Methods and tools for network security muh

Affiliates: 0,3 $ — how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 0
Refunds: 0

Uploaded: 14.06.2012
Content: 20614191510680.rar (233,85 kB)

Description

The content of the work:
INTRODUCTION 4
1. The common approach to the Networking SAFETY 6
1.1. Classification of network security threats 8
1.2. Information security tools. Classification 12
1.3. The security policy for the enterprise 14
2. BASIC SAFETY TECHNOLOGIES: Corporate Networks 19
2.1. Encryption 19
2.2. Authentication, authorization, audit. 30
2.3. The technology protected channel 37
3. SAFETY OF WINDOWS 2000 41
3.1. Removing BIOS password 42
3.2. Theft SAM-48 file
3.3. Dump the hashes 50
3.4. Capture privilege 54
3.5. Reset Password 55
3.6. Keyloggers 56
3.7. Hacking secondary passwords 57
CONCLUSION 60
APPENDIX 1 61
APPENDIX 2 62

Feedback

0
No feedback yet.
Period
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.com the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)