CyberGuerrilla 2014
 Vol.4--No.2014 | 3 Users Online
Tuesday,Jun 25,2019 

Okay the media is known for many things. Mostly one we can all agree on is they never seem to get their story right. I usually don’t do this but I decided to show you, You really can’t believe everything you read on these “news” websites. Let’s have some fun. – ro0ted The news/media/dumbasses-whatever-you-want-to-call-it website Read more » 



By ro0ted | December 11, 2014 - 4:09 pm | Comments Off on #ro0ted #OpNewblood Data Mining Algorithms: Explained using R

Read Here: http://www.mediafire.com/view/y6bq8o395qc6qik/Data_Mining_Algorithms.pdf Book Description Data Mining Algorithms is a practical, technically-oriented guide to data mining algorithms that covers the most important algorithms for building classification, regression, and clustering models, as well as techniques used for attribute selection and transformation, model quality evaluation, and creating model ensembles. The author presents many of the important topics Read more » 



By ro0ted | December 6, 2014 - 8:44 pm | Comments Off on #ro0ted #OpNewblood Assuring Security by Penetration Testing | Master the art of penetration testing with Kali Linux

Read Here: http://www.mediafire.com/view/m772j7qbpf68d7a/184951948X_Secur.pdf Overview Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits In Detail Kali Linux is a comprehensive penetration testing platform Read more » 



By ro0ted | December 6, 2014 - 3:05 pm | Comments Off on #ro0ted #OpNewblood Social Networking: Mining, Visualization, and Security

Read Here: http://www.mediafire.com/view/ytppl190854g88q/3319051636SocialNetwork.pdf With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents Read more » 



By ro0ted | December 6, 2014 - 2:49 pm | Comments Off on #ro0ted #OpNewblood Burp Suite Starter: hands-on practical guide for Burp Suite

Read Here: http://www.mediafire.com/view/y120cangfed2tnn/Burp_Suite_Starter.pdf Overview Learn something new in an Instant! A short, fast, focused guide delivering immediate results.   Intercept HTTP/S requests with Burp Proxy.   Tamper and analyze responses.   Perform enumeration using the Burp Suite Map and Spider.   Launch an automatic scan with Burp Scanner   Automate attacks using Burp Intruder.   Read more » 



By ro0ted | December 6, 2014 - 2:23 pm | Comments Off on #ro0ted #OpNewblood Computer Forensics with FTK

Read Here: http://www.mediafire.com/view/dgi2w8xq1zb523j/1783559020_comp.pdf With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry out these activities. The FTK platform, with the ability to collect and analyze digital evidence quickly and with integrity, is a great solution to help professionals Read more » 



nonymous. Whoever you are, we are ungovernable!
> =[]= This site is run by cyberguerrilla, your friendly anonymous autonomous tech collective since 2010 =[]= This the past that can NOT be changed! <