HeroWarez.org » Tag cloud » secure

Implementing SSH Strategies for Optimizing the Secure Shell

Himanshu Dwivedi, "Implementing SSH: Strategies for Optimizing the Secure Shell"
English | 2003 | ISBN: 0471458805 | PDF | pages: 405 | 6.3 mb


MS Azure for .NET Developers - Building Secure Services and Applications (Oct. 2018)
MS Azure for .NET Developers - Building Secure Services and Applications (Oct. 2018)
MP4 | Video: h264, 1280x720 | Audio: AAC, 48 KHz, 2 Ch
Genre: eLearning | Language: English + .SRT | + Exercise Files
Level: Advanced | Updated: 12 Oct 2018
Duration: 3h 25m | 671 MB


Internet Secure Tunneling 2.0.0.244
File Size: 1.7 MB

Tunneling, or port forwarding, is a way to forward otherwise insecure TCP traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure.


WordPress Security: Secure Your Site Against Hackers
WordPress Security: Secure Your Site Against Hackers
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | Lec: 35 | 814 MB
Genre: eLearning | Language: English

The Complete WordPress Security Course. From The Most Fundamental To The Most Advanced Up-To-Date Security Hacks

Secure Your Spring-Based Applications

Secure Your Spring-Based Applications
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4 Hours 18M | 958 MB
Genre: eLearning | Language: English
Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. That's where Spring Security comes into the picture to simplify things for developers. A lot has changed since version 3 and with version 4.1 in place, there have been several changes and improvements to the Java Configuration, Web Application Security, Authorization, Crypto Module as well as to Testing, along with some that have been deprecated in the current release. This course is an incremental guide that will teach you how to protect your application from malicious users.

Using OAuth to Secure Your ASP.NET API [repost]

Using OAuth to Secure Your ASP.NET API
Size: 753 MB | Duration: 3h 52m | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 44.1KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English
Certified Secure Android Development(C-SAD) (2016)

Certified Secure Android Development(C-SAD)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | Lec: 20 | 338 MB
Genre: eLearning | Language: English

Android Introduction, Development, Secure Coding, Automated penetration testing of Android applications

1Password Fundamentals Quickly Generate Secure Passwords
1Password Fundamentals: Quickly Generate Secure Passwords
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 32M | 64 MB
Genre: eLearning | Language: English

USB Secure 2.0.5

USB Secure 2.0.5 | 3.94 MB

Where there is a USB Drive, there has to be USB Secure! USB Secure can password protect USB drives. Protection is PC independent, doesn't require installation and doesn't require administrator rights at the other end. Never again worry about lost or stolen USB drives if you have protected it with USB Secure. USB Secure works with all types of portable media like USB Flash drives, Thumb drives, Memory sticks, External drives and Memory Cards.
Secure Smart Embedded Devices, Platforms and Applications

Secure Smart Embedded Devices, Platforms and Applications by Konstantinos Markantonakis
English | 14 Sept. 2013 | ISBN: 1461479142 | 585 Pages | PDF | 5 MB

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life.