1

Topic: Positive Research 2016

https://www.ptsecurity.com/upload/ptru/ … 16-rus.pdf it is better late, than never... <<RSDN@Home 1.0.0 alpha 5 rev. 0>>

2

Re: Positive Research 2016

Hello, kochetkov.vladimir, you wrote: KV> https://www.ptsecurity.com/upload/ptru/ … 16-rus.pdf KV> Skukota if it is fair is better late, than never. Speeches of captains, heaps  and all it is drowned in a water large quantity. IIS on 3 % became more vulnerable than the Apache, and  too full of holes, as well as PHP. Invariants of entities reached 1488 % and turned in workflow functional area. And still sites are vulnerable too. Became interested was SSH keys, but too one water - statistics considered-considered, and I and did not see the reason. - a neural network for  harmful domains? You ? - Attacks to modems. Began for health (attack through the modem web server)  slightly, and... All! Any general words "it was possible to us, and still it is possible XSS to try. And social engineering". And further it is again absolutely uninteresting. After modems to me bothered.

3

Re: Positive Research 2016

4

Re: Positive Research 2016

5

Re: Positive Research 2016

Hello, zou, you wrote: zou> There it is a little in a flowery style written - I correctly understand, what it was necessary to send the letter to the chairman with the request to follow the link, it voluntary does it and login and the password come to it HTTP-hederah? Really reality situation or I something do not understand it? Yes quite vital. At the time of my operation in a Biline, we periodically did mailings various  on employees.  all clicked on the links "conducting" on a site with intimate photos of hypothetical acquaintances of a victim. And directors were in the forefront As to information leakage in titles similar there is not that pretty often, but it is frequent enough.