Efter at have scannet med Nmap, Metasploit eller andre sårbarheds scanner, har man mange informationer om porte og hvilken service der lytter på de enkelte porte, software versioner og måske informationer om hvilke sårbarheder der er opdaget. Ud fra et sikkerheds synspunkt er det vigtigt at vide om der findes exploits der kan udnytte den/de sårbarheder der er blevet opdaget efter scanningen, og ikke mindst hvilken skade de kan gøre.
Jeg vil her give link til nogle databaser, der kan give informationer om nye og gamle exploits. Metasploit har også exploits man kan bruge.
I’m extremely pleased to discover this website. I wanted to thank you for ones time just for this fantastic read!! I absolutely enjoyed every part of it and i also have you bookmarked to see new stuff in your site.
Thanks for the comment, I’m glad you like it. I want to write new articles, but it takes a long time to test and write an article. It is only possible to write in my spare time.
Thanks for the suggestions you have shared here. Something else I would like to express is that laptop or computer memory specifications generally increase along with other advances in the engineering. For instance, if new generations of processor chips are brought to the market, there is certainly usually a similar increase in the size preferences of all computer system memory and hard drive space. This is because software program operated simply by these processor chips will inevitably increase in power to take advantage of the new technology.
Definitely, what a great blog and revealing posts, I definitely will bookmark your site. Best Regards!
I got what you intend,bookmarked, very decent website.
I reckon something truly special in this website.
Really nice design and good subject material. Please also check my website. I love cars!