accept no compromises
Showing 1 - 20 of 20 RSS Feed

Files

code.review.html
Posted Nov 4, 2003

Security Code Review Guidelines

tags | paper
MD5 | 4bf82c2415fb5b160ef4464fab513221
An Overview of Raw Socket Programming with FreeBSD
Posted Jul 20, 2003
Authored by Burebista, clau | Site reversedhell.net

A very thorough and well written paper describing raw socket programming entitled "An overview of raw socket programming with FreeBSD - Chapter I: Transport Control Protocol".

tags | paper, protocol
systems | freebsd
MD5 | 8d1e595108685b4d1e7b615a72861b76
sbfprint.txt
Posted Apr 3, 2003
Authored by Necrose | Site truncode.org

Service Banner Fingerprinting in C - This paper is a supplement to modular's tcpscan series. It covers how to write C programs that will perform banner fingerprinting using various standard servers as examples.

tags | paper
MD5 | a611e0fe3d1b0528e52529097ee21b9f
tcpscan3.txt
Posted Feb 21, 2003
Authored by Modular | Site truncode.org

Coding a TCP Connect Port Scanner Using VLSM - Handbook three in a series. An in-depth beginners tutorial written to explain incorporation of VLSM and CIDR capabilities into a network scanner.

tags | paper, tcp
MD5 | 497a1652d0bfbdeb0b133f040820bf74
coding-with-the-dns-protocol.txt
Posted Sep 15, 2000
Authored by JimJones | Site zsh.interniq.org

Coding with the DNS protocol v2 - Includes DNS basics, How to decode DNS packets by hand, Parsing DNS replies, advanced DNS techniques, and DNS Security Mechanisms. Well written, contains lots of in depth information and example code.

tags | paper, protocol
MD5 | 504a075312f23bbc251cd6ae19242a62
raw_socket.txt
Posted May 22, 2000
Authored by Nitr0gen | Site exile2k.org

Exile 2000 International Coding Team. Documentation about native raw socket programming.

tags | paper
MD5 | 66ad9a564ce65e3f5ef9a81dbaeec425
ElectricFence-2.2.2.tar.gz
Posted Feb 17, 2000
Authored by Bruce Perens | Site perens.com

Electric Fence stops your program on the exact instruction that overruns (or underruns) a malloc() memory buffer. GDB will then display the source-code line that causes the bug. It works by using the virtual-memory hardware to create a red-zone at the border of each buffer - touch that, and your program stops. Catch all of those formerly impossible-to-catch overrun bugs that have been bothering you for years.

Changes: Fixed shared library to be position-independent code.
tags | paper, overflow
MD5 | 56a3cbfdbf65f916988787c789c63e80
EasyTcpIp-lib-0.4.tar.gz
Posted Nov 15, 1999
Authored by Marcelo Gornstein | Site members.xoom.com

Easy TcpIp Library adds basic TCP/UDP/ICMP/IP support to your applications by simply linking it in. You can write servers, clients, send/receive data and send/receive/dump/analyze packets.

Changes: Support for packet-forging, and a major code rewrite.
tags | paper, udp, tcp
MD5 | 6f769030af59d696edd8fa794e05921d
EasyTcpIp-lib-0.2.tar.gz
Posted Oct 22, 1999
Authored by Marcelo Gornstein

Easy TcpIp Library is useful to add basic TCP/IP support to your applications by simply linking it in.

tags | paper, tcp
MD5 | e5d3508c1bf067a6f11a706f50e2882d
1986-loginv12n1.ps
Posted Aug 17, 1999

"How to Write a Setuid Program" M. Bishop

tags | paper
MD5 | feb4509004ac0049c672709cdb69257c
robust.ps
Posted Aug 17, 1999

"Robust Programming" M. Bishop

tags | paper
MD5 | d93bd9d685bafa2ee00cc747ff1eb90b
up2lo.sh
Posted Aug 17, 1999

up2lo - rename files from uppercase to lower case.

tags | paper
MD5 | 1d70f9f94f2d90789e2c8ee6e004c79c
1996-sans-tut.ps
Posted Aug 17, 1999

"UNIX Security: Security in Programming" M. Bishop

tags | paper
systems | unix
MD5 | 3a9965db1801289d035b12c5da311c90
1997-ns97.ps
Posted Aug 17, 1999

"Writing Safe Privileged Programs" M. Bishop

tags | paper
MD5 | 466de5699cc5775be5b7b799ac9b71c2
design.secure.software.html
Posted Aug 17, 1999

Designing secure software

tags | paper
MD5 | 6c7d0f8ae04f0764519ee111ae7cd8ff
secure-faq.html
Posted Aug 17, 1999
Authored by Thamer Al-Herbish

Secure UNIX Programming FAQ v0.5 (html) - This FAQ answers questions about secure programming in the UNIX environment. It is a guide for programmers and not administrators.

tags | paper
systems | unix
MD5 | b57a08195a502bef480eb8471561c74f
secure-faq.txt
Posted Aug 17, 1999
Authored by Thamer Al-Herbish

Secure UNIX Programming FAQ v0.5 (txt) - This FAQ answers questions about secure programming in the UNIX environment. It is a guide for programmers and not administrators.

tags | paper
systems | unix
MD5 | 2bf96c29aad0bf0d6add7f6fd5e5b0ba
soktalk1.8.tar
Posted Aug 17, 1999
Authored by Patrick Lambert

Socket Talk v1.8 Net programming tutorial - If you want to learn how to code with sockets, this is the program for you. Socket Talk is a small development environment to mess with sockets. You can send sockets calls and get help on how to code them. X-Window GUI and command line versions included.

tags | paper
MD5 | f65b729f5853e7351af746994b3214cd
unix.secure.programming.html
Posted Aug 17, 1999

The Unix Secure Programming FAQ

tags | paper
systems | unix
MD5 | 2ced7d2e922521f847623829d2063286
html-colors.html
Posted Aug 17, 1999

A nice explanation of the use of the RGB triplet or color name.

tags | paper
MD5 | d318d45796ef7c0b5a41cbc64b8b5826
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
Child Safety Smartwatches Easy To Hack, Watchdog Says
Posted Oct 18, 2017

tags | headline, privacy, flaw
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Microsoft Never Disclosed 2013 Hack Of Secret Vulnerability Database
Posted Oct 18, 2017

tags | headline, hacker, microsoft, data loss, flaw
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
UK TV Drama About North Korea Hit By Hackers
Posted Oct 17, 2017

tags | headline, hacker, government, britain, cyberwar, korea
Russia Tweaks Telegram With Tiny Fine For Decryption Denial
Posted Oct 17, 2017

tags | headline, government, privacy, russia, cryptography
Never Mind The WPA2 Drama... Details Emerge Of TPM Key Fail
Posted Oct 17, 2017

tags | headline, wireless, flaw, cryptography
Millions Of High Security Crypto Keys Crippled By Newly Discovered Flaw
Posted Oct 16, 2017

tags | headline, flaw, cryptography
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close