Crack Full Disk Encryption - Mafia Security
Methodology of Crack Full Disk Encryption You just turned off your computer and hard drive is fully encrypted you could hand over your laptop to anyone and the information would be perfectly safe; however, that is incorrect. Most security experts ass...
MS DOS A History Tale - Mafia Security
Step by Step Penetration Test - Mafia Security
Top Ten One-Liners from CommandLineFu Explained
Best free stuff, 2013 edition
Free is fine, but free and good is awesome. Check out the best apps, services and software online, for work and play.
Learn to Pick Locks for Fun and an Increased Understanding...
Learning to pick locks is a fun exercise in learning about locking mechanisms, honing a useful skill, and getting a better understanding of how locks work and protect—or fail to protect—you and your stuff. Photo by Lanchongzi. If you've never picked ...
Here is a list of websites we have featured in the past that might come in handy. Remember to set FuckingHomepage.com as your start page if you haven't already. Educational/Learning • khanacademy.org...
HowStuffWorks "The Basics of C Programming"
A computer program is the key to the digital city: If you know the language, you can get a computer to do almost anything you want. Learn how to write computer programs in C.
10 Essential Firefox Plugins for the Infosec Professional...
Daniel Miessler's continuing journey to discover and share the interesting and beautiful things in our world for the purpose of increasing happiness and reducing suffering.
OverAPI.com | Collecting all the cheat sheets
Justin Amash CISPA and FISA - Mafia Security
The stance of Justin Amash CISPA and FISA. Strongly against Justin Amash CISPA and in favor of FISA. Learn why, straight from his own voice.
SharePoint Security Concepts & Application
Cisco Fault Tolerant Network Design
Windows Security Auditing for File Integrity Monitoring
After researched many expensive options and we found out the Windows built-in file integrity monitor would suit our needs for Windows Security Auditing.
Step by Step Metasploit Free Tutorials - Mafia Security
Auditing Cloud Computing - Mafia Security
Keystroke Dynamics Software - Mafia Security
Passwords are the most common form of identification, they are also the weakest. Keystroke Dynamics technology extracts the distinctive characteristics found