banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Messages posted by: computerline  XML
Profile for computerline Messages posted by computerline [ number of posts not being displayed on this page: 0 ]
 

chuonghcm wrote:
Tôi đang thực hiện báo cáo chuyên đề chống dịch ngược mã nguồn
bạn nào có tài liệu về phần này cho mình xin với nhé. Xin chân thành cảm ơn nhé. 


Bạn cho mình biết từ khoá bằng tiếng anh "Dịch ngược phần mềm", "Chống dịch ngược phần mềm" là gì ko ?
Bác thử sử dụng Intel® Processor Identification Utility http://www.intel.com/support/processors/tools/piu/sb/cs-014921.htm để check thử xem sao, tại Tab CPU Technonogies nếu mục Intel(R) 64 Architecture có giá trị là Yes thì bác có thể cài đặt đựoc hệ điều hành 64bit
Hiện tượng trùng hash được gọi là "hash collision". Các hàm hash như md5, sha, crc là các hàm được thiết kế để nếu chỉ thay đổi bất cứ 1 bít nào trong dữ liệu input thì giá trị hash output sẽ khác, nhưng nó vẫn xảy ra tình trạng collision.

1. Tỷ lệ 1 hash 2 hay nhiều được tính như thế nào ?

Theoretically, you can expect collisions for X around 2^64. For a hash function with an output of n bits, first collisions appear when you have accumulated about 2^(n/2) outputs (it does not matter how you choose the inputs; sequential integer values are nothing special in that respect). 


2. Bạn có thể tham khảo thêm về md5 hash collision, sẽ rất lý thú

http://cryptography.hyperlink.cz/MD5_collisions.html
http://stackoverflow.com/questions/933497/create-your-own-md5-collisions
http://stevekrenzel.com/articles/md5-cycles
^_^ Chỉ là gợi ý cho mấy bạn ý một xíu thui mà
eval(...) --> document.write(...)


<script>
...
document.write((function (_0x1995x1,_0x1995x2,_0x1995x3,_0x1995x4,_0x1995x5,_0x1995x6) ...);
</script>
 
Giải pháp tình thế là bạn có thể cài một phần mềm để nó tự đồng bộ Time với máy chủ Time Sever trên mạng, bạn có thể thử dùng phần mềm này http://www.timesynctool.com/, còn bạn cần tìm hiểu xem nguyên nhân vì sao mà máy nó hiển thị thời gian sai, có thể là do hết pin nuôi CMOS, hoặc do phần mềm nào đó làm ảnh hưởng đến việc tính Time của máy
Bạn có thể tham khảo những bài luận trên trang này http://ftp.cs.arizona.edu/~debray/Publications/ sẽ có ích cho bạn.
Vừa tìm thấy trang này http://thelegendofrandom.com/blog/sample-page, có nhiều Tutorial khá hay, chia sẻ cho bạn nào cần đọc smilie
Windows Internals Part 2 6th Edition





Delve inside Windows architecture and internals—and see how core components work behind the scenes. Led by three renowned internals experts, this classic guide is fully updated for Windows 7 and Windows Server 2008 R2—and now presents its coverage in two volumes.

As always, you get critical insider perspectives on how Windows operates. And through hands-on experiments, you’ll experience its internal behavior firsthand—knowledge you can apply to improve application design, debugging, system performance, and support.

In Part 2, you’ll examine:

Core subsystems for I/O, storage, memory management, cache manager, and file systems
Startup and shutdown processes
Crash-dump analysis, including troubleshooting tools and techniques
 


http://www.torrentreactor.net/torrents/5879539/Windows-Internals-Part-2-6th-Edition
http://kat.ph/windows-internals-part-2-6th-edition-t6725071.html

2009 wrote:
em đang tìm hiểu về linux và cũng đã nghiên cứu được ít nhiều, tuy nhiên em muốn được tìm hiểu kĩ càng về hoạt động của linux trong khi đó cách sách về linux trên mạng hầu như đều dạy về mấy cái triển khai dịch vụ nên em muốn mọi người giới thiệu cho em 1 cuốn về linux. 


Bạn có thể tham khảo một số tài liệu sau:

[1] Understanding the Linux Kernel, Third Edition http://rapidshare.com/files/129818710/www_GoonWarez_com_1213349549.zip
[2] Linux Kernel Internals 2nd ED http://www.mediafire.com/?zdjgkx7846a5a78
[3] Linux Kernel Development 3rd Edition http://www.mediafire.com/?b003v0qv1zr8a20
[4] Linux Kernel 2.4 Internals http://www.mediafire.com/?f9h46genkvrggvh

bienxanhgoisong wrote:
Mình đang cần quyển Concepts of programming languages, 8/e Robert W. Sebesta.
Thanks! 


Bản mới nhất là bản 10 nà bạn http://www.mediafire.com/?022cndq48pce8r1
Có người đang cố gắng khai thác bug trên site của bạn qua lỗi WordPress Auctions Plugin Arbitrary File Upload Vulnerability

Code Exploit bạn có thể tham khảo http://1337day.com/exploits/18570

Thông tin về lỗi http://forums.cnet.com/7726-6132_102-5325014.html
Đọc qua câu hỏi và trả lời của bạn phuong_hoang mình thấy bạn chưa nắm được căn bản về hệ điều hành, và có vẻ sử dụng một hệ điều hành cũng chưa thành thạo nữa ! như vậy bạn thậm chí còn không thể hiểu được kiến trúc của nó chứ đừng nói gì đến chuyện viết lên một hệ điều hành. Mình nghĩ nếu bạn phuong_hoang thật sự nghiêm túc và có ý muốn đi sâu vào nghiên cứu HĐH thì bạn cần phải tham khảo nhiều tư liệu, cũng như tập sử dụng thành thạo một hệ điều hành nào đó mà bạn cảm thấy thoải mái nhất !
Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows





Use Windows debuggers throughout the development cycle—and build better software

Rethink your use of Windows debugging and tracing tools—and learn how to make them a key part of test-driven software development. Led by a member of the Windows Fundamentals Team at Microsoft, you’ll apply expert debugging and tracing techniques—and sharpen your C++ and C# code analysis skills—through practical examples and common scenarios. Learn why experienced developers use debuggers in every step of the development process, and not just when bugs appear.

Discover how to:

Go behind the scenes to examine how powerful Windows debuggers work
Catch bugs early in the development cycle with static and runtime analysis tools
Gain practical strategies to tackle the most common code defects
Apply expert tricks to handle user-mode and kernel-mode debugging tasks
Implement postmortem techniques such as JIT and dump debugging
Debug the concurrency and security aspects of your software
Use debuggers to analyze interactions between your code and the operating system
Analyze software behavior with Xperf and the Event Tracing for Windows (ETW) framework
 

http://www.mediafire.com/?ao26d5gox4w5c6r
Windows Internals, Sixth Edition, Part 1




Windows Internals, Sixth Edition is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating systems work internally. With this knowledge, developers can better comprehend the rationale behind design choices when building applications specific to the Windows platform. Such knowledge can also help developers debug complex problems. System administrators can benefit from this information as well, because understanding how the operating system works “under the covers” facilitates understanding the performance behavior of the system and makes troubleshooting system problems much easier when things go wrong. After reading this book, you should have a better understanding of how Windows works and why it behaves as it does.
 


http://www.newtorrents.info/torrent/112209/Windows.Internals.Part.1.Covering.Windows.Server.2008.R2.and.Windows.7.6th.Edition.2012.eBook-repackb00k.html?nopop=1
Developing Drivers with the Windows Driver Foundation




Start developing robust drivers with expert guidance from the teams who developed Windows Driver Foundation. This comprehensive book gets you up to speed quickly and goes beyond the fundamentals to help you extend your Windows development skills. You get best practices, technical guidance, and extensive code samples to help you master the intricacies of the next-generation driver model—and simplify driver development.

Discover how to:

Use the Windows Driver Foundation to develop kernel-mode or user-mode drivers
Create drivers that support Plug and Play and power management—with minimal code
Implement robust I/O handling code
Effectively manage synchronization and concurrency in driver code
Develop user-mode drivers for protocol-based and serial-bus-based devices
Use USB-specific features of the frameworks to quickly develop drivers for USB devices
Design and implement kernel-mode drivers for DMA devices
Evaluate your drivers with source code analysis and static verification tools
Apply best practices to test, debug, and install drivers
 


http://www.mediafire.com/?nu97x8nbbxc13bo
Malware Forensics: Investigating and Analyzing Malicious Code





Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system.
Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, Malware Forensics: Investigating and Analyzing Malicious Code emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more.

* Winner of Best Book Bejtlich read in 2008!
* http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.
* First book to detail how to perform "live forensic" techniques on malicous code.
* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

 


http://www.mediafire.com/?5i9o1ubmjhssj23



Programming Windows Security - Keith Brown


Windows 2000 and NT offer programmers powerful security tools that few developers use to the fullest -- and many are completely unaware of. In Programming Windows Security, a top Windows security expert shows exactly how to apply them in enterprise applications. Keith Brown starts with a complete roadmap to the Windows 2000 security architecture, describing every component and how they all fit together. He reviews the "actors" in a secure system, including principals, authorities, authentication, domains, and the local security authority; and the role of trust in secure Windows 2000 applications. Developers will understand the security implications of the broader Windows 2000 environment, including logon sessions, tokens, and window stations. Next, Brown introduces Windows 2000 authorization and access control, including groups, aliases, roles, privileges, security descriptors, DACLs and SACLs - showing how to choose the best access strategy for any application. In Part II, he walks developers through using each of Windows 2000's security tools, presenting techniques for building more secure setup programs, using privileges at runtime, working with window stations and user profiles, and using Windows 2000's dramatically changed ACLs. Finally, Brown provides techniques and sample code for network authentication, working with the file system wwwector, using RPC security, and making the most of COM/COM+ security
 


http://www.mediafire.com/?ceb505sxnv6in

P/S : Cuốn này mình không tìm đựoc bản pdf, bản này chỉ là bản *.doc như là do người ta gõ lại, bạn nào có bản pdf đầy đủ thì cho mình xin link tải nhé ! Thank các bạn !

bolzano_1989 wrote:

computerline wrote:
Bạn nào có cuốn The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities có thể cho mình xin link tải được không ?

Cảm ơn các bạn ! 


Index of /~zahhar.kirillov/andmeturve
 


Thanks bolzano_1989 smilie mình tìm chiều giờ chưa được !
Bạn nào có cuốn The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities có thể cho mình xin link tải được không ?

Cảm ơn các bạn !
Bạn chạy công cụ này để lấy log rồi gởi lên nha : http://support.kaspersky.com/downloads/utils/getsysteminfo.zip

Xem hướng dẫn tại http://support.kaspersky.com/faq/?qid=193238548
Nên kiểm tra ổ đĩa xem có bị bad sector không, dùng phần mềm trong Hirent kiểm tra thử tốc độ đọc ghi của ổ đĩa như thế nào. Nếu không có vấn đề gì thì test thử RAM coi
Remote Packet Sniffing thì mình thấy có bài viết này, nói chung là vẫn phải cài đặt một cái gì đó ở máy muốn capture http://technet.microsoft.com/en-us/library/cc180614.aspx
Bạn NVU có thể đọc bài viết này để hiểu về nguyên lý của BitTorrent, nói Bittorent không có Server là không đúng, nó vẫn phải có một Server làm nhiệm vụ Tracker và đồng bộ dữ liệu giữa các client.

http://computer.howstuffworks.com/bittorrent.htm
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, Second Edition





While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.

The range of topics presented includes how to:

  • Evade post-mortem analysis
  • Frustrate attempts to reverse engineer your command & control modules
  • Defeat live incident response
  • Undermine the process of memory analysis
  • Modify subsystem internals to feed misinformation to the outside
  • Entrench your code in fortified regions of execution
  • Design and implement covert channels
  • Unearth new avenues of attack


 


http://venom630.free.fr/pdf/The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf
Không rành về Mobile Security, nhưng thấy ở đây có hướng dẫn sử dụng NS2, bác huyenc500 tham khảo thử : http://www.cse.msu.edu/~wangbo1/ns2/, về bài phân tích tấn công Black Hole thì thấy trên mạng có nhiều lắm mà !

http://acikarsiv.atilim.edu.tr/browse/160/172.pdf
http://teal.gmu.edu/courses/ECE636/project/drafts-S04/WN-1_Mehul.pdf
http://www.bvucoepune.edu.in/pdf's/Research%20and%20Publication/Research%20Publications_2009-10/International_Conferece9-10/Detection%20and%20Prevention%20Prof%20SB%20Vanjale.pdf
Operating System Concepts, Seventh Edition





Another defining moment in the evolution of operating systems
Small footprint operating systems, such as those driving the handheld devices that the baby dinosaurs are using on the cover, are just one of the cutting-edge applications you'll find in Silberschatz, Galvin, and Gagne's Operating System Concepts, Seventh Edition.
By staying current, remaining relevant, and adapting to emerging course needs, this market-leading text has continued to define the operating systems course. This Seventh Edition not only presents the latest and most relevant systems, it also digs deeper to uncover those fundamental concepts that have remained constant throughout the evolution of today's operation systems. With this strong conceptual foundation in place, students can more easily understand the details related to specific systems.
New Adaptations
* Increased coverage of user perspective in Chapter 1.
* Increased coverage of OS design throughout.
* A new chapter on real-time and embedded systems (Chapter 19).
* A new chapter on multimedia (Chapter 20).
* Additional coverage of security and protection.
* Additional coverage of distributed programming.
* New exercises at the end of each chapter.
* New programming exercises and projects at the end of each chapter.
* New student-focused pedagogy and a new two-color design to enhance the learning process.
 


http://www.mediafire.com/?yp3amb6jpnnj5pi
Sách khá hàn lâm, nhưng đọc sẽ có ích smilie

Enginerring a Compiler, Second Edition




The proliferation of processors, environments, and constraints on systems has cast compiler technology into a wider variety of settings, changing the compiler and compiler writer's role. No longer is execution speed the sole criterion for judging compiled code. Today, code might be judged on how small it is, how much power it consumes, how well it compresses, or how many page faults it generates. In this evolving environment, the task of building a successful compiler relies upon the compiler writer's ability to balance and blend algorithms, engineering insights, and careful planning. Today's compiler writer must choose a path through a design space that is filled with diverse alternatives, each with distinct costs, advantages, and complexities.

Engineering a Compiler explores this design space by presenting some of the ways these problems have been solved, and the constraints that made each of those solutions attractive. By understanding the parameters of the problem and their impact on compiler design, the authors hope to convey both the depth of the problems and the breadth of possible solutions. Their goal is to cover a broad enough selection of material to show readers that real tradeoffs exist, and that the impact of those choices can be both subtle and far-reaching.
 


http://www.mediafire.com/?8m2prg75p4hge37
chube Đúng là nguồn từ exetools smilie
Vừa tìm được Course này khá hay, bạn nào có hứng thú có thể tải về tham khảo smilie

http://www.utdallas.edu/~zhiqiang.lin/spring2012.html

Site Mirror:

http://www.mediafire.com/?bc4hgab747smtf2
 
Go to Page:  2 3 4 Page 5 Last Page

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|