Thursday, February 24, 2011
자바스크립트 인기 순위 및 시장 점유율 (2011년 2월)
자바스크립트 인기 순위 및 시장 점유율 (2011년 2월): "인기 순위 TIOBE 언어 인기도 순위에 따르면 자바스크립트의 이번 달 인기 순위는 9위이다. 몇 달전에 10위 밖으로 밀려난 듯 했는데 다시 회복했다. 프레임워크 점유율 웹 기술을 주로 조사하는 W3Techs에 따르면, 아직까지 어떤 프레임워크도 사용하지 않는 웹 사이트가 60% 가량 되고 이 수치는 조금씩 감소하고 있다(링크 참고). 반면 jQuery는 조금씩 성장하여 30%를 넘어서고 있으며 이는 전체 프레임워크에서 [...]"
Wednesday, February 23, 2011
Monday, February 21, 2011
[동영상 묶음 세트] Open Security Training
[동영상 묶음 세트] Open Security Training: "
"
URL 정보 : http://tools.securitytube.net/index.php?title=Open_Security_Training
Objective
We started SecurityTube.net in mid 2008 to serve as a place for sharing knowledge in computer and network security topics. The below videos created by our team over the last 2 years is the first step in that direction. Hope you like them!
Video Series
Exploit Research Megaprimer Series
- Exploit Research Megaprimer Part 1 Introduction by Vivek http://bit.ly/i9gIIm
- Exploit Research Megaprimer Part 2 Memcpy Buffer Overflow Exploitation http://bit.ly/fLmhLu
- Exploit Research Megaprimer Part 3 Strcpy Buffer Overflow Exploitation http://bit.ly/gx3lTU
- Exploit Research Megaprimer Part 4 Minishare Buffer Overflow Exploitation http://bit.ly/gufuCb
- Exploit Research Megaprimer Part 5 FreeSSHD Buffer Overflow http://bit.ly/eVCMB5
- Exploit Research Megaprimer Part 6 SEH Basics http://securitytube.net/Exploit-Research-Megaprimer-Part-6-SEH-Basics-video.aspx
- Exploit Research Megaprimer Part 7 Overwrite SEH http://securitytube.net/Exploit-Research-Megaprimer-Part-7-Overwrite-SEH-video.aspx
- Exploit Research Megaprimer Part 8 Exploiting SEH http://bit.ly/eznTUc
- Exploit Research Megaprimer Part 9 Guest Lecture by Andrew King http://bit.ly/dMo0QI
Assembly Language Primer for Hackers Series (Linux)
- Assembly Primer for Hackers (Part 1) System Organization http://www.securitytube.net/Assembly-Primer-for-Hackers-%28Part-1%29-System-Organization-video.aspx
- Assembly Primer for Hackers (Part 2) Virtual Memory Organization http://www.securitytube.net/Assembly-Primer-for-Hackers-%28Part-2%29-Virtual-Memory-Organization-video.aspx
- Assembly Primer for Hackers (Part 3) GDB Usage Primer http://www.securitytube.net/Assembly-Primer-for-Hackers-%28Part-3%29-GDB-Usage-Primer-video.aspx
- Assembly Primer for Hackers (Part 4) Hello World http://www.securitytube.net/Assembly-Primer-for-Hackers-%28Part-4%29-Hello-World-video.aspx
- Assembly Primer for Hackers (Part 5) Data Types http://www.securitytube.net/Assembly-Primer-for-Hackers-%28Part-5%29-Data-Types-video.aspx
- Assembly Primer for Hackers (Part 6) Moving Data http://securitytube.net/Assembly-Primer-for-Hackers-%28Part-6%29-Moving-Data-video.aspx
- Assembly Primer for Hackers (Part 7) Working with Strings http://securitytube.net/Assembly-Primer-for-Hackers-%28Part-7%29-Working-with-Strings-video.aspx
- Assembly Primer for Hackers (Part 8) Unconditional Branching http://securitytube.net/Assembly-Primer-for-Hackers-%28Part-8%29-Unconditional-Branching-video.aspx
- Assembly Primer for Hackers (Part 9) Conditional Branching http://securitytube.net/Assembly-Primer-for-Hackers-%28Part-9%29-Conditional-Branching-video.aspx
- Assembly Primer for Hackers (Part 10) Functions http://securitytube.net/Assembly-Primer-for-Hackers-%28Part-10%29-Functions-video.aspx
- Assembly Primer for Hackers (Part 11) Functions Stack http://www.securitytube.net/Assembly-Primer-for-Hackers-%28Part-11%29-Functions-Stack-video.aspx
Buffer Overflow Primer for Hackers Series
- Buffer Overflow Primer Part 1 (Smashing the Stack) http://www.securitytube.net/Buffer-Overflow-Primer-Part-1-%28Smashing-the-Stack%29-video.aspx
- Buffer Overflow Primer Part 2 (Writing Exit Shellcode) http://www.securitytube.net/Buffer-Overflow-Primer-Part-2-%28Writing-Exit-Shellcode%29-video.aspx
- Buffer Overflow Primer Part 3 (Executing Shellcode) http://www.securitytube.net/Buffer-Overflow-Primer-Part-3-%28Executing-Shellcode%29-video.aspx
- Buffer Overflow Primer Part 4 (Disassembling Execve) http://www.securitytube.net/Buffer-Overflow-Primer-Part-4-%28Disassembling-Execve%29-video.aspx
- Buffer Overflow Primer Part 5 (Shellcode for Execve) http://www.securitytube.net/Buffer-Overflow-Primer-Part-5-%28Shellcode-for-Execve%29-video.aspx
- Buffer Overflow Primer Part 6 (Exploiting a Program) http://www.securitytube.net/Buffer-Overflow-Primer-Part-6-%28Exploiting-a-Program%29-video.aspx
- Buffer Overflow Primer Part 7 (Exploiting a Program Demo) http://www.securitytube.net/Buffer-Overflow-Primer-Part-7-%28Exploiting-a-Program-Demo%29-video.aspx
- Buffer Overflow Primer Part 8 (Return to Libc Theory) http://www.securitytube.net/Buffer-Overflow-Primer-Part-8-%28Return-to-Libc-Theory%29-video.aspx
- Buffer Overflow Primer Part 9 (Return to Libc Demo) http://www.securitytube.net/Buffer-Overflow-Primer-Part-9-%28Return-to-Libc-Demo%29-video.aspx
Format String Vulnerability Series
- Format String Vulnerabilities Primer (Part 1 The Basics) http://www.securitytube.net/Format-String-Vulnerabilities-Primer-%28Part-1-The-Basics%29-video.aspx
- Format String Vulnerabilities Primer (Part 2 Understanding Format Functions) http://www.securitytube.net/Format-String-Vulnerabilities-Primer-%28Part-2-Understanding-Format-Functions%29-video.aspx
- Format String Vulnerabilities Primer (Part 3 Crashing the Program) http://www.securitytube.net/Format-String-Vulnerabilities-Primer-%28Part-3-Crashing-the-Program%29-video.aspx
- Format String Vulnerabilities Primer (Part 4 Viewing the Stack) http://www.securitytube.net/Format-String-Vulnerabilities-Primer-%28Part-4-Viewing-the-Stack%29-video.aspx
Metasploit Megaprimer Series
- Metasploit Megaprimer (Exploitation Basics and need for Metasploit) Part 1 Tutorial http://securitytube.net/Metasploit-Megaprimer-%28Exploitation-Basics-and-need-for-Metasploit%29-Part-1-video.aspx
- Metasploit Megaprimer (Getting Started with Metasploit) Part 2 Tutorial http://securitytube.net/Metasploit-Megaprimer-%28Getting-Started-with-Metasploit%29-Part-2-video.aspx
- Metasploit Megaprimer Part 3 (Meterpreter Basics and using Stdapi) Tutorial http://securitytube.net/Metasploit-Megaprimer-Part-3-(Meterpreter-Basics-and-using-Stdapi)-video.aspx
- Metasploit Megaprimer Part 4 (Meterpreter Extensions Stdapi and Priv) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-4-%28Meterpreter-Extensions-Stdapi-and-Priv%29-video.aspx
- Metasploit Megaprimer Part 5 (Understanding Windows Tokens and Meterpreter Incognito) Tutorial http://securitytube.net/Metasploit-Megaprimer-Part-5-%28Understanding-Windows-Tokens-and-Meterpreter-Incognito%29-video.aspx
- Metasploit Megaprimer Part 6 (Espia and Sniffer Extensions with Meterpreter Scripts) Tutorial http://securitytube.net/Metasploit-Megaprimer-Part-6-%28Espia-and-Sniffer-Extensions-with-Meterpreter-Scripts%29-video.aspx
- Metasploit Megaprimer Part 7 (Metasploit Database Integration and Automating Exploitation) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-7-%28Metasploit-Database-Integration-and-Automating-Exploitation%29-video.aspx
- Metasploit Megaprimer Part 8 (Post Exploitation Kung Fu) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-8-%28Post-Exploitation-Kung-Fu%29-video.aspx
- Metasploit Megaprimer Part 9 (Post Exploitation Privilege Escalation) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-9-%28Post-Exploitation-Privilege-Escalation%29-video.aspx
- Metasploit Megaprimer Part 10 (Post Exploitation Log Deletion and AV Killing) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-10-%28Post-Exploitation-Log-Deletion-and-AV-Killing%29-video.aspx
- Metasploit Megaprimer Part 11 (Post Exploitation and Stealing Data) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-%28Post-Exploitation-and-Stealing-Data%29-Part-11-video.aspx
- Metasploit Megaprimer Part 12 (Post Exploitation Backdoors and Rootkits) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-12-%28Post-Exploitation-Backdoors-and-Rootkits%29-video.aspx
- Metasploit Megaprimer Part 13 (Post Exploitation Pivoting and Port Forwarding) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-13-%28Post-Exploitation-Pivoting-and-Port-Forwarding%29-video.aspx
- Metasploit Megaprimer Part 14 (Backdooring Executables) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-14-%28Backdooring-Executables%29-video.aspx
