Description Hakin9 Magazine
Of course, we also have a suitable read for the computer geek. Hakin9 magazine provides the reader with knowledge about the methods hackers use to discover and exploit security holes. Of course, this knowledge is not intended to be used by hackers to damage other people's computers.
As older editions are still relevant due to the skills they impart, we also offer them. Unfortunately, we only have limited quantities of all editions in stock and cannot reorder out-of-print editions. If an edition cannot be ordered, it is unfortunately already out of print.
The current issue 6/2008 deals with the following topics:
- Business models of malicious service providers.
- DNS cache poisoning á la Kaminsky.
- Time-memory tradeoff attacks - an introduction.
- Email security and the SMTP protocol.
- XSS worms.
- Installation and encryption of OpenBSD 4.3.
- How dangerous are botnets?
- Anonymous e-mail communication via Mixminion & Co.
- Online searches in the data protection spotlight.
The issue 5/2008 deals with the following topics:
- IPv6 Superworm aka Teredo...
- Apache basic protection...
- Attack detection via user behavior...
- Vulnerabilities in web applications...
- Email security...
- Advanced Encryption Standard AES...
- Further training through security certifications...
- Evolution of IT security...
- EVB-IT...
- When the customer becomes king...
- Speech disorders - networks under attack...
The issue 4/2008 deals with the following topics:
- ISO 27001
- Deletion of hard disks
- Breaking Enterprise Security
- Address Space Layout Randomization
The output 3/2008 deals with the topics:
- Hacker paragraph - They call it security
- NoScript
- Distributed Denial of Service (DDoS) attacks.
- Protocol Hopping Covert Channels.
- SQL Injections - attack vectors and techniques for protection.
- Virtual honeynets with user-mode Linux and VirtualBox.
- Cryptography - An introduction part 3.
- Simple encryption of messages in C++
- OpenVPN - Tunneling
- Data protection
The output 2/2008 deals with the following topics:
-One Time Password - New Dimensions in Security...
-Storming SIP Security...
-Alternate Data Streams or "Doctor Jekyll and Mr. Hyde" move to NTFS...
-Programming with Libpcap - Sniffing the network from our own application...
-Reverse Engineering Binaries...
-The Justification For Authentication and Encryption...
-Writing IPS Rules - Part 4...
-Consumers Test - We help you choose the most reliable firewall...
-Interview: Kurt Seifried - Linux Security Expert...
-Self Exposure by Ben Lynn and Anton Grashion...
The issue 10/2007 deals with the topics:
-Google Hacking Advanced
-VIP Anonymizer
-Effective and reliable spam detection
-BHO&Security
-ELF viruses
-Cross-Site Authentication Attacks
-File Inclusion Attacks
-Detect and avoid security vulnerabilities in time with thread modeling
The output 9/2007 deals with the following topics:
- Windoes Vista Security Features and System Hardening
- Attack through the air: Bluetooth hacking
- Linux Netfilter - packet mangling and applications
- The perfect password
- Secure authentication systems
The output 7-8/2007 deals with the topics:
- The Buh-ba-Bundestrojaner
- CSRF - When the user becomes a target
- Introduction to the methodology of source code analysis
- Firewall HackingGuide
- Stealth Malware - Virtualization Rootkits
- WLAN Security - Attack vectors against WEP, WPA and WPA2
The issue 6/2007 deals with the topics:
- Hacking without traces - Anti-Forensics
- Breaking NATs - Bypassing NAT-based security with standard software
- Forensics after attacks on Linux systems
- Cell phone viruses: A new generation of malware is maturing
- Web Application Firewall - mod_security for Apache
- Self-protection of security software
- Software development and security
- The art of the balancing act for security officers
- Interview with Alexander Geschonneck
- Consumer tests - Security Suite Part 2
The issue 5/2007 deals with the following topics:
- Catching attackers with honeypots
- Security under Mac OS X
- Over the Rainbow
- Advanced code injection into Win32 executables
- Advanced code injection into executable Win32 files
- Hacking SSH - Attacks against the Secure Shell
- Tor - anonymity creates breathing room
- The execution and dangers of WEP cracking
- Interview with Christoph Baumgartner
- Consumer tests - Security Suite
The issue 4/2007 deals with the topics:
- Hardening Linux/BSD systems - an introduction
- Malware in the .NET framework
- Small cores and big worlds
- Cryptography under Windows made easy
- Search engine hacking (dangers through search engines)
- Consumer tests - Firewall tests
- Security of web servers and web services
- Beating Windows at its own game
- Hype 2.0: successive acclaim for Security 2.0
The issue 3/2007 deals with the topics:
- Secure Distributed Computing with the DistQ Framework
- LD_PRELOAD Tricks
- Technical security audits according to OSSTMM
- Runlevel switching via port knocking
- Snort_inline as a solution
The output 2/2007 deals with the topics:
- Ptrace function
- metasploits
- Biometrics
- Host-based intrusion detection
- Fuzzing - the practice
- RFID and chip cards
- Cisco Certified Network Associate Course Part 2
The output 1/2007 deals with the topics:
- Protocol tunneling
- Fuzzing - Part 1: The theory
- Hardening with GRSecurity
- Rootkits
- XSS - Cross-Site Scripting
- Introduction to Xpath Injection Techniques
- The transparent person - what I reveal while surfing...
- XSS - Cross-Site Scripting
The output 6/2006 deals with the topics:
- Extended rights in Citrix environments
- Fingerprinting mechanisms
- Anti-sniffing, privacy and VPN
- Introduction to SNMP
Also on two magazine CDs: new eBooks, e.g: Computer Security and Cryptography v4.0
- Drive Backup 8.0 Paragon
- Exact Image
- Steganos Security Suite 6
The output 5/2006 deals with the topics:
* Rootkits on Windows platforms. We present the leading principles of rootkits and the techniques/tools used by rootkit developers.
* Cryptography for mails and data;
* Application mapping;
* SEC for real-time monitoring of security-relevant logs;
* How to cook a hidden channel;
* Vulnerabilities of antivirus programs;
* Tools, reviews, a feature section, new tutorials and e-books;
The issue 4/2006 deals with the following topics:
* Network defense. We show you how to use sinkhole techniques and how to protect yourself against denial-of-service attacks.
* Analysis of network traffic;
* Hooking-oriented lenght disassembler;
* Doubts about HTTP authentication;
* The security of the IPv6 protocol;
* Social engineering;
* Interwiev with Dr. Lars Packschies, author of the book "Praktische Kryptografie unter Linux";
* Feature article: Why no antivirus software?
* Hacking not only on the net