Binary Image
useful url collection (266 Records)
10 ways to improve MySQL performance
20% of all malware ever created appeared in 2013
27k Pittsburgh hospital employees hit by tax fraud
2k graduate students data lost at John Hopkins
5 reasons the CIO matters more than ever
5 tricks to improve TCP
6 PHP platforms for the small business
700k patients compromised by California hospital
Adobe breach impacts at least 38 million users
Agile Development and Story Mapping
air force LPS lightweight portable security
Amit Yoran Q and A
Analyzing Processes to detect exploitation
android malware
AOL hack lost data on 4 million users
Apache Core Features
Apache Proxy for SSL
Apache Subversion software
apple safari dev center
AppleScript to do Shell Scripts
Auburn University server hacked (14k at risk)
Bash - Update Editor
Bash Commands
Best Browser Extensions that Protect Privacy
best security tools
Bitcoin exchange shutdown because of possible breach
BlackArch Linux for pen testers
Blog - Apple needs infrastructure lesson
Blog - Green Data Center
Blog - Security and the Net
bloomberg business on target breach
Boxee.tv hacked and exposes 158k users
Breach of over 10,000 Utah Food Bank donors
brian krebs movie
bruce schneier - security engineering foreword
Bruce Schneier on Target breach
Burp Suite Pro v1.6 released
California DMV credit card breach
California doctors impacted in Anthem breach
California hospital - missing thumb drive
Choosing the right MySQL HA solution
Citroen breached by ColdFusion flaw
Colorado Valley View Hospital hit by trojan to steal 5,400 patient records
command line kung fu
Compromise Linux with Metasploit JAR backdoor
Cornell University Security Office
Court Ventures, a Experian subsidiary, breached
Create table in 5.6 takes longer then in 5.5
credentials - to be or not to be
cryptocat - an open-source encrypted instant messaging project
Cyber Counterintelligence - from theory to practice
Dark Reading
Data Breach - Ohio Pension Fund
data breach costs
data breaches erode usefulness of personal identifiers
database developer interviews
dealing with data privacy
Denver Colorado's Eagleton elementary school has thumb drive stolen
Determine MySQL DB usage
Do foreign keys matter for insert speed
ea hacked
Educause President and CEO, Diana Oblinger, to retire
Encryption of data at rest in servers
evolution of IT jobs
Executives unaware of risks to enterprise
Experian breach being investigated by United States
Experian data breach
Experian subsidiary, Court Ventures, breach impacts 200 million Americans
Experimenting with Honeypots
Extended events and messing up filters
FBI plans to have 52 million photos in face rec db by next year
FireKeepers investigate potential breach
Firewall tunning on Mac OS X
Florida health employee caught photographing patient data
free php photo gallery
free tool calculates the damage of a cyber attack
Gallery collection on chadmarcum
Gameover ZeuS targets Monster.com
Goshen Hospital hit with malware: 12k people affected
Hackers hit Starbucks mobile customers
hackers target routers
Hard Rock casino hacked
hardening your cacti setup
Harley Medical Group loses data on 480k customers
Hash Kracker tool
HealthSource of Ohio breach: 9k patients affected
HeidiSQL's ssh tunnel rewritten,
HoneyDrive Linux Distro
html resource
HTML table element properties
IE zero day
IE zero day vuln
improve mysql performance and maximize system usage
Instagram Password Decryptor
Internet security incident coordination
into to malware analysis webcasts
iOS hack dubbed Masque Attack II
iptables firewall configuration
iptables introduction
irs staffer risks unencrypted data on 20k workers
Is PCI DSS effective
IT Pros make undocumented changes to systems
IU IT Security and Physical Security
Kaiser Permanente breached since 2011 impacts 5,100 members
key findings from the state of network security 2014
Kim Dotcom to have assets returned
KPMG survey: 4 of 5 health execs say company data has been compromised
Kvasir - Pentesting data management tool
LaCie payment systems breached from 2013 to 2014
Lenovo has massive security risk
Lenovo Superfish security hole
Linux developer, Kay Sievers, banned by Linus Torvalds
Linux Foundation publishes best practices for secure workstation
Linux iptables firewalls
linux vserver virtualization with kernel level isolation
Linux workstation security checklist
linux worm infects over 31,000 devices
Load Balancing with HAProxy
Long Island school district data breach
macports project
Mainframe turns 50, System/360 launched the enterprise IT
Make MS SQL Backups better
malware that changes primary DNS server
Maryland's Service Coordination Inc breached nearly 10k impacted
massive backdoor in routers
Microsoft IE is the most secure web browser
microsoft onenote goes free for mac launch
microsoft sql server 2014 released to manufacturing
Microsoft updates cryptographic cipher suite
Microsoft's Latest Security Intelligence Report
middle eastern hackers use remote access trojan to infect 24k machines
Military STIGs
Milwaukee contractor loses a flash drive compromises 9k
Minneapolis medical assistant fired for accessing patient data
Minneapolis medical assistant fired for accessing patient data
Mozilla hopes to measure security
ms sql modernize db warehouse
MySQL - Update Password
MySQL - Update Syntax
MySQL 5.7 connection information
MySQL 5.7 introduces the ability to set sever side time limits
MySQL ACID
mysql commands
MySQL file limit, table cache, max_connections
MySQL file system performance
MySQL history and features
mysql insert hash
MySQL Join versus key-value stores
MySQL loading unknown CSVs
MySQL or Firebird DBMS
mysql performance schema host summary tables
MySQL performance tuning
MySQL Query Performance Statistics In The Performance Schema
MySQL replication 10 masters and 1 slave
MySQL slashes and backslashes
mysql tools
mysql workbench
MySQL, always use decimal for money
network routing security
Ninja PingU network scanner
NIST Computer Security Division
Norm Coleman, Minnesota Republican senator, campaign data breach
notepad plus plus
nsa hides surveillance software in hard drives
NSA infected 50,000 computer networks with malicious software
nsa quantum project
ohio state names michael hofherr as cio
Open VMS (Open Virtual Memory System)
OpenDNS discusses attacks seen in 2014
OpenSSL Heartbleed
operations security posters
OPM breach for security clearance
oracle doubles the speed of mysql query handling
Overhyping of Iran's Cyberarmy
PCI SSC says SSL is not secure
perl regular expressions
php variables
PHP.net breach
PHP.net compromise aftermath
PHP.net compromised
Pictures on chadmarcum
popular technology site
Powershell local cert store dumping
Princeton Review publishes data - NY Times
Princeton Review publishes sensitive data on 100,000 students
Princeton Review Publishes Sensitive Data Online
purdue security
RAM for the rich and nerdy: 128GB DDR4
Retail CIOs focus on data security
Robert Hannigan to become head of GCHQ
Ross Anderson
ross anderson - security engineering
ruby on rails configuration book
ruby on rails security
Sacramento State server hacked
Saint Louis University falls for phishing
Sally Beauty Breach
sally beauty confirms payment card breach
Sally Beauty confirms second payment card breach
sally beauty credit card breach
Salt keeps server automation simple
Samsung Galaxy S5 fingerprint scanner hacked, PayPal payments at risk
sans checklist for securing mobile devices
sans top 20 critical security controls
SATCOM security is dismal
screen sharing builtin application
secure by design
secure instant messaging
Securing MySQL on Linux
Security - Web Application
Security - Web Application Firewalls
security and privacy site
Security Blog
security is mathematics
security pros need to get creative with pen testing
security research site
security school course catalog
security site
security website
sf mayor gets codes to hijack city network
shell scripts in applescript
simple mysql backup
six dumbest ideas in computer security
smbexec - penetration testing aimed at domain controller
Steven M Bellovin presentations
Tails Linux as used by Bruce Schneier and Edward Snowden
Tails Linux keeps Edward Snowden safe
Tails Linux reaches 1.0 release
Tar Syntax
teen pleads guilty to posting personal student data online
Texas nonprofit risks data on 3k
The state of network security 2014
threat modeling - STRIDE to uncover security flaws
Tiger - UNIX security audit and intrusion detection tool
tool finds elite anonymity L1 proxies
top 10 secure coding practices
Troubleshooting SQL Server connection timeouts
truecrypt encryption software
Trustwave sued over Target data breach
Ubuntu 14.04 lockscreen bypass
UCSF laptop theft - patients compromised
university consortium dedicated to cyber infrastructure
University of Maryland breached again
Unix - system monitoring
Unix system admins
Untangled next generation firewall
us air force LPS operating system
US State Dept still hacked after 3 months
US state dept still hacked after 3 months
useful idiot
VFW hack loses data on 55k veterans
Vi Commands I
Vi Commands II
Vint Cerf talks about creating TCP/IP and secure algorithm
VMware new tech for managing containers and live migration
Web vuln exposes shared links in Dropbox
Website Performance Improvements
What is the point of encryption at rest on servers
who needs an operating system
Windows Heap Overflow Exploit
windows xp attacked 6 times more often then windows 7
windows xp can put compliance at risk
workshop on economics and information security
WPScan - WordPress vulnerability scanner
XHTML div element properties
Yale Information Technology Services
Copyright © 2007-2025 by chad