- Metasploit Megaprimer Part 15 (Auxiliary Modules) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-15-%28Auxiliary-Modules%29-video.aspx
- Metasploit Megaprimer Part 16 (Pass the Hash Attack) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-16-%28Pass-the-Hash-Attack%29-video.aspx
- Metasploit Megaprimer Part 17 (Scenario Based Hacking) Tutorial http://www.securitytube.net/Metasploit-Megaprimer-Part-17-%28Scenario-Based-Hacking%29-video.aspx
Windows Assembly Language Primer
- Windows Assembly Language Primer Part 1 (Processor Modes) http://securitytube.net/Windows-Assembly-Language-Primer-Part-1-%28Processor-Modes%29-video.aspx
- Windows Assembly Language Primer for Hackers Part 2 (Protected Mode Assembly) http://securitytube.net/Windows-Assembly-Language-Primer-for-Hackers-Part-2-%28Protected-Mode-Assembly%29-video.aspx
- Windows Assembly Language Primer for Hackers Part 3 (Win32 ASM using MASM32) http://securitytube.net/Windows-Assembly-Language-Primer-for-Hackers-Part-3-%28Win32-ASM-using-MASM32%29-video.aspx
- Windows Assembly Language Primer for Hackers Part 4 (MASM Data Types) http://securitytube.net/Windows-Assembly-Language-Primer-for-Hackers-Part-4-%28MASM-Data-Types%29-video.aspx
- Windows Assembly Language Primer for Hackers Part 5 (Procedures) http://securitytube.net/Windows-Assembly-Language-Primer-for-Hackers-Part-5-%28Procedures%29-video.aspx
- Windows Assembly Language Primer for Hackers Part 6 (Macros) http://securitytube.net/Windows-Assembly-Language-Primer-for-Hackers-Part-6-%28Macros%29-video.aspx
- Windows Assembly Language Primer for Hackers Part 7 (Program Control using JMP) http://securitytube.net/Windows-Assembly-Language-Primer-for-Hackers-Part-7-%28Program-Control-using-JMP%29-video.aspx
- Windows Assembly Language Primer for Hackers Part 8 (Decision Directives) http://www.securitytube.net/Windows-Assembly-Language-Primer-for-Hackers-Part-8-%28Decision-Directives%29-video.aspx
- Windows Assembly Language Primer for Hackers Part 9 (Loops) http://www.securitytube.net/Windows-Assembly-Language-Primer-for-Hackers-Part-9-%28Loops%29-video.aspx
Scenario Based Hacking
- Scenario Based Hacking Part 1 (No Patches, No AV, Direct Access) http://securitytube.net/Scenario-Based-Hacking-Part-1-%28No-Patches,-No-AV,-Direct-Access%29-video.aspx
- Scenario Based Hacking Part 2a (No Patches, No AV, Behind NAT) http://securitytube.net/Scenario-Based-Hacking-Part-2a-%28No-Patches,-No-AV,-Behind-NAT%29-video.aspx
- Scenario Based Hacking Part 3 (OS Patched, No AV, Behind NAT) http://securitytube.net/Scenario-Based-Hacking-Part-3-%28OS-Patched,-No-AV,-Behind-NAT%29-video.aspx
- Scenario Based Hacking Part 4 (OS and Software Patched, No AV, Behind NAT) http://securitytube.net/Scenario-Based-Hacking-Part-4-%28OS-and-Software-Patched,-No-AV,-Behind-NAT%29-video.aspx
Router Hacking Series
- Router Hacking Part 1 (The Basics) http://securitytube.net/Router-Hacking-Part-1-%28The-Basics%29-video.aspx
- Router Hacking Part 2 (Service Enumeration, Fingerprinting and Default Accounts) http://securitytube.net/Router-Hacking-Part-2-(Service-Enumeration,-Fingerprinting-and-Default-Accounts)-video.aspx
- Router Hacking Part 3 (Bruteforcing and Dictionary Attacks with Hydra) http://securitytube.net/Router-Hacking-Part-3-(Bruteforcing-and-Dictionary-Attacks-with-Hydra)-video.aspx
- Router Hacking Part 4 (SNMP Attacks using SNMPCheck) http://securitytube.net/Router-Hacking-Part-4-(SNMP-Attacks-using-SNMPCheck)-video.aspx
- Router Hacking Part 5 (SNMP Attacks using SNMPEnum) http://securitytube.net/Router-Hacking-Part-5-(SNMP-Attacks-using-SNMPEnum)-video.aspx
- Router Hacking Part 6 (Dictionary Attack using Metasploit on SNMP) http://www.securitytube.net/Router-Hacking-Part-6-%28Dictionary-Attack-using-Metasploit-on-SNMP%29-video.aspx
Wednesday, February 16, 2011
WebKit Programming in Cocoa
Check out this SlideShare Presentation:
WebKit Programming in Cocoa
View more presentations from Jason Harwig.
Advanced HTML & CSS Techniques for Developing Webkit Mobile Applications
Check out this SlideShare Presentation:
Subscribe to:
Posts (Atom)