for mail and data
- and many more...
| Want to learn more about the magazine? More information here. |
Electronic version (pdf) | | Magazine: |
Anatomy of pharming - issue: 5/2005 | | Price per issue: |
4.00 EUR
5.00 USD
| Number of copies: |
| Issue content: | * Pharming &8211; DNS cache poisoning attacks.
* Voice over IP security &8211; SIP and RTP protocols.
* Exploiting Java VM security vulnerabilities.
* Robot Wars &8211; How Botnets Work.
* Advanced SQL Injection Techniques.
* Linux shellcode optimisation.
* Bad Tools Make Bad Software - an interview with Dan J. Bernstein.
| Want to learn more about the magazine? More information here. |
Electronic version (pdf) | | Magazine: |
Bluetooth connection security. - issue: 4/2004 | | Price per issue: |
4.00 EUR
5.00 USD
| Number of copies: |
| Issue content: | * Network steganography – hiding data in TCP/IP headers.
* Recovering data from Linux file systems.
* Dangerous Google – searching for secrets.
* Selected honeypot detection methods.
* Intrusion Detection Systems Internals.
* Outsmarting Windows Personal Firewalls.
* Spam protection methods. | Want to learn more about the magazine? More information here. |
Electronic version (pdf) | | Magazine: |
Snooping on Monitor Displays - issue: 3/2005 | | Price per issue: |
4.00 EUR
5.00 USD
| Number of copies: |
| Issue content: | Removing Spiderwebs - Detecting Illegal Connection Sharing,
* Finding and Exploiting Bugs in PHP Code,
* SQL Injection Attacks with PHP and My SQL,
* Hiding Kernel Modules in Linux,
* TEMPEST - Compromising Emanations,
* OS Fingerprinting - How to Remain Unidentified,
* Honeypots - Worm Traps,
* Protecting Windows Programs from Crackers,
* Physical Security Design.
| Want to learn more about the magazine? More information here. |
Electronic version (pdf) | | Magazine: |
Hakin9 - issue: 02/2005 | | Price per issue: |
4.00 EUR
5.00 USD
| Number of copies: |
| Issue content: | The second issue of Hakin9 features
- Java 2 Micro Edition is perceived as a generally safe programming
environment. We will take a look at possible scenarios of attack on
mobile devices using this version of Java.
- Spammers often use poorly secured systems. We teach you how to
protect yourself from them.
- MD5 is probably the most popular hash function – its application
ranges from simple file checksums up to DRM (Digital Rights
Management). It appeared not possible to find a hole in MD5, one has
been found by Chinese scientists.
- If an intruder takes control of our system logs we will not be able
to recreate their actions. The SYSLOG Kernel Tunnel project is
supposed to fill this gap.
- and much more...
| Want to learn more about the magazine? More information here. |
Electronic version (pdf) | | Magazine: |
Hakin9 - issue: 01/2005 | | Price per issue: |
4.00 EUR
5.00 USD
| Number of copies: |
| Issue content: |
Hakin9 is a magazine about hacking and IT security, covering techniques of breaking into computer systems, defence and protection methods. Our magazine is useful for all those interested in hacking ? both professionals (system administrators, security specialists) and hobbyists.
Our first English issue takes you deep into the world of IT security. Here's what you'll learn:
- Tomasz Nidecki shows how to analyse e-mail headers in order to expose the true sender, then describes steps necessary in order to prepare and send an abuse report.
- Piotr Tyburski teaches the basics of file, directory and filesystem encryption in Linux. Upon reading this article you should be able to secure all your confidential data in one go.
- Kamil Folga exposes Cisco IOS vulnerabilities and shows how intruders may use them to their advantage.
- Marcin Kurpiewski takes you step by step through a practical pentest, describing all the phases involved and all the tools necessary to perform it.
- Bartosz Wjcik analyses a suspicious Windows-based program advertised in various newsgroups and exposes its true, descructive purpose.
- Marek Janiczek describes the use of reverse engineering in the process of forensic analysis using a practical, real-life example based on his work experience.
- Konstantin Klyagin answers a question whether so-called stealth portscanning is truely undetectable and describes the tools used to expose intruders using such techniques.
This issue will be available in January 2005.
Order the PDF version now and you will receive it as soon as the issue
is released. | Want to learn more about the magazine? More information here. |
|
|
|
gipoco.com
is neither affiliated with the authors of this page or responsible
for its contents. This is a safe-cache copy of the original web site.
gipoco.com
is neither affiliated with the authors of this page nor responsible
for its contents. This is a safe-cache copy of the original web site.