<![CDATA[Messages posted by "computerline"]]> /hvaonline/posts/listByUser/138964.html JForum - http://www.jforum.net Xin tài liệu về chống dịch ngược mã nguồn

chuonghcm wrote:
Tôi đang thực hiện báo cáo chuyên đề chống dịch ngược mã nguồn bạn nào có tài liệu về phần này cho mình xin với nhé. Xin chân thành cảm ơn nhé. 
Bạn cho mình biết từ khoá bằng tiếng anh "Dịch ngược phần mềm", "Chống dịch ngược phần mềm" là gì ko ?]]>
/hvaonline/posts/preList/45378/279388.html#279388 /hvaonline/posts/preList/45378/279388.html#279388 GMT
Cấu hình máy chạy Windows 64 bit http://www.intel.com/support/processors/tools/piu/sb/cs-014921.htm để check thử xem sao, tại Tab CPU Technonogies nếu mục Intel(R) 64 Architecture có giá trị là Yes thì bác có thể cài đặt đựoc hệ điều hành 64bit ]]> /hvaonline/posts/preList/44271/273460.html#273460 /hvaonline/posts/preList/44271/273460.html#273460 GMT mã nhận dạng theo mã hash : MD5, SHA, CRC Theoretically, you can expect collisions for X around 2^64. For a hash function with an output of n bits, first collisions appear when you have accumulated about 2^(n/2) outputs (it does not matter how you choose the inputs; sequential integer values are nothing special in that respect).  2. Bạn có thể tham khảo thêm về md5 hash collision, sẽ rất lý thú http://cryptography.hyperlink.cz/MD5_collisions.html http://stackoverflow.com/questions/933497/create-your-own-md5-collisions http://stevekrenzel.com/articles/md5-cycles]]> /hvaonline/posts/preList/44230/273210.html#273210 /hvaonline/posts/preList/44230/273210.html#273210 GMT Mọi người giúp em Giải mã đoạn Javascrip này với /hvaonline/posts/preList/44155/273178.html#273178 /hvaonline/posts/preList/44155/273178.html#273178 GMT Mọi người giúp em Giải mã đoạn Javascrip này với <script> ... document.write((function (_0x1995x1,_0x1995x2,_0x1995x3,_0x1995x4,_0x1995x5,_0x1995x6) ...); </script>   ]]> /hvaonline/posts/preList/44155/273156.html#273156 /hvaonline/posts/preList/44155/273156.html#273156 GMT Cần giúp đỡ về việc đồng bộ thời gian giữa client và server http://www.timesynctool.com/, còn bạn cần tìm hiểu xem nguyên nhân vì sao mà máy nó hiển thị thời gian sai, có thể là do hết pin nuôi CMOS, hoặc do phần mềm nào đó làm ảnh hưởng đến việc tính Time của máy]]> /hvaonline/posts/preList/44175/272962.html#272962 /hvaonline/posts/preList/44175/272962.html#272962 GMT Xin tài liệu về bảo vệ, dịch ngược và chống dịch ngược mã nguồn phần m http://ftp.cs.arizona.edu/~debray/Publications/ sẽ có ích cho bạn.]]> /hvaonline/posts/preList/43690/270564.html#270564 /hvaonline/posts/preList/43690/270564.html#270564 GMT Địa chỉ có rất nhiều Tutorial về RE http://thelegendofrandom.com/blog/sample-page, có nhiều Tutorial khá hay, chia sẻ cho bạn nào cần đọc :)]]> /hvaonline/posts/preList/43629/270254.html#270254 /hvaonline/posts/preList/43629/270254.html#270254 GMT Windows Internals Part 2 6th Edition Windows Internals Part 2 6th Edition
Delve inside Windows architecture and internals—and see how core components work behind the scenes. Led by three renowned internals experts, this classic guide is fully updated for Windows 7 and Windows Server 2008 R2—and now presents its coverage in two volumes. As always, you get critical insider perspectives on how Windows operates. And through hands-on experiments, you’ll experience its internal behavior firsthand—knowledge you can apply to improve application design, debugging, system performance, and support. In Part 2, you’ll examine: Core subsystems for I/O, storage, memory management, cache manager, and file systems Startup and shutdown processes Crash-dump analysis, including troubleshooting tools and techniques  
http://www.torrentreactor.net/torrents/5879539/Windows-Internals-Part-2-6th-Edition http://kat.ph/windows-internals-part-2-6th-edition-t6725071.html]]>
/hvaonline/posts/preList/43590/270086.html#270086 /hvaonline/posts/preList/43590/270086.html#270086 GMT
Yêu cầu sách, reupload sách vui lòng đặt câu hỏi ở đây

2009 wrote:
em đang tìm hiểu về linux và cũng đã nghiên cứu được ít nhiều, tuy nhiên em muốn được tìm hiểu kĩ càng về hoạt động của linux trong khi đó cách sách về linux trên mạng hầu như đều dạy về mấy cái triển khai dịch vụ nên em muốn mọi người giới thiệu cho em 1 cuốn về linux. 
Bạn có thể tham khảo một số tài liệu sau: [1] Understanding the Linux Kernel, Third Edition http://rapidshare.com/files/129818710/www_GoonWarez_com_1213349549.zip [2] Linux Kernel Internals 2nd ED http://www.mediafire.com/?zdjgkx7846a5a78 [3] Linux Kernel Development 3rd Edition http://www.mediafire.com/?b003v0qv1zr8a20 [4] Linux Kernel 2.4 Internals http://www.mediafire.com/?f9h46genkvrggvh]]>
/hvaonline/posts/preList/19573/268618.html#268618 /hvaonline/posts/preList/19573/268618.html#268618 GMT
Yêu cầu sách, reupload sách vui lòng đặt câu hỏi ở đây

bienxanhgoisong wrote:
Mình đang cần quyển Concepts of programming languages, 8/e Robert W. Sebesta. Thanks! 
Bản mới nhất là bản 10 nà bạn http://www.mediafire.com/?022cndq48pce8r1]]>
/hvaonline/posts/preList/19573/268617.html#268617 /hvaonline/posts/preList/19573/268617.html#268617 GMT
Hỏi về tấn công wordpress WordPress Auctions Plugin Arbitrary File Upload Vulnerability Code Exploit bạn có thể tham khảo http://1337day.com/exploits/18570 Thông tin về lỗi http://forums.cnet.com/7726-6132_102-5325014.html]]> /hvaonline/posts/preList/43114/268041.html#268041 /hvaonline/posts/preList/43114/268041.html#268041 GMT Tìm hiểu kiến trúc của hđh windows 7&XP phuong_hoang mình thấy bạn chưa nắm được căn bản về hệ điều hành, và có vẻ sử dụng một hệ điều hành cũng chưa thành thạo nữa ! như vậy bạn thậm chí còn không thể hiểu được kiến trúc của nó chứ đừng nói gì đến chuyện viết lên một hệ điều hành. Mình nghĩ nếu bạn phuong_hoang thật sự nghiêm túc và có ý muốn đi sâu vào nghiên cứu HĐH thì bạn cần phải tham khảo nhiều tư liệu, cũng như tập sử dụng thành thạo một hệ điều hành nào đó mà bạn cảm thấy thoải mái nhất ! ]]> /hvaonline/posts/preList/43013/267573.html#267573 /hvaonline/posts/preList/43013/267573.html#267573 GMT Inside Windows Debugging: A Practical Guide to Debugging and Tracing Inside Windows Debugging: A Practical Guide to Debugging and Tracing Strategies in Windows
Use Windows debuggers throughout the development cycle—and build better software Rethink your use of Windows debugging and tracing tools—and learn how to make them a key part of test-driven software development. Led by a member of the Windows Fundamentals Team at Microsoft, you’ll apply expert debugging and tracing techniques—and sharpen your C++ and C# code analysis skills—through practical examples and common scenarios. Learn why experienced developers use debuggers in every step of the development process, and not just when bugs appear. Discover how to: Go behind the scenes to examine how powerful Windows debuggers work Catch bugs early in the development cycle with static and runtime analysis tools Gain practical strategies to tackle the most common code defects Apply expert tricks to handle user-mode and kernel-mode debugging tasks Implement postmortem techniques such as JIT and dump debugging Debug the concurrency and security aspects of your software Use debuggers to analyze interactions between your code and the operating system Analyze software behavior with Xperf and the Event Tracing for Windows (ETW) framework  
http://www.mediafire.com/?ao26d5gox4w5c6r]]>
/hvaonline/posts/preList/43011/267479.html#267479 /hvaonline/posts/preList/43011/267479.html#267479 GMT
Windows Internals, Sixth Edition, Part 1 Windows Internals, Sixth Edition, Part 1
Windows Internals, Sixth Edition is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating systems work internally. With this knowledge, developers can better comprehend the rationale behind design choices when building applications specific to the Windows platform. Such knowledge can also help developers debug complex problems. System administrators can benefit from this information as well, because understanding how the operating system works “under the covers” facilitates understanding the performance behavior of the system and makes troubleshooting system problems much easier when things go wrong. After reading this book, you should have a better understanding of how Windows works and why it behaves as it does.  
