| Nr | Blog | URL | Page Rank | 
     | 1 | .:[ Layered Security ]:. | http://blog.layeredsec.com/ | 4 | 
     | 2 | [Black Security] | http://bl4cksecurity.blogspot.com/ | 4 | 
     | 3 | 0entropy | http://0entropy.blogspot.com/ | 0 | 
     | 4 | a4apphack | http://a4apphack.com/ | 1 | 
     | 5 | ADD / XOR / ROL | http://addxorrol.blogspot.com/ | 6 | 
     | 6 | Anton Chuvakin Blog - Security Warrior | http://chuvakin.blogspot.com/ | 5 | 
     | 7 | avast! Blog | http://blog.avast.com/ | 7 | 
     | 8 | badcoded | http://badcoded.blogspot.com/ | 4 | 
     | 9 | Breaking Code | http://breakingcode.wordpress.com/ | 4 | 
     | 10 | Brundle Lab | http://blog.carlosgarciaprado.com/ | 0 | 
     | 11 | Carnal0wnage Blog | http://carnal0wnage.blogspot.com/ | 5 | 
     | 12 | chackraview.net | http://blog.chackraview.net/ | 2 | 
     | 13 | Chris Evans blog | http://scarybeastsecurity.blogspot.com/ | 5 | 
     | 14 | Coffee To Code | http://coffeetocode.net/ | 1 | 
     | 15 | Command Line Kung Fu | http://blog.commandlinekungfu.com/ | 4 | 
     | 16 | Computer and DATA Theft Victims | http://computersecurity.blogspot.com/ | 3 | 
     | 17 | cruft | http://cruft.blogspot.com/ | 1 | 
     | 18 | Cruz3N | http://cruzenaldo.com/ | 0 | 
     | 19 | CyberCrime & Doing Time | http://garwarner.blogspot.com/ | 5 | 
     | 20 | Dancho Danchev's Blog | http://ddanchev.blogspot.com/ | 6 | 
     | 21 | Darknet - The Darkside | http://www.darknet.org.uk/ | 6 | 
     | 22 | Deadc0de's Security Blog | http://www.deadc0de.info/ | 0 | 
     | 23 | Didier Stevens | http://blog.didierstevens.com/ | 5 | 
     | 24 | Ero Carrera's blog | http://blog.dkbza.org/ | 4 | 
     | 25 | Evil Fingers - The Blog | http://ef.kaffenews.com/ | 0 | 
     | 26 | Evilcodecave's Weblog | http://evilcodecave.wordpress.com/ | 2 | 
     | 27 | evilcry's blog | http://www.offensivecomputing.net/?q=blog/1077 | 4 | 
     | 28 | Exploiting Stuff. | http://exploiting.wordpress.com/ | 3 | 
     | 29 | extraexploit | http://extraexploit.blogspot.com/ | 4 | 
     | 30 | Feliam's Blog | http://feliam.wordpress.com/ | 4 | 
     | 31 | FireEye Malware Intelligence Lab | http://blog.fireeye.com/research/ | 4 | 
     | 32 | Freehacking | http://www.freehacking.net/ | 2 | 
     | 33 | GNUCITIZEN | http://www.gnucitizen.org/ | 6 | 
     | 34 | Google Online Security Blog | http://googleonlinesecurity.blogspot.com/ | 6 | 
     | 35 | Graham Cluley's blog | http://www.sophos.com/blogs/gc/ | 7 | 
     | 36 | ha.ckers.org web application security lab | http://ha.ckers.org/blog | 6 | 
     | 37 | Hack In The Box | http://www.hackinthebox.org/ | 5 | 
     | 38 | HackBloc.org | https://hackbloc.org/ | 5 | 
     | 39 | Hackers Arena | http://31337h4cks.blogspot.com/ | 1 | 
     | 40 | Hacking Expose! | http://hackingexpose.blogspot.com/ | 3 | 
     | 41 | Hacking Tips and Tricks | http://pc-tips-hacks.blogspot.com/ | 3 | 
     | 42 | Hacking-Gurus | http://www.hacking-gurus.net/ | 0 | 
     | 43 | Hex blog | http://hexblog.com/ | 5 | 
     | 44 | HEXALE (security. reverse engineering.    stuff.) | http://hexale.blogspot.com/ | 4 | 
     | 45 | j00ru//vx tech blog | http://j00ru.vexillium.org/ | 4 | 
     | 46 | Jeremiah Grossman | http://jeremiahgrossman.blogspot.com/ | 6 | 
     | 47 | Krebs on Security | http://krebsonsecurity.com/ | 6 | 
     | 48 | Ksecurity-Team | http://sql-injection-tools.blogspot.com/ | 2 | 
     | 49 | LIUDIEYU English Blog | http://liudieyu0.blog124.fc2.com/ | 3 | 
     | 50 | ls /life /code /coffee | http://g3nto.blogspot.com/ | 0 | 
     | 51 | Marco Ramilli's Blog | http://marcoramilli.blogspot.com/ | 3 | 
     | 52 | McGrew Security Blog | http://www.mcgrewsecurity.com/ | 4 | 
     | 53 | Metasploit | http://blog.metasploit.com/ | 5 | 
     | 54 | Microsoft Malware Protection Center | http://blogs.technet.com/mmpc/default.aspx | 6 | 
     | 55 | MrCracker.com | http://mrcracker.com/ | 4 | 
     | 56 | Offensive security | http://www.offensive-security.com/blog | 4 | 
     | 57 | Okamalo Security Watch | http://www.okamalo.com/ | 2 | 
     | 58 | Online Security Blog (OSB) | http://onlinesecurityblog.info/ | 1 | 
     | 59 | Panda Research Blog | http://research.pandasecurity.com/ | 5 | 
     | 60 | PCMag Security Watch | http://blogs.pcmag.com/securitywatch/ | 4 | 
     | 61 | pctrojan | http://www.pctrojan.com/ | 2 | 
     | 62 | Pedram Amini - Blog | http://pedram.openrce.org/ | 4 | 
     | 63 | PENTEST101 | http://pentest101.blogspot.com/ | 0 | 
     | 64 | PenTestIT | http://pentestit.com/ | 3 | 
     | 65 | Peter Van Eeckhoutte's Blog | http://www.corelan.be:8800/ | 4 | 
     | 66 | Rafay Hacking Articles | http://rafayhackingarticles.blogspot.com/ | 4 | 
     | 67 | Redspin Security Blog | http://www.redspin.com/blog | 4 | 
     | 68 | ret2libc - Reverse Engineering &    related | http://ret2libc.blogspot.com/ | 4 | 
     | 69 | Reverse Engineering Blog | http://reversingtools.blogspot.com/ | 2 | 
     | 70 | Reversemode | http://reversemode.com/ | 5 | 
     | 71 | Reversing.AR | http://blog.reversing.com.ar/ | 0 | 
     | 72 | Rootbiez | http://rootbiez.blogspot.com/ | 2 | 
     | 73 | SANS Internet Storm Center, InfoCON: green | http://isc.sans.org/ | 8 | 
     | 74 | Schneier on Security | http://www.schneier.com/blog/ | 4 | 
     | 75 | SearchSecurity: Network Security Tactics | http://searchsecurity.techtarget.com/?track=sy260 | 7 | 
     | 76 | SearchSecurity: Security Wire Daily News | http://searchsecurity.techtarget.com/?track=sy160 | 4 | 
     | 77 | Secumania Security Group Feeds | http://secumania.net/ | 3 | 
     | 78 | Securelist / Blog | http://www.securelist.com/en/ | 6 | 
     | 79 | Security Active Blog | http://blog.securityactive.co.uk/ | 2 | 
     | 80 | Security Bytes | http://itknowledgeexchange.techtarget.com/security-bytes | 4 | 
     | 81 | Security Research by Alexander Sotirov | http://www.phreedom.org/ | 5 | 
     | 82 | Security Wire Weekly | http://itknowledgeexchange.techtarget.com/security-wire-weekly | 5 | 
     | 83 | Security-Shell | http://security-sh3ll.blogspot.com/ | 3 | 
     | 84 | Securosis Blog | http://securosis.com/blog/ | 5 | 
     | 85 | SkullSecurity | http://www.skullsecurity.org/blog | 4 | 
     | 86 | SPAMfighter News | http://www.spamfighter.com/ | 6 | 
     | 87 | Spyware news | http://www.2-spyware.com/news | 4