Nr | Blog | URL | Page Rank |
1 | .:[ Layered Security ]:. | http://blog.layeredsec.com/ | 4 |
2 | [Black Security] | http://bl4cksecurity.blogspot.com/ | 4 |
3 | 0entropy | http://0entropy.blogspot.com/ | 0 |
4 | a4apphack | http://a4apphack.com/ | 1 |
5 | ADD / XOR / ROL | http://addxorrol.blogspot.com/ | 6 |
6 | Anton Chuvakin Blog - Security Warrior | http://chuvakin.blogspot.com/ | 5 |
7 | avast! Blog | http://blog.avast.com/ | 7 |
8 | badcoded | http://badcoded.blogspot.com/ | 4 |
9 | Breaking Code | http://breakingcode.wordpress.com/ | 4 |
10 | Brundle Lab | http://blog.carlosgarciaprado.com/ | 0 |
11 | Carnal0wnage Blog | http://carnal0wnage.blogspot.com/ | 5 |
12 | chackraview.net | http://blog.chackraview.net/ | 2 |
13 | Chris Evans blog | http://scarybeastsecurity.blogspot.com/ | 5 |
14 | Coffee To Code | http://coffeetocode.net/ | 1 |
15 | Command Line Kung Fu | http://blog.commandlinekungfu.com/ | 4 |
16 | Computer and DATA Theft Victims | http://computersecurity.blogspot.com/ | 3 |
17 | cruft | http://cruft.blogspot.com/ | 1 |
18 | Cruz3N | http://cruzenaldo.com/ | 0 |
19 | CyberCrime & Doing Time | http://garwarner.blogspot.com/ | 5 |
20 | Dancho Danchev's Blog | http://ddanchev.blogspot.com/ | 6 |
21 | Darknet - The Darkside | http://www.darknet.org.uk/ | 6 |
22 | Deadc0de's Security Blog | http://www.deadc0de.info/ | 0 |
23 | Didier Stevens | http://blog.didierstevens.com/ | 5 |
24 | Ero Carrera's blog | http://blog.dkbza.org/ | 4 |
25 | Evil Fingers - The Blog | http://ef.kaffenews.com/ | 0 |
26 | Evilcodecave's Weblog | http://evilcodecave.wordpress.com/ | 2 |
27 | evilcry's blog | http://www.offensivecomputing.net/?q=blog/1077 | 4 |
28 | Exploiting Stuff. | http://exploiting.wordpress.com/ | 3 |
29 | extraexploit | http://extraexploit.blogspot.com/ | 4 |
30 | Feliam's Blog | http://feliam.wordpress.com/ | 4 |
31 | FireEye Malware Intelligence Lab | http://blog.fireeye.com/research/ | 4 |
32 | Freehacking | http://www.freehacking.net/ | 2 |
33 | GNUCITIZEN | http://www.gnucitizen.org/ | 6 |
34 | Google Online Security Blog | http://googleonlinesecurity.blogspot.com/ | 6 |
35 | Graham Cluley's blog | http://www.sophos.com/blogs/gc/ | 7 |
36 | ha.ckers.org web application security lab | http://ha.ckers.org/blog | 6 |
37 | Hack In The Box | http://www.hackinthebox.org/ | 5 |
38 | HackBloc.org | https://hackbloc.org/ | 5 |
39 | Hackers Arena | http://31337h4cks.blogspot.com/ | 1 |
40 | Hacking Expose! | http://hackingexpose.blogspot.com/ | 3 |
41 | Hacking Tips and Tricks | http://pc-tips-hacks.blogspot.com/ | 3 |
42 | Hacking-Gurus | http://www.hacking-gurus.net/ | 0 |
43 | Hex blog | http://hexblog.com/ | 5 |
44 | HEXALE (security. reverse engineering. stuff.) | http://hexale.blogspot.com/ | 4 |
45 | j00ru//vx tech blog | http://j00ru.vexillium.org/ | 4 |
46 | Jeremiah Grossman | http://jeremiahgrossman.blogspot.com/ | 6 |
47 | Krebs on Security | http://krebsonsecurity.com/ | 6 |
48 | Ksecurity-Team | http://sql-injection-tools.blogspot.com/ | 2 |
49 | LIUDIEYU English Blog | http://liudieyu0.blog124.fc2.com/ | 3 |
50 | ls /life /code /coffee | http://g3nto.blogspot.com/ | 0 |
51 | Marco Ramilli's Blog | http://marcoramilli.blogspot.com/ | 3 |
52 | McGrew Security Blog | http://www.mcgrewsecurity.com/ | 4 |
53 | Metasploit | http://blog.metasploit.com/ | 5 |
54 | Microsoft Malware Protection Center | http://blogs.technet.com/mmpc/default.aspx | 6 |
55 | MrCracker.com | http://mrcracker.com/ | 4 |
56 | Offensive security | http://www.offensive-security.com/blog | 4 |
57 | Okamalo Security Watch | http://www.okamalo.com/ | 2 |
58 | Online Security Blog (OSB) | http://onlinesecurityblog.info/ | 1 |
59 | Panda Research Blog | http://research.pandasecurity.com/ | 5 |
60 | PCMag Security Watch | http://blogs.pcmag.com/securitywatch/ | 4 |
61 | pctrojan | http://www.pctrojan.com/ | 2 |
62 | Pedram Amini - Blog | http://pedram.openrce.org/ | 4 |
63 | PENTEST101 | http://pentest101.blogspot.com/ | 0 |
64 | PenTestIT | http://pentestit.com/ | 3 |
65 | Peter Van Eeckhoutte's Blog | http://www.corelan.be:8800/ | 4 |
66 | Rafay Hacking Articles | http://rafayhackingarticles.blogspot.com/ | 4 |
67 | Redspin Security Blog | http://www.redspin.com/blog | 4 |
68 | ret2libc - Reverse Engineering & related | http://ret2libc.blogspot.com/ | 4 |
69 | Reverse Engineering Blog | http://reversingtools.blogspot.com/ | 2 |
70 | Reversemode | http://reversemode.com/ | 5 |
71 | Reversing.AR | http://blog.reversing.com.ar/ | 0 |
72 | Rootbiez | http://rootbiez.blogspot.com/ | 2 |
73 | SANS Internet Storm Center, InfoCON: green | http://isc.sans.org/ | 8 |
74 | Schneier on Security | http://www.schneier.com/blog/ | 4 |
75 | SearchSecurity: Network Security Tactics | http://searchsecurity.techtarget.com/?track=sy260 | 7 |
76 | SearchSecurity: Security Wire Daily News | http://searchsecurity.techtarget.com/?track=sy160 | 4 |
77 | Secumania Security Group Feeds | http://secumania.net/ | 3 |
78 | Securelist / Blog | http://www.securelist.com/en/ | 6 |
79 | Security Active Blog | http://blog.securityactive.co.uk/ | 2 |
80 | Security Bytes | http://itknowledgeexchange.techtarget.com/security-bytes | 4 |
81 | Security Research by Alexander Sotirov | http://www.phreedom.org/ | 5 |
82 | Security Wire Weekly | http://itknowledgeexchange.techtarget.com/security-wire-weekly | 5 |
83 | Security-Shell | http://security-sh3ll.blogspot.com/ | 3 |
84 | Securosis Blog | http://securosis.com/blog/ | 5 |
85 | SkullSecurity | http://www.skullsecurity.org/blog | 4 |
86 | SPAMfighter News | http://www.spamfighter.com/ | 6 |
87 | Spyware news | http://www.2-spyware.com/news | 4 |
88 | Sucuri Security | http://blog.sucuri.net/ | 3 |
89 | TaoSecurity | http://taosecurity.blogspot.com/ | 6 |
90 | TechMeditation | http://techmeditation.blogspot.com/ | 0 |
91 | The Cuckoo's Egg | http://gucosc011.blogspot.com/ | 4 |
92 | The Dark Visitor | http://www.thedarkvisitor.com/ | 5 |
93 | The Grey Corner | http://grey-corner.blogspot.com/ | 1 |
94 | The Security Blog | http://www.thesecurityblog.com/ | 2 |
95 | TrendLabs | Malware Blog - by Trend Micro | http://blog.trendmicro.com/ | 6 |
96 | VRT | http://vrt-sourcefire.blogspot.com/ | 5 |
97 | Windows Incident Response | http://windowsir.blogspot.com/ | 4 |
98 | xecurity.de | http://xecurity.de/ | 2 |
99 | Your Online Security Authority Blog | http://www.onlinesecurityauthority.com/ | 3 |
100 | ZoneAlarm Blog | http://blog.zonealarm.com/blog/ | 6 |
Bl4ckSecurity es el blog que anunció la falsa muerte de Str0ke hace unos meses.
ResponderEliminarjoé, cierto, si hasta vendían camisetas. Recientemente añadieron un post sobre smpctf y lo incluí en la lista. Pero vamos, que busco otro y lo cambio, ¿alguna sugerencia?
ResponderEliminarpd. curiosos los comentarios en chino, una belleza al traducirlos...
http://am0nr4.blogspot.com/
ResponderEliminarThanks! I've already added its feeds to our English blogroll
ResponderEliminarThanks to adding my Blog :D
ResponderEliminarNice list Bro...
TnX 4 l1sT-1n
ResponderEliminartnx4u all!
ResponderEliminarAdded + 12 new blogs to our English blogroll.
ResponderEliminarCurrently displaying 117. Need more?
I really enjoyed this post. You write about this topic very well. There are many cherished moments in life, why not wear a beautiful dress! When looking back on special memories of your child wearing a gorgeous dress, it will make a fond memory.
ResponderEliminararoma essential oils
great post as usual!
ResponderEliminarcialis
Hi,
ResponderEliminarPlease let me know your opinion about this. It is working wonders for me; i want to see if you too have the same experience with it.
http://Amara76.edigital.track.clicksure.com
Above is the link.
Safegadget.com has security tutorials for end users on How to secure their computers, smartphones, wifi, etc...
ResponderEliminarhttp://www.safegadget.com
I would recommend adding Seculert's blog on advanced persistent threats. It features industry news, security 101, and findings from our Research Lab. Check it out at http://www.seculert.com/blog/.
ResponderEliminarNice to find this useful resource from you.
ResponderEliminarThanks for sharing. Learn a lot from your Blog.I have read your blog about it-security-matter It is very help full.I really enjoyed reading it, you may be a great author.I must say you've done a wonderful job by sharing your article with us.Penetration Testing UK
ResponderEliminarsecurity and antivirus is very much important now a days,
ResponderEliminarwww.mcafee.com/mavw/retailcard