[Ubuntu-ma] Hakin9 magazine

youssef HMAMI yusuf.hmami at gmail.com
Jeu 26 Mai 15:15:06 UTC 2011


*State-of-the-art Articles on Cloud Security and Access Control in Hakin9
magazine!*



*In May issue*: 7 Articles on Cloud Security  +  Installing Metasploit and
SET on your Apple
iDevice<http://hakin9.org/installing-metasploit-and-set-social-engineer-toolkit-on-your-apple-idevice/>Video
tutorial from Wayne Burke! Explore our website:
www.hakin9.org/en to find out more!



*The June issue* on ACCESS CONTROL. Soon the NEW VIDEO TRAININGS available
for subscribers! Also on 15th of June an additional issue on EXPLOITING
SOFTWARE! Apart from the regular magazine you will get one full issue extra!

You would like to subscribe but you are not sure if it's worth this price?



*TRY US OUT and get 3 issue in the price for 1!*



SUBSCRIBE for one month for $15 + VAT and you will get the NEXT MONTH of
subscription EXTRA!

Instead of 1 issue you will get 2 in the same price. EVEN 3!!! Because on
15th of June we introduce  an additional Extra issue on EXPLOITING SOFTWARE.



USE THIS SPECIAL LINK TO SUBSCRIBE:
http://hakin9.org/subscription/special-promotion/

AND ENTER THE CODE: h4k1N9_OlDus3r



*Don't mis your chance!*

*The code is valid till the end of May!!!*



I*n June Issue you will read on:*



*Stories Section*

10 *A Hole in Your Access Control!*

*by **Ali Al-Shemery*

A couple of days ago I was called out to a do a security audit on a
company’s internal network security and its access control. The audit was
asked to be done on a specific day that the company chose.The reason behind
that was to ensure I get no interference from their Network/System
Administrator. I will not go through the audit process itself but will show
and prove to you how even a well-secured network could be brought (hacked)
down by a single mistake, and why implementing access controls then auditing
them is an important factor to ensure their effectiveness....(read more)(
http://hakin9.org/category/magazine/)



*Attack Section*

*Hacking PlayStation Network*

     Where Risk Management and Reality Collide

*by Simon Walker and Javvad Malik*

There have been many column inches dedicated to the PlayStation Network,
which was taken offline following a breach. It has been a high-profile
incident and has left Sony management red-faced with many questions thrown
at them – not all of which have been answered convincingly. It is simply not
possible to protect against all possible security flaws in a product – but
proper risk assessment at least indicates what these might be and allows an
informed decision. This is important for both companies and for you, the
consumer...(read more)(http://hakin9.org/category/magazine/)



*Defense Section*

26 *Access Control: Lock-down Your Network*

*by Gary S. Milefsky*

If most of the threats are coming from the inside, what are you doing about
it? According to US-CERT (United States Computer Emergency Readiness Team),
95% of downtime and IT related compliance issues are a direct result of an
exploit against a Common Vulnerability and Exposure. A firewall, IDS, IPS,
anti-virus software and other countermeasures don’t look for or show how to
remove CVEs.  So most companies are really only 5% secure...(readmore)(
http://hakin9.org/category/magazine/)



Interested in CROSS PROMOTION or ADVERTISING? We are open for new solutions
and propositions of cooperation – just contact:

Managing Editor: patrycja.przybylowicz at software.com.pl
Marketing Manager: m.bocian at software.com.pl

-- 


*HMAMI Youssef
2eme année Génie Informatique
École Mohammadia d’Ingénieurs
Président du club IT' SECURITY*
*Tel: 06 60 51 48 21/ 06 68 78 50 99
site web: http://www.emi.ac.ma/itsecurity
page facebook:
https://www.facebook.com/pages/It-Security-2011/188812474503150?sk=wall
*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-ma/attachments/20110526/6a264a38/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: issue_06-2011.jpg
Type: image/jpeg
Size: 95250 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-ma/attachments/20110526/6a264a38/attachment-0001.jpg>


Plus d'informations sur la liste de diffusion Ubuntu-ma