In this lesson, the class read, Chapter Seven "Phase 3:Graining Access Using Applications and Operating System Attacks". We learned about more tools on how hackers could have access to our computer systems and servers.
http://www.frsirt.com/exploiots/
http://securityfocus.com/
http://www.metaspoloit.com/download/
Subscribe to:
Post Comments (Atom)

My calendars
No comments:
Post a Comment