Don Parker

Web Server Defacements (Part 1)

The urban art of grafitti has traversed to the online world in the form of web server defacements. Just how do these online vandals do it though? Read on to learn how it is done, and therefore gain a deeper understanding which will help you defend against it.

The Convergence of Hacking and Security Tools

There is beginning to be a blurring of the lines when it comes to security tools, and hacking tools. Is there really a difference anymore between the two of them at all? This article will detail one specific example of this paradigm "Metasploit Framework". Following this article will be a clear demonstration of this tool in action as well over the course of a three part series.

Social Engineering meets the Bot (Part 1)

All exploits or malware leverage a specific weak link in a program. This is done through various means. Social engineering on the other hand exploits the human link. What though if both an exploit and social engineering were combined? Read on to find out how both worlds collide.

Darwinism Meets the Virus and Worm

Viruses are largely a threat that is contained if one has an anti-virus solution. This begs the question of what then is the next big threat in terms of malware code? The answer to that would be the new, and more lethal worms such as Slammer for one. What would happen though if someone with coding talent were to harness the chaotic world of the worm?

Scroll to Top