[Nix-dev] security - observing changes - example authorizedKeys

ITlook madziak12 at vp.pl
Wed Jul 25 13:50:56 CEST 2012



- Zed Attack Proxy - see what it;s all about!
- Understand how A Wireless (802.11) Probe Request Based Attack works
- How to secure users from Phishing, Smishing & Social Media Attacks
- Cyber war... Is the digital apocalypse approaching?
- Original “security through obscurity" viz. SCADA penetration testing

Find it now in FREE issue of PenTest magazine!
http://pentestmag.com/pentesting-attacks-pentest-free/
-- 
View this message in context: http://old.nabble.com/security---observing-changes---example-authorizedKeys-tp34195366p34209940.html
Sent from the NixOS mailing list archive at Nabble.com.



More information about the nix-dev mailing list