http://www.newtorrents.info/torrent/112209/Windows.Internals.Part.1.Covering.Windows.Server.2008.R2.and.Windows.7.6th.Edition.2012.eBook-repackb00k.html?nopop=1]]>
/hvaonline/posts/preList/43010/267475.html#267475 /hvaonline/posts/preList/43010/267475.html#267475 GMT
Developing Drivers with the Windows Driver Foundation Developing Drivers with the Windows Driver Foundation
Start developing robust drivers with expert guidance from the teams who developed Windows Driver Foundation. This comprehensive book gets you up to speed quickly and goes beyond the fundamentals to help you extend your Windows development skills. You get best practices, technical guidance, and extensive code samples to help you master the intricacies of the next-generation driver model—and simplify driver development. Discover how to: Use the Windows Driver Foundation to develop kernel-mode or user-mode drivers Create drivers that support Plug and Play and power management—with minimal code Implement robust I/O handling code Effectively manage synchronization and concurrency in driver code Develop user-mode drivers for protocol-based and serial-bus-based devices Use USB-specific features of the frameworks to quickly develop drivers for USB devices Design and implement kernel-mode drivers for DMA devices Evaluate your drivers with source code analysis and static verification tools Apply best practices to test, debug, and install drivers  
http://www.mediafire.com/?nu97x8nbbxc13bo]]>
/hvaonline/posts/preList/43009/267474.html#267474 /hvaonline/posts/preList/43009/267474.html#267474 GMT
Malware Forensics: Investigating and Analyzing Malicious Code Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. Malware Forensics: Investigating and Analyzing Malicious Code also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics. Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, Malware Forensics: Investigating and Analyzing Malicious Code emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. * Winner of Best Book Bejtlich read in 2008! * http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html * Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader. * First book to detail how to perform "live forensic" techniques on malicous code. * In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter  
http://www.mediafire.com/?5i9o1ubmjhssj23]]>
/hvaonline/posts/preList/43008/267473.html#267473 /hvaonline/posts/preList/43008/267473.html#267473 GMT
Programming Windows Security - Keith Brown
Programming Windows Security - Keith Brown
Windows 2000 and NT offer programmers powerful security tools that few developers use to the fullest -- and many are completely unaware of. In Programming Windows Security, a top Windows security expert shows exactly how to apply them in enterprise applications. Keith Brown starts with a complete roadmap to the Windows 2000 security architecture, describing every component and how they all fit together. He reviews the "actors" in a secure system, including principals, authorities, authentication, domains, and the local security authority; and the role of trust in secure Windows 2000 applications. Developers will understand the security implications of the broader Windows 2000 environment, including logon sessions, tokens, and window stations. Next, Brown introduces Windows 2000 authorization and access control, including groups, aliases, roles, privileges, security descriptors, DACLs and SACLs - showing how to choose the best access strategy for any application. In Part II, he walks developers through using each of Windows 2000's security tools, presenting techniques for building more secure setup programs, using privileges at runtime, working with window stations and user profiles, and using Windows 2000's dramatically changed ACLs. Finally, Brown provides techniques and sample code for network authentication, working with the file system wwwector, using RPC security, and making the most of COM/COM+ security  
http://www.mediafire.com/?ceb505sxnv6in P/S : Cuốn này mình không tìm đựoc bản pdf, bản này chỉ là bản *.doc như là do người ta gõ lại, bạn nào có bản pdf đầy đủ thì cho mình xin link tải nhé ! Thank các bạn !]]>
/hvaonline/posts/preList/42990/267417.html#267417 /hvaonline/posts/preList/42990/267417.html#267417 GMT
Yêu cầu sách, reupload sách vui lòng đặt câu hỏi ở đây

bolzano_1989 wrote:

computerline wrote:
Bạn nào có cuốn The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities có thể cho mình xin link tải được không ? Cảm ơn các bạn ! 
Index of /~zahhar.kirillov/andmeturve  
Thanks bolzano_1989 :) mình tìm chiều giờ chưa được ! ]]>
/hvaonline/posts/preList/19573/267415.html#267415 /hvaonline/posts/preList/19573/267415.html#267415 GMT
Yêu cầu sách, reupload sách vui lòng đặt câu hỏi ở đây The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities có thể cho mình xin link tải được không ? Cảm ơn các bạn !]]> /hvaonline/posts/preList/19573/267410.html#267410 /hvaonline/posts/preList/19573/267410.html#267410 GMT Máy tính chạy chậm http://support.kaspersky.com/downloads/utils/getsysteminfo.zip Xem hướng dẫn tại http://support.kaspersky.com/faq/?qid=193238548]]> /hvaonline/posts/preList/42958/267305.html#267305 /hvaonline/posts/preList/42958/267305.html#267305 GMT Máy tính chạy chậm /hvaonline/posts/preList/42958/267286.html#267286 /hvaonline/posts/preList/42958/267286.html#267286 GMT kiểm tra, theo dõi dung lượng download các máy trong mạng Lan http://technet.microsoft.com/en-us/library/cc180614.aspx]]> /hvaonline/posts/preList/42915/267268.html#267268 /hvaonline/posts/preList/42915/267268.html#267268 GMT Chat,share file trực tiếp giưa 2 máy trên internet (=TCP/IP) NVU có thể đọc bài viết này để hiểu về nguyên lý của BitTorrent, nói Bittorent không có Server là không đúng, nó vẫn phải có một Server làm nhiệm vụ Tracker và đồng bộ dữ liệu giữa các client. http://computer.howstuffworks.com/bittorrent.htm]]> /hvaonline/posts/preList/42534/266980.html#266980 /hvaonline/posts/preList/42534/266980.html#266980 GMT The Rootkit Arsenal 2ed - March 16, 2012 The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, Second Edition
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to:
  • Evade post-mortem analysis Frustrate attempts to reverse engineer your command & control modules Defeat live incident response Undermine the process of memory analysis Modify subsystem internals to feed misinformation to the outside Entrench your code in fortified regions of execution Design and implement covert channels Unearth new avenues of attack
 
http://venom630.free.fr/pdf/The.Rootkit.Arsenal.Escape.and.Evasion.in.the.Dark.Corners.of.the.System,Second.Edition.pdf]]>
/hvaonline/posts/preList/42893/266859.html#266859 /hvaonline/posts/preList/42893/266859.html#266859 GMT
Tấn công lỗ đen trong mạng Ad hoc - black hole attack huyenc500 tham khảo thử : http://www.cse.msu.edu/~wangbo1/ns2/, về bài phân tích tấn công Black Hole thì thấy trên mạng có nhiều lắm mà ! http://acikarsiv.atilim.edu.tr/browse/160/172.pdf http://teal.gmu.edu/courses/ECE636/project/drafts-S04/WN-1_Mehul.pdf http://www.bvucoepune.edu.in/pdf's/Research%20and%20Publication/Research%20Publications_2009-10/International_Conferece9-10/Detection%20and%20Prevention%20Prof%20SB%20Vanjale.pdf ]]> /hvaonline/posts/preList/42873/266726.html#266726 /hvaonline/posts/preList/42873/266726.html#266726 GMT Operating System Concepts, 8th Edition Operating System Concepts, Seventh Edition
