Modifying exe's to dll's for firewall bypassModifying exe's to dll's for firewall bypass

well, as it's a cloudy sat morning, i might as well do the next installment in this little series on firewall bypass.let's review what we now know.We have a exe like explorer.exe which the end user tr…

Read more »
14 Feb 2006

Two Way Authentication To Defeat PhishingTwo Way Authentication To Defeat Phishing

Phishing is becoming an increasingly big problem on the net. When the end user receives an email that for all purposes appears genuine and appears to originate from a trusted source, the psychological…

Read more »
14 Feb 2006
 
Top