Video Screencast Help

Search

Search results

Dear, good day. Performing some tests a few days ago based on the operation of virtual machines performed the test regarding the transfer of files from virtual machine to real machine and vice versa. Aware that when it comes to attacks on ...
Blog Entry by Fabiano.Pessoa | 22 Sep 2012 | 0 comments
  You've probably been surprised at some site with messages like "your computer is not protected" or "your computer is infected". Behind these scary messages (scare) are hiding the real threats. When you accept the ...
Blog Entry by Fabiano.Pessoa | 19 Sep 2012 | 0 comments
Good morning,  It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration?  Would not it be nice to send this log to the administrator so that it has real science of what ...
Blog Entry by Fabiano.Pessoa | 10 Sep 2012 | 0 comments
Good morning gentlemen  It would be great to create a failure analysis after disinfection in the operating system  It would be very good this fix in the system caused by malicious file example of an attack that metasploit using java and concept by ...
Idea by Fabiano.Pessoa | 31 Aug 2012 | 0 comments
Brazil Sat, 20 October, 2012 - 8:30 - 17:00 AMT It will be held on the 20th of October the ...
Event by Fabiano.Pessoa | 26 Aug 2012 | 0 comments
Dear, good morning. Who ever heard of sites cloned? The idea that I come to propose, it is a defense against social engineering attack. Network, we could do many things or outside, because the Internet is the "big network". The case ...
Idea by Fabiano.Pessoa | 03 Aug 2012 | 0 comments
Dear, good morning.   It would help create a line of defense based on commands ROUTER, given that we could make a coordinated attack by both the equipment that support the operation such as: router, hubs, switches. With this type of attack, the ...
Idea by Fabiano.Pessoa | 02 Aug 2012 | 0 comments