Full Disclosure mailing list archives

Re: White Paper: Detecting System Intrusions


From: Źmicier Januszkiewicz <gauri () tut by>
Date: Thu, 17 Jan 2013 10:22:50 +0100

I'm wondering just how many security experts clicked on that link,
downloaded a PDF from some unknown source and opened it...

With kind regards,
Zmicier J.

2013/1/17 Andrew Terekhov <ultraata () gmail com>

Why is this here?
There's nothing new/interesting in datasheets.

On Wed, Jan 16, 2013 at 9:39 PM, Almaz <almaz () demyo com> wrote:

How to detect system intrusions? What are the techniques? Can one
character difference in the output be an indicator of compromise? Download
and read a white paper below if you want answers to these questions and
more.

http://www.demyo.com/downloads/white-papers/

--
Almantas Kakareka, CISSP, GSNA, GSEC, CEH
CTO
Demyo, Inc.
Miami, FL, USA
Cell: +1 201 665 6666
Desk: +1 786 203 3948
Email: almaz () demyo com
Twitter: @DemyoSec <https://twitter.com/#!/demyosec>
Web: www.demyo.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/




--
Regards,
Andrew Terekhov.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: