+

ATTENTION! If You're from the US and You'd like to buy a subscribtion please contact us directly at email: joanna.kretowicz@eforensicsmag.com

Archive for / 'Network'



April 7, 2014

Magazine Network joanna_kretowicz Comments Off

Wireshark Master – Network Forensics and Security

  Dear Readers, After a great success of Network Forensics Toolbox, we have decided to follow your wishes and develop a special edition dedicated just to your favourite network forensic tool – nothing else, but Wireshark! Wireshark is a free, open-source, packet analyzer that can be used both to capture packets and to read packet […]

Read more


February 14, 2014

Magazine Network joanna_kretowicz Comments Off

Network Forensic TOOLBOX – Learn 13 Network Forensics Tools and Techniques

  Dear Readers,   Thank you for your great interest in this edition of “Network Forensics”! Below you can find the table of content – we have already prepared for you 13 tutorials and reviews on tools and techniques utilized in network forensic analysis’. Lots of useful tips and “step-by-step” guides are waiting for you! […]

Read more


December 21, 2013

Magazine Network joanna_kretowicz Comments Off

From BackTrack to Kali Linux + FREE TEASER

Dear Readers, Proudly, we announce the release of the newest issue of eForensics Magazine - From BackTrack to Kali Linux.   NEW ISSUE IS OUT! KALI TOOLS AND HACKING TRICKS – forensics approach. Here it is – over 100 pages on Kali tools, Network scanning techniques, hacking tricks and Backtrack usage! Check what we’ve prepared for […]

Read more


December 16, 2013

Magazine Network joanna_kretowicz Comments Off

Learn How to Keep Your Web Applications Secure

  Dear Readers, How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? Let’s get serious about building secure Web applications. The reasoning is simple: According to numerous studies, the preferred method for attacking businesses’ online assets is via their Web applications–and why not? According to […]

Read more


November 22, 2013

Magazine Network joanna_kretowicz Comments Off

LEARN “HOW TO” – 101 BEST FORENSIC TUTORIALS

Dear Readers, Proudly and finally, we announce the release of the newest issue of eForensics Magazine Learn „How to” – 101 Best Forensics Tutorials so the best practical pill for everyone who’d like to become an expert in digital forensics field. LEARN HOW TO DO IT! In front of you is more than 700 pages of practical […]

Read more


October 4, 2013

Magazine Network joanna_kretowicz Comments Off

Internet Browsers Forensics – eForensics Network

Dear Readers! Welcome to the September issue of eForensics Network devoted to Internet Browsers Forensics. A web browser is a software application for retrieving, presenting and traversing information resources on the World Wide Web. Although browsers are primarily intended to use the World Wide Web, they can also be used to access information provided by […]

Read more


September 6, 2013

Network News joanna_kretowicz Comments Off

How to Develop a Cyber Forensic Model PACKAGE

  Dear Readers, We would like to present you our new special package of two eForensics eBook, covering the subject of Developing a Computer Forensic Model to Investigate Cyber Crimes written by our contributor and friend Bryan Soliman. By now you were able to purchase those ebooks separately, but to give you access to whole […]

Read more


August 21, 2013

Magazine Network joanna_kretowicz Comments Off

Steps toward developing Cyber Forensic Model PART II

Dear Readers, We would like to present you second, final, part of eBook series dedicated to Developing a Computer Forensic Model to Investigate Cyber Crimes written by our contributor and friend Bryan Soliman. In part I in the series of this topic, we investigated different processes and forensic tools implemented cyber forensics in an effort […]

Read more


June 11, 2013

Magazine Network joanna_kretowicz Comments Off

Network Traffic Analysis with Xplico

Dear Readers, We would like to introduce our newest issue of eForensics Network. Comments

Read more


May 16, 2013

Magazine Network joanna_kretowicz Comments Off

Network Audit, Unix Testing, Auditing Cisco – Routers & Switches, Pentesting explored in PenTest eBook

  Brief summary: We will specifically focus on Cisco routers. This is primarily because Cisco has the greatest market share Internet-based Routers. Additionally, the Cisco IOS as perhaps the most universal feature set comprehensively covering many options. The addition of stateful packet filtering all stateful inspection and a wide range of protocols that are supported […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa