Monthly Archives: August 2016

cryptography – CBC MAC

August 31st, 2016 📆 | 4617 Views ⚑

Cryptography To get certificate subscribe: https://www.coursera.org/learn/cryptography ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu ============================ Youtube channel: https://www.youtube.com/user/intrigano ============================ Online courses https://www.facebook.com/cyberassociation/ 2016-08-31 12:03:35

Tagged with:




cryptography – Hex and ASCII

August 31st, 2016 📆 | 4391 Views ⚑

cryptography To get certificate subscribe: https://www.coursera.org/learn/cryptography ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu ============================ Youtube channel: https://www.youtube.com/user/intrigano ============================ Online courses https://www.facebook.com/cyberassociation/ 2016-08-31 08:50:47

Tagged with:




Software security – Pen Testing

August 30th, 2016 📆 | 5767 Views ⚑

software security – Pen Testing To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: ================================== About this course: This

Tagged with:




Software security – Security Requirement

August 30th, 2016 📆 | 6329 Views ⚑

software security – Security Requirement To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: ================================== About this course: This

Tagged with:




Software security – SQL Injection

August 30th, 2016 📆 | 8473 Views ⚑

software security – SQL Injection To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: ================================== About this course: This

Tagged with:




XSS on Tibia.com

August 30th, 2016 📆 | 8081 Views ⚑

It allowed access to the all the victim’s characters in the account. The attacker could also log in them via

Tagged with: