How can you Create an Evil Twin Access Point-How can you Create an Evil Twin Access Point

How smart is bluetooth smart?

A presentation on bluetooth smartness.



RESTful Applications

Security testing for RESTful applications.



Good paper on exploiting/pentesting AIX based machines. From the paper itself “ The paper proposes some basic methods to do comprehensive local security checks and how to exploit the vulnerabilities.”