We Know The Source (since 1999)
Articles » Overview
Site(2): (1) 2 next >>
Slackware 12 on Acer Aspire 5920g
[PHCN] Tutorials This is my first tutorial about installing a linux distribution. I hope it will help you. A lot of information was taken from here. If you want to contact me, email to 2l8 at phcn point de. Partitioning I recommend using the gparted live cd ...
(1318129 times read) more
[PHCN] Certificated - Official list of certificated Websites and Servers
[PHCN] Certificated Hello Customers, this is the official site of [PHCN] certificated Servers and Services. Only Websites and Servers listed here are official tested and certificated by us. If you see a website not listed here, which uses our certified logo, please...
(110395 times read) more
What is [PHCN] Certificated?
[PHCN] Certificated [PHCN] Certificated is the answer to all security relevant problems of internet servers. It is a simple security scan, of all services that you want to get scanned by [PHCN]. We will check those services for all (at the moment) known security issu...
(98695 times read) more
META REFRESH as a Response Header
[PHCN] Security In this short educational piece, Amit Klein draws the reader's attention to an uncommon way of performing redirection, and its security importance. Note: This isn't a new material, but apparently a lot of people are not familiar with it. The thre...
(95710 times read) more
About [PHCN]
[PHCN] Crew [PHCN] was established in December 1999. We are a group that having fun in programming and most other things one can do with computers. We also love discussions, learning, (digital)art, meeting interesting people and so on... [PHCN] is not public...
(1343578 times read) more
DNS Amplification Attacks
[PHCN] Security This paper outlines a Distributed Denial of Service (DDoS) attack which abuses open recursive Domain Name System (DNS) name servers using spoofed UDP packets. This study is based on packet captures and logs from attacks reported to have a volume o...
(99422 times read) more
How Shellcodes Work
[PHCN] Tutorials LinuxDevCenter.com: How Shellcodes Work      Published on Linux DevCenter (http://www.linuxdevcenter.com/)  http://www.linuxdevcenter.com/pub/a/linux/2006/05/18/how-...
(101548 times read) more
Detecting the Presence of Virtual Machines Using the Local Data Table
[PHCN] Security This paper describes a method for determining the presence of virtual machine emulation in a non-privileged operating environment. This attack is useful for triggering anti-virtualization attacks and evading analysis. We then discuss methods for mi...
(99676 times read) more
Cross Site Cooking
[PHCN] Security There are three fairly interesting flaws in how HTTP cookies were designed and later implemented in various browsers; these shortcomings make it possible (and alarmingly easy) for malicious sites to plant spoofed cookies that will be relayed by unsus...
(100476 times read) more
Hacking with the Google Search Engine
[PHCN] Tutorials Hackers and security experts use various custom and open source tools to complete their tasks. In fact, one of the tools they use you probably use every time you browse the web, the Google Search Engine. Paul remembers the first time he used the G...
(106445 times read) more
Site(2): (1) 2 next >>
Sort for
Date Rate Title
(all categorys)
[PHCN] Advisories
[PHCN] Beta
[PHCN] Certificated
[PHCN] Cheats
[PHCN] Crew
[PHCN] Developer
[PHCN] Driver
[PHCN] Exploits
[PHCN] Global
[PHCN] Hardware
[PHCN] Mircosoft
[PHCN] Other
[PHCN] Security
[PHCN] Shellcodes
[PHCN] Sourcecodes
[PHCN] Tools
[PHCN] Tutorials
[PHCN] Updates
[PHCN] Virus
(all)   A   B   C   D   E   F   G   H   I   J   K   L   M   N   O   P   Q   R   S   T   U   V   W   X   Y   Z   0-9  

Copyright 1999-2018 [PHCN] All rights reserved.
Terms of Use
CCBot/2.0 (http://commoncrawl.org/faq/) | ec2-54-224-108-85.compute-1.amazonaws.com