-
Join 140 other subscribers
Categories
Blogroll
- App Sec SANS Blog
- Chat Messenger
- Chrissanders Incident response
- CiteSeerX Technical Document Search
- Complete Excercise Bible
- Complete Security at One eYe
- Contagiodump (Malware Analysis Blog)
- Core Security Technologies event and Webcast
- Derkeiler Security, Perl Usernet Group
- Infosec Institute Resources
- Irongeek – Infosec blog
- Movie List
- Security Blogs List
- Spot the Vulnerability
Cooking
Forums
Resources
- 20 Critical Security Controls
- 8 Week Fatburn workout
- CERT Virtual Training Environment (VTE)
- Comparision of WebApp Scanners
- Cryptography and Network Security
- Cubase Video Tuts
- Ethical Hacking Course
- Eureka Malware Analysis
- Exploring Splunk
- Forensics Puzzle
- Google Hacking Database (GHDB)
- Hex Base64 Binary Translator
- Huge Respository of Hacking Tools
- Information Risk Executive Council
- Javascript Unpacker
- Malware Analysis Tools
- Nirsoft Softwares – Collection simple useful utilities
- Opensource Tools for Forensic Analysis
- OS Internals and Windows Case Presentations
- PCI Compliance Dashboard
- Reverse Engineering – Complete Tutorial
- SAMATE – Software Assurance
- Secure Design Solution Using Intrusion Prevention Systems
- Security Audit Resources
- Security Cheat Sheets
- Security Database Tools
- Security Papers
- Ultimate Reconnoissance
Pages
Tags
- abs
- analysis
- approach
- arp exploit
- a to z
- body purification
- botnet
- botnet takeover
- bypass firewall
- bypass hotspot authentication
- camera
- command and control server
- computer forensics
- computer programming
- computer technologies
- defense
- detox
- detoxification
- distributed systems
- distributed systems security
- domain fluxing
- ebook
- ebooks
- exploit
- fat
- firewall restrictions
- health
- hi resolution camera
- image
- javascript
- layered tools
- learn
- learn web application security
- mac spoofing
- malicious script
- malware
- malware analysis
- memorize
- memory analysis
- metasploit
- notes
- olive oil
- openssh
- packet crafting
- pen test
- pentest
- perl
- php
- putty
- reduce fat
- remove fat
- resize
- rootkit
- scapy
- secure coding
- security
- security issues
- six packs
- slim
- slimtips
- stackoverflow
- tools
- torpig
- triceps
- tutorial
- use homepc
- video streaming
- volatility
- vulnerability
- webapp security
- web developemnt
- where to start security
- Workout
- xml
- zeroaccess
Tag Archives: perl
Command line perl replacing sed,awk
While updating svn of framework3 in Backtrack, it failed as it was locked. So I can resolve by removing all the lock files in the folders. I tried to pipe the list of files to rm but failed. So thought … Continue reading
Perl – References
References in Perl is just imitation of Pointers in C In C, *p = &var; In Perl, $p = \$var; These references can be applied to all kinds of variables, function, hashes and arrays. Just add \ before the variable/function … Continue reading
Perl Files Notes 3
Reading from Files my $var; read (FILE, $var, 1024); #reading in block size Similarly write(FILE, $var, 1024); This works fantastically when dealing with binary files so that fetching and writing is fast and efficient. Perl provides another set of functions … Continue reading
Perl Notes 2
Files Standard Files STDIN STDOUT STDERR To read Input from Keyboard $ input = <STDIN>; To read input from keyboard until Ctrl+D or Ctrl+Z is pressed while (<STDIN>){ #input read to $_ print(); } To Remove the … Continue reading
Perl Notes
Perl Notes String Literals Single quotes are blind. Perl starts from ‘ and stops the literal till ‘ blindly. Double quotes parse the literal for special characters such as \t,\n\r,\U..\E and variables$var \l Change the next character to lower case … Continue reading