Computers do not solve problems, they execute solutions.- Unknown
Language: Experience:
Order by: Name Level Entrances
Currently, There are 333 Article in the DB.

Data Encryption Techniques. R. E. Frazier. EN 1131
CSRF - Cross-Site Request Forgery owasp EN 1426
CryptoBytes Dan Boneh & Hovav Shacham EN 1265
Cross-Site Request Forgeries FENiX EN 1158
Cross-Platform Security. Jay Shaw. EN 1175
Cross Site Request Forgeries Chris Shiflett EN 1357
CRLF Injection Attacks Al Berg EN,289483,sid14_gci11... 2404
CRLF Injection Attack. Acunetix. EN 1298
CRLF Injection Attack Acunetix EN 1365
CRLF Injection Ulf Harnhammar. EN 1282
Create function polymorphism in C Miguel Bazdresch EN 1180
Create a secure Linux-based wireless access point Manolis Tzanidakis EN 1308
Cracking Wi-Fi Protected Access «WPA». Seth Fogie EN 1124
Crack Protection. Fate HE 1234
Countering SYN Flood Denial-of-Service Attacks. Ross Oliver. EN 1375
Controlling Privileges Administrator Accounts. Derek Melber. EN 1869
Configuring Windows 7 Steve Friedl EN 1528
Common VPN Security Flaws. Roy Hills. EN 1304
Common Security Problems in the Code of Dynamic Web Applications Sverre H. Huseby EN 1398
Collaborative endpoint security Ivan Arce, Eduardo Arias EN 1202

Send a new link:

TryThis0ne - Hacking Challenges.
TryThis0ne 2005-2014© :: Codingr :: B~HFH :: cp77fk4r :: There are 12327 accounts in this site. 87918 People has logged on to this site. Design By SBD