Hacking The Security Myths

A blog by Kunal Sehgal

Pages

  • Home
  • About Me
  • Speaking
  • Publications

2017-04-10

The importance of trust and integrity in a VPN provider

Troy hunt's post
No comments: Labels: Tools
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

2017-04-08

Unprotect MS Word files, check ransomware code

An interesting tool to have (especially for ransomware): How to unprotect vb-code from MS Word.

No comments: Labels: Tools
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Blogs

  • ►  2020 (2)
    • ►  October (2)
  • ▼  2017 (7)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ▼  April (2)
      • The importance of trust and integrity in a VPN pro...
      • Unprotect MS Word files, check ransomware code
    • ►  February (1)
  • ►  2016 (44)
    • ►  November (2)
    • ►  October (2)
    • ►  September (2)
    • ►  August (6)
    • ►  July (4)
    • ►  June (4)
    • ►  May (3)
    • ►  April (8)
    • ►  March (4)
    • ►  February (5)
    • ►  January (4)
  • ►  2015 (65)
    • ►  December (8)
    • ►  November (6)
    • ►  October (1)
    • ►  August (5)
    • ►  July (8)
    • ►  June (8)
    • ►  May (2)
    • ►  April (9)
    • ►  March (2)
    • ►  February (8)
    • ►  January (8)
  • ►  2014 (101)
    • ►  December (6)
    • ►  November (7)
    • ►  October (7)
    • ►  September (5)
    • ►  August (13)
    • ►  July (8)
    • ►  June (5)
    • ►  May (17)
    • ►  April (8)
    • ►  March (8)
    • ►  February (8)
    • ►  January (9)
  • ►  2013 (129)
    • ►  December (5)
    • ►  November (8)
    • ►  October (10)
    • ►  September (8)
    • ►  August (14)
    • ►  July (14)
    • ►  June (10)
    • ►  May (17)
    • ►  April (11)
    • ►  March (8)
    • ►  February (10)
    • ►  January (14)
  • ►  2012 (219)
    • ►  December (12)
    • ►  November (16)
    • ►  October (32)
    • ►  September (18)
    • ►  August (23)
    • ►  July (12)
    • ►  June (20)
    • ►  May (19)
    • ►  April (11)
    • ►  March (21)
    • ►  February (17)
    • ►  January (18)
  • ►  2011 (109)
    • ►  December (18)
    • ►  November (18)
    • ►  October (29)
    • ►  September (11)
    • ►  August (14)
    • ►  July (19)
  • ►  2010 (4)
    • ►  April (3)
    • ►  January (1)
  • ►  2009 (28)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  August (3)
    • ►  July (4)
    • ►  March (2)
    • ►  February (3)
    • ►  January (11)

Search

Categories

Websites_Today (138) Govt (88) Tools (83) Vulnerability (67) Hackers (60) financial (58) Anonymous (48) Philosophy (42) Password_Recovery (38) Google (37) Hacking (37) Mobile (36) Organization_Sec (36) Malware (35) Attack (33) Encryption (33) Browser (31) Internet (30) DLP (29) SSL (23) Privacy (21) protocol (21) Microsoft (19) physical_security (17) Email (16) Security (16) Social_Engineering (15) Web_App (15) DNS (13) DoS (13) Stories (13) Windows_OS (12) Anti-Virus (11) Open_Source (11) Education (10) Hardware (10) Certificate (9) Contest (9) Job (8) OS (8) Phishing (8) Apple (7) Algo (6) Wireless (6) Crime (5) Hardening (5) Presentation (5) Reports (5) Twitter (5) personnel_security (5) Backtrack (4) Linux (4) Softwares (4) Standards (4) Forensics (3) ID_Theft (3) Technical (3) Windows_Software (3) cost (3) hash (3) Checklist (2) Development (2) LulzSec (2) OSInt (2) PDF (2) PKI (2) Portable (2) Virus (2) botnet (2) BGP (1) Cracking (1) Darknet (1) Defcon (1) Defect (1) Defence (1) EndPoint (1) Governance (1) Incident (1) Patent (1) Phone (1) Proxy (1) Ransomware (1) Registry (1) SDLC (1) URL_Short (1) Untrusted_Network (1) backup (1) tld (1)

Copyright

This work is licensed under Creative Commons Attribution 4.0 International License.

Disclaimer

All the posts & content published/shared here are my own personal views; and do not reflect the opinions of my current or past organizations.