ICMP Usage in Scanning version 3.0

The paper starts with an introduction to the ICMP Protocol. The introduction explains what is the ICMP protocol; it’s message types, and where and when we should expect …

Building a Bastion Host Using HP-UX 11

A bastion host is a computer system that is exposed to attack, and may be a critical component in a network security system. Special attention must be paid to these highly …

DNS Security in Australia

Australian Internet security company DeMorgan released a document which is revealing the state of DNS security within Australia. The result – “Of the total number …

[ The History of MOD ] – book five

MODmodMODmodMODmodMODmodMODmodMOD ================================= MOD.book.FIVE: Who are they and where did they come from? ————- Well, it’s …

[ The History of MOD ] – book four

MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoD ================================= MOD.book.FOUR [End of ’90-1991] Two weeks before his bust, Lord Micro was introduced into the group. …

[ The History of MOD ] – book three

MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK THREE: A Kick In The Groin Well, suffice it to say, the fun couldn’t last …

[ The History of MOD ] – book two

MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK TWO: Creative Mindz With the addition of The Wing, came a shitload of pranks …

[ The History of MOD ] – book one

MoDm0dMoDm0dMoDm0dMoDm0dMoDm0dMoDm0d ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [ The History of MOD ] BOOK ONE: The Originals In the early part of 1987, there were numerous amounts of …