Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43440
  • Total Topics: 16532
  • Online today: 3109
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 3084
Total: 3086









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: mikey
« on: 03. June 2012., 22:01:52 »

Quote
...recommend this analysis...

Cool :) I know some of the folks who work on the 'front line' to put that data together. They're all volunteers from different realms of web dev.
Posted by: Samker
« on: 03. June 2012., 08:29:20 »


I agree with you Mike, also would like to recommend this analysis to SCF Members - "Top 50 Bad Hosts & Networks 2012 Q1": http://hostexploit.com/downloads/viewdownload/7/36.html   

-

By the way, Stuxnet worm is mentioned in page 22. (or 23.) and here is new Topic related to them - "Operation Olympic Games - Obama confirms attack on Iran via Stuxnet worm": http://scforum.info/index.php/topic,7682.0.html

Posted by: mikey
« on: 01. June 2012., 23:17:41 »

IMO as a researcher, 'take downs' have become much easier in recent years. There are many reasons but I think this comment sums it up;

Quote
Recent disruptions of cybercriminal operations - the result of cross-industry and international cooperation - show signs of a new willingness to target supporting infrastructures as the enablers of cybercriminal operations.

src; http://hostexploit.com/blog/14-reports/3537-disrupting-cybercrime-via-hosts-and-isps.html

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023