Trao đổi với tôi

www.hdphim.info

11/5/10

[Security] 100 computer security blogs in English

View list:

NrBlogURLPage Rank
1.:[ Layered Security ]:.http://blog.layeredsec.com/4
2[Black Security]http://bl4cksecurity.blogspot.com/4
30entropyhttp://0entropy.blogspot.com/0
4a4apphackhttp://a4apphack.com/1
5ADD / XOR / ROLhttp://addxorrol.blogspot.com/6
6Anton Chuvakin Blog - Security Warriorhttp://chuvakin.blogspot.com/5
7avast! Bloghttp://blog.avast.com/7
8badcodedhttp://badcoded.blogspot.com/4
9Breaking Codehttp://breakingcode.wordpress.com/4
10Brundle Labhttp://blog.carlosgarciaprado.com/0
11Carnal0wnage Bloghttp://carnal0wnage.blogspot.com/5
12chackraview.nethttp://blog.chackraview.net/2
13Chris Evans bloghttp://scarybeastsecurity.blogspot.com/5
14Coffee To Codehttp://coffeetocode.net/1
15Command Line Kung Fuhttp://blog.commandlinekungfu.com/4
16Computer and DATA Theft Victimshttp://computersecurity.blogspot.com/3
17crufthttp://cruft.blogspot.com/1
18Cruz3Nhttp://cruzenaldo.com/0
19CyberCrime & Doing Timehttp://garwarner.blogspot.com/5
20Dancho Danchev's Bloghttp://ddanchev.blogspot.com/6
21Darknet - The Darksidehttp://www.darknet.org.uk/6
22Deadc0de's Security Bloghttp://www.deadc0de.info/0
23Didier Stevenshttp://blog.didierstevens.com/5
24Ero Carrera's bloghttp://blog.dkbza.org/4
25Evil Fingers - The Bloghttp://ef.kaffenews.com/0
26Evilcodecave's Webloghttp://evilcodecave.wordpress.com/2
27evilcry's bloghttp://www.offensivecomputing.net/?q=blog/10774
28Exploiting Stuff.http://exploiting.wordpress.com/3
29extraexploithttp://extraexploit.blogspot.com/4
30Feliam's Bloghttp://feliam.wordpress.com/4
31FireEye Malware Intelligence Labhttp://blog.fireeye.com/research/4
32Freehackinghttp://www.freehacking.net/2
33GNUCITIZENhttp://www.gnucitizen.org/6
34Google Online Security Bloghttp://googleonlinesecurity.blogspot.com/6
35Graham Cluley's bloghttp://www.sophos.com/blogs/gc/7
36ha.ckers.org web application security labhttp://ha.ckers.org/blog6
37Hack In The Boxhttp://www.hackinthebox.org/5
38HackBloc.orghttps://hackbloc.org/5
39Hackers Arenahttp://31337h4cks.blogspot.com/1
40Hacking Expose!http://hackingexpose.blogspot.com/3
41Hacking Tips and Trickshttp://pc-tips-hacks.blogspot.com/3
42Hacking-Gurushttp://www.hacking-gurus.net/0
43Hex bloghttp://hexblog.com/5
44HEXALE (security. reverse engineering. stuff.)http://hexale.blogspot.com/4
45j00ru//vx tech bloghttp://j00ru.vexillium.org/4
46Jeremiah Grossmanhttp://jeremiahgrossman.blogspot.com/6
47Krebs on Securityhttp://krebsonsecurity.com/6
48Ksecurity-Teamhttp://sql-injection-tools.blogspot.com/2
49LIUDIEYU English Bloghttp://liudieyu0.blog124.fc2.com/3
50ls /life /code /coffeehttp://g3nto.blogspot.com/0
51Marco Ramilli's Bloghttp://marcoramilli.blogspot.com/3
52McGrew Security Bloghttp://www.mcgrewsecurity.com/4
53Metasploithttp://blog.metasploit.com/5
54Microsoft Malware Protection Centerhttp://blogs.technet.com/mmpc/default.aspx6
55MrCracker.comhttp://mrcracker.com/4
56Offensive securityhttp://www.offensive-security.com/blog4
57Okamalo Security Watchhttp://www.okamalo.com/2
58Online Security Blog (OSB)http://onlinesecurityblog.info/1
59Panda Research Bloghttp://research.pandasecurity.com/5
60PCMag Security Watchhttp://blogs.pcmag.com/securitywatch/4
61pctrojanhttp://www.pctrojan.com/2
62Pedram Amini - Bloghttp://pedram.openrce.org/4
63PENTEST101http://pentest101.blogspot.com/0
64PenTestIThttp://pentestit.com/3
65Peter Van Eeckhoutte's Bloghttp://www.corelan.be:8800/4
66Rafay Hacking Articleshttp://rafayhackingarticles.blogspot.com/4
67Redspin Security Bloghttp://www.redspin.com/blog4
68ret2libc - Reverse Engineering & relatedhttp://ret2libc.blogspot.com/4
69Reverse Engineering Bloghttp://reversingtools.blogspot.com/2
70Reversemodehttp://reversemode.com/5
71Reversing.ARhttp://blog.reversing.com.ar/0
72Rootbiezhttp://rootbiez.blogspot.com/2
73SANS Internet Storm Center, InfoCON: greenhttp://isc.sans.org/8
74Schneier on Securityhttp://www.schneier.com/blog/4
75SearchSecurity: Network Security Tacticshttp://searchsecurity.techtarget.com/?track=sy2607
76SearchSecurity: Security Wire Daily Newshttp://searchsecurity.techtarget.com/?track=sy1604
77Secumania Security Group Feedshttp://secumania.net/3
78Securelist / Bloghttp://www.securelist.com/en/6
79Security Active Bloghttp://blog.securityactive.co.uk/2
80Security Byteshttp://itknowledgeexchange.techtarget.com/security-bytes4
81Security Research by Alexander Sotirovhttp://www.phreedom.org/5
82Security Wire Weeklyhttp://itknowledgeexchange.techtarget.com/security-wire-weekly5
83Security-Shellhttp://security-sh3ll.blogspot.com/3
84Securosis Bloghttp://securosis.com/blog/5
85SkullSecurityhttp://www.skullsecurity.org/blog4
86SPAMfighter Newshttp://www.spamfighter.com/6
87Spyware newshttp://www.2-spyware.com/news4
88Sucuri Securityhttp://blog.sucuri.net/3
89TaoSecurityhttp://taosecurity.blogspot.com/6
90TechMeditationhttp://techmeditation.blogspot.com/0
91The Cuckoo's Egghttp://gucosc011.blogspot.com/4
92The Dark Visitorhttp://www.thedarkvisitor.com/5
93The Grey Cornerhttp://grey-corner.blogspot.com/1
94The Security Bloghttp://www.thesecurityblog.com/2
95TrendLabs | Malware Blog - by Trend Microhttp://blog.trendmicro.com/6
96VRThttp://vrt-sourcefire.blogspot.com/5
97Windows Incident Responsehttp://windowsir.blogspot.com/4
98xecurity.dehttp://xecurity.de/2
99Your Online Security Authority Bloghttp://www.onlinesecurityauthority.com/3
100ZoneAlarm Bloghttp://blog.zonealarm.com/blog/6

No comments:

Post a Comment