Another defining moment in the evolution of operating systems Small footprint operating systems, such as those driving the handheld devices that the baby dinosaurs are using on the cover, are just one of the cutting-edge applications you'll find in Silberschatz, Galvin, and Gagne's Operating System Concepts, Seventh Edition. By staying current, remaining relevant, and adapting to emerging course needs, this market-leading text has continued to define the operating systems course. This Seventh Edition not only presents the latest and most relevant systems, it also digs deeper to uncover those fundamental concepts that have remained constant throughout the evolution of today's operation systems. With this strong conceptual foundation in place, students can more easily understand the details related to specific systems. New Adaptations * Increased coverage of user perspective in Chapter 1. * Increased coverage of OS design throughout. * A new chapter on real-time and embedded systems (Chapter 19). * A new chapter on multimedia (Chapter 20). * Additional coverage of security and protection. * Additional coverage of distributed programming. * New exercises at the end of each chapter. * New programming exercises and projects at the end of each chapter. * New student-focused pedagogy and a new two-color design to enhance the learning process.  
http://www.mediafire.com/?yp3amb6jpnnj5pi]]>
/hvaonline/posts/preList/42862/266615.html#266615 /hvaonline/posts/preList/42862/266615.html#266615 GMT
Enginerring a Compiler, Second Edition Enginerring a Compiler, Second Edition
The proliferation of processors, environments, and constraints on systems has cast compiler technology into a wider variety of settings, changing the compiler and compiler writer's role. No longer is execution speed the sole criterion for judging compiled code. Today, code might be judged on how small it is, how much power it consumes, how well it compresses, or how many page faults it generates. In this evolving environment, the task of building a successful compiler relies upon the compiler writer's ability to balance and blend algorithms, engineering insights, and careful planning. Today's compiler writer must choose a path through a design space that is filled with diverse alternatives, each with distinct costs, advantages, and complexities. Engineering a Compiler explores this design space by presenting some of the ways these problems have been solved, and the constraints that made each of those solutions attractive. By understanding the parameters of the problem and their impact on compiler design, the authors hope to convey both the depth of the problems and the breadth of possible solutions. Their goal is to cover a broad enough selection of material to show readers that real tradeoffs exist, and that the impact of those choices can be both subtle and far-reaching.  
http://www.mediafire.com/?8m2prg75p4hge37]]>
/hvaonline/posts/preList/42861/266614.html#266614 /hvaonline/posts/preList/42861/266614.html#266614 GMT
CS 6V81--005: System Security and Binary Code Analysis chube Đúng là nguồn từ exetools :)]]> /hvaonline/posts/preList/42853/266611.html#266611 /hvaonline/posts/preList/42853/266611.html#266611 GMT CS 6V81--005: System Security and Binary Code Analysis http://www.utdallas.edu/~zhiqiang.lin/spring2012.html Site Mirror: http://www.mediafire.com/?bc4hgab747smtf2]]> /hvaonline/posts/preList/42853/266563.html#266563 /hvaonline/posts/preList/42853/266563.html#266563 GMT