Update00 15.4.2018
Datum | Typ | Název |
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | 2018 - Chyby pro rok 2018 | |
15.4.2018 | 2001 - Chyby pro rok 2001 | |
Obsah | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | Nová grafická úprava a vylepšení | |
15.4.2018 | Několik změn | |
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | ||
15.4.2018 | Několik oprav |
Datum | Typ | Název |
8.4.2018 | Virus Calendar - Kompletní seznam virů rozdělení podle datumu. | |
8.4.2018 | ||
8.4.2018 | ||
8.4.2018 | ||
8.4.2018 | ||
8.4.2018 | ||
8.4.2018 | IPv6 Attack (17) - Přidány nové útoky na IPv6 | |
8.4.2018 | Jak útočí - Aktualizace nových způsobů útoků | |
8.4.2018 | Techniky - Přidány nové techniky. | |
8.4.2018 | Attack - Nové grafické zpracování. | |
News | ||
8.4.2018 | Tutoriály - Spojení sekcí Tutoriál a Studium. | |
8.4.2018 | Několik změn | |
8.4.2018 | Most Wanted - Aktualizace seznamu hledaných hackerů FBI. | |
8.4.2018 | Počítačový útok - Přidány nové útoky do seznamu. | |
8.4.2018 | BlackHat - Aktualizace pro roky 2017 a 2018. | |
8.4.2018 | RSA - Aktualizace pro roky 2017 a 2018. | |
8.4.2018 | HITBSecConf - Aktualizace pro roky 2017 a 2018. | |
8.4.2018 | CanSecWest - Aktualizace pro roky 2017 a 2018. | |
8.4.2018 | Bsides - Aktualizace pro roky 2017 a 2018. | |
8.4.2018 | VB - Aktualizace pro roky 2017 a 2018. | |
8.4.2018 | REcon - Aktualizace pro roky 2017 a 2018. | |
8.4.2018 | Několik oprav |
Datum | Typ | Název |
1.4.2018 | +Přidány sekce Recenze, Nástroje ke stažení | |
1.4.2018 | +Aktualizovány programy + Přidány | |
1.4.2018 | +Nové grafické zpracování | |
1.4.2018 | Spectre attack - Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre .Spectre is harder to exploit than Meltdown, but it is also harder to mitigate. However, it is possible to prevent specific known exploits based on Spectre through software patches. | |
1.4.2018 | Meltdown Attack - Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system. If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information without the chance of leaking the information. This applies both to personal computers as well as cloud infrastructure. Luckily, there are software patches against Meltdown. | |
1.4.2018 | +Vraceno staré zpracování sekce | |
1.4.2018 | -Nové grafické zpracování | |
1.4.2018 | UEFI Attack - Unlike macs many PCs are likely to be vulnerable to pre-boot Direct Memory Access (DMA) attacks against UEFI. If an attack is successful on a system configured with secure boot - then the chain of trust is broken and secure boot becomes insecure boot. | |
1.4.2018 | BranchScope Attack - We present BranchScope — a new side-channel attack where the attacker infers the direction of an arbitrary conditional | |
1.4.2018 | -Nástroje ke stažení - Kompletně graficky přepracování. Nyní jsou jednotlivé nástroje rozděleny do jednotlivých sekcí. | |
1.4.2018 | +Most Wanted - Aktualizován seznam. | |
1.4.2018 | Opraveno několik chyb |
Datum | Typ | Název | |||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
Management | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
25.3.2018 | Spectre attack - Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre .Spectre is harder to exploit than Meltdown, but it is also harder to mitigate. However, it is possible to prevent specific known exploits based on Spectre through software patches. | ||||||||||||||||||||||||||||||||||
25.3.2018 | Meltdown Attack - Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system. If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information without the chance of leaking the information. This applies both to personal computers as well as cloud infrastructure. Luckily, there are software patches against Meltdown. | ||||||||||||||||||||||||||||||||||
25.3.2018 | Articles -Abecedně srovnané menu | ||||||||||||||||||||||||||||||||||
25.3.2018 | ČlánkyCZ -Abecedně srovnané menu | ||||||||||||||||||||||||||||||||||
25.3.2018 | |||||||||||||||||||||||||||||||||||
25.3.2018 | Celkový počet chyb: 1 |
---------------------------------------------------------------------------------------------------------------------
Datum | Typ | Název |
15.4.2018 | Několik oprav |