spacer
spacer On-line store spacer
spacer    spacer    spacer    spacer    spacer    spacer    spacer   
spacer Main page spacer Subscription spacer Sign up spacer Cart spacer Help
spacer spacer spacer spacer spacer
 
Sign in form

[Register now!]
[Did you forget your password?]
spacer
Store departments

spacer Subscription

spacer Photoshop Tutorials

spacer Electronic versions

spacer Aurox

spacer Items

spacer Club .PRO

spacer
Our magazines

spacer .psd Photoshop Solutions

spacer Hakin9

spacer Linux+ [DVD]

spacer Software Developer's Journal

spacer
New Digital Edition
spacer

spacer

spacer
spacer
spacer
Attention!

Attention: as you can see, there are two prices of this subscription. If you live in Europe, choose the first price (EUR). If you live anywhere else, choose the second one (USD).

Contact

Want to subscribe to our magazines? Call us: +4822 887 14 57 or e-mail us at subscription@software.com.pl

Issue specimen  
spacer

Magazine:

ptrace () function - issue: 1/2007

spacer

Price per issue:

9.90 EUR
14.99 USD

Number of copies:

Issue content:

-ptrace() function - taking control of a running process
-Shellcodes evolution
-Xpath Injection techniques
-Bybassing kernel 2.6 stack randomness protection
-XSS
-and more

Want to learn more about the magazine? More information here.

Issue specimen  
spacer

Magazine:

Fighting malicious code - issue: 2/2006

spacer

Price per issue:

9.90 EUR
14.99 USD

Number of copies:

Issue content:

-Hooking technique - fighting malicious code
-IE plugins - useful or dangerous
-Snort in_line- setting a device for particular environment
-Application-layer fingerprinting
-Differential firewall analysis
-and more

Want to learn more about the magazine? More information here.

Issue specimen  
spacer

Magazine:

Rootkits under Windows - issue: 1/2006

spacer

Price per issue:

9.90 EUR
14.99 USD

Number of copies:

Issue content:

  • rootkits under Windows (how to cope with an intruder in your system)
  • network defence (advanced protection against DoS attacks)
  • how to cook a covert channel
  • cryptography for mail and data
  • and many more...

Want to learn more about the magazine? More information here.

Issue specimen  
spacer

Magazine:

Anatomy of pharming - issue: 5/2005

spacer

Price per issue:

7.50 EUR
9.00 USD

Number of copies:

Issue content:

* Pharming &8211; DNS cache poisoning attacks.
* Voice over IP security &8211; SIP and RTP protocols.
* Exploiting Java VM security vulnerabilities.
* Robot Wars &8211; How Botnets Work.
* Advanced SQL Injection Techniques.
* Linux shellcode optimisation.
* Bad Tools Make Bad Software - an interview with Dan J. Bernstein.

Want to learn more about the magazine? More information here.

Issue specimen  
spacer

Magazine:

Bluetooth connection security. - issue: 4/2004

spacer

Price per issue:

7.50 EUR
9.00 USD

Number of copies:

Issue content:

* Network steganography – hiding data in TCP/IP headers.
* Recovering data from Linux file systems.
* Dangerous Google – searching for secrets.
* Selected honeypot detection methods.
* Intrusion Detection Systems Internals.
* Outsmarting Windows Personal Firewalls.
* Spam protection methods.

Want to learn more about the magazine? More information here.

Issue specimen  
spacer

Magazine:

Snooping on Monitor Displays - issue: 3/2005

spacer

Price per issue:

7.50 EUR
9.00 USD

Number of copies:

Issue content:

* Removing Spiderwebs - Detecting Illegal Connection Sharing,
* Finding and Exploiting Bugs in PHP Code,
* SQL Injection Attacks with PHP and My SQL,
* Hiding Kernel Modules in Linux,
* TEMPEST - Compromising Emanations,
* OS Fingerprinting - How to Remain Unidentified,
* Honeypots - Worm Traps,
* Protecting Windows Programs from Crackers,
* Physical Security Design.

Want to learn more about the magazine? More information here.

Issue specimen  
spacer

Magazine:

Hakin9 - issue: 02/2005

spacer

Price per issue:

7.50 EUR
9.00 USD

Number of copies:

Issue content:

The second issue of Hakin9 features

  • Java 2 Micro Edition is perceived as a generally safe programming environment. We will take a look at possible scenarios of attack on mobile devices using this version of Java.
  • Spammers often use poorly secured systems. We teach you how to protect yourself from them.
  • MD5 is probably the most popular hash function – its application ranges from simple file checksums up to DRM (Digital Rights Management). It appeared not possible to find a hole in MD5, one has been found by Chinese scientists.
  • If an intruder takes control of our system logs we will not be able to recreate their actions. The SYSLOG Kernel Tunnel project is supposed to fill this gap.
  • and much more...

Want to learn more about the magazine? More information here.

Subscription: Hakin9
spacer

Subscription price:

39.00 EUR
49.00 USD

Subscription options:

12 months

number of copies per year:

6

Start your subscription from issue number:

Number of copies:

 

Hakin9 is a magazine about hacking and IT security, covering techniques of breaking into computer systems, defence and protection methods. Our magazine is useful for all those interested in hacking – both professionals (system administrators, security specialists) and hobbyists.

Want to learn more about the magazine? More information here

Subscription: hakin9 + hakin9 StarterKit
spacer

Subscription price:

69.00 EUR
79.00 USD

Subscription options:

12 months

number of copies per year:

12

Start your subscription from issue number:

Number of copies:

 

hakin9 (6 issues) and hakin9 StarterKit (6 issues) - both magazines focus on IT security questions. hakin9 presents in-depht look into advanced hackers techniques, while starter kit touches generic issues and its an introduction into IT security world. Subscribe and save $20!

Want to learn more about the magazine? More information here

Subscription: hakin9 StarterKit
spacer

Subscription price:

39.00 EUR
49.00 USD

Subscription options:

12 months

number of copies per year:

6

Start your subscription from issue number:

Number of copies:

 

hakin9 starter kit, 6 issues, bimonthly magazine intended to beginners, focused on particular IT security problems.

Want to learn more about the magazine? More information here

Electronic subscription: Hakin9
spacer

Subscription price:

49.00 EUR
59.00 USD

Subscription options:

12 months

number of copies per year:

12

Start your subscription from issue number:

Number of copies:

 

Hakin9 is a magazine about hacking and IT security, covering techniques of breaking into computer systems, defence and protection methods. Our magazine is useful for all those interested in hacking – both professionals (system administrators, security specialists) and hobbyists.

Order the electronic subscribtion and you will receive a magazine in pdf version every two months.

Want to learn more about the magazine? More information here

Electronic version (pdf)  
spacer

Magazine:

Rootkits under Windows - issue: 1/2006

Price per issue:

4.99 EUR
5.99 USD

Number of copies:

Issue content:

  • rootkits under Windows (how to cope with an intruder in your system)
  • network defence (advanced protection against DoS attacks)
  • how to cook a covert channel
  • cryptography for mail and data
  • and many more...

Want to learn more about the magazine? More information here.

Electronic version (pdf)  
spacer

Magazine:

Anatomy of pharming - issue: 5/2005

Price per issue:

4.00 EUR
5.00 USD

Number of copies:

Issue content:

* Pharming &8211; DNS cache poisoning attacks.
* Voice over IP security &8211; SIP and RTP protocols.
* Exploiting Java VM security vulnerabilities.
* Robot Wars &8211; How Botnets Work.
* Advanced SQL Injection Techniques.
* Linux shellcode optimisation.
* Bad Tools Make Bad Software - an interview with Dan J. Bernstein.

Want to learn more about the magazine? More information here.

Electronic version (pdf)  
spacer

Magazine:

Bluetooth connection security. - issue: 4/2004

Price per issue:

4.00 EUR
5.00 USD

Number of copies:

Issue content:

* Network steganography – hiding data in TCP/IP headers.
* Recovering data from Linux file systems.
* Dangerous Google – searching for secrets.
* Selected honeypot detection methods.
* Intrusion Detection Systems Internals.
* Outsmarting Windows Personal Firewalls.
* Spam protection methods.

Want to learn more about the magazine? More information here.

Electronic version (pdf)  
spacer

Magazine:

Snooping on Monitor Displays - issue: 3/2005

Price per issue:

4.00 EUR
5.00 USD

Number of copies:

Issue content:

Removing Spiderwebs - Detecting Illegal Connection Sharing,
* Finding and Exploiting Bugs in PHP Code,
* SQL Injection Attacks with PHP and My SQL,
* Hiding Kernel Modules in Linux,
* TEMPEST - Compromising Emanations,
* OS Fingerprinting - How to Remain Unidentified,
* Honeypots - Worm Traps,
* Protecting Windows Programs from Crackers,
* Physical Security Design.

Want to learn more about the magazine? More information here.

Electronic version (pdf)  
spacer

Magazine:

Hakin9 - issue: 02/2005

Price per issue:

4.00 EUR
5.00 USD

Number of copies:

Issue content:

The second issue of Hakin9 features

  • Java 2 Micro Edition is perceived as a generally safe programming environment. We will take a look at possible scenarios of attack on mobile devices using this version of Java.
  • Spammers often use poorly secured systems. We teach you how to protect yourself from them.
  • MD5 is probably the most popular hash function – its application ranges from simple file checksums up to DRM (Digital Rights Management). It appeared not possible to find a hole in MD5, one has been found by Chinese scientists.
  • If an intruder takes control of our system logs we will not be able to recreate their actions. The SYSLOG Kernel Tunnel project is supposed to fill this gap.
  • and much more...

Want to learn more about the magazine? More information here.

Electronic version (pdf)  
spacer

Magazine:

Hakin9 - issue: 01/2005

Price per issue:

4.00 EUR
5.00 USD

Number of copies:

Issue content:

Hakin9 is a magazine about hacking and IT security, covering techniques of breaking into computer systems, defence and protection methods. Our magazine is useful for all those interested in hacking ? both professionals (system administrators, security specialists) and hobbyists.

Our first English issue takes you deep into the world of IT security. Here's what you'll learn:

  • Tomasz Nidecki shows how to analyse e-mail headers in order to expose the true sender, then describes steps necessary in order to prepare and send an abuse report.
  • Piotr Tyburski teaches the basics of file, directory and filesystem encryption in Linux. Upon reading this article you should be able to secure all your confidential data in one go.
  • Kamil Folga exposes Cisco IOS vulnerabilities and shows how intruders may use them to their advantage.
  • Marcin Kurpiewski takes you step by step through a practical pentest, describing all the phases involved and all the tools necessary to perform it.
  • Bartosz Wjcik analyses a suspicious Windows-based program advertised in various newsgroups and exposes its true, descructive purpose.
  • Marek Janiczek describes the use of reverse engineering in the process of forensic analysis using a practical, real-life example based on his work experience.
  • Konstantin Klyagin answers a question whether so-called stealth portscanning is truely undetectable and describes the tools used to expose intruders using such techniques.

This issue will be available in January 2005. Order the PDF version now and you will receive it as soon as the issue is released.

Want to learn more about the magazine? More information here.

 
Your cart:<">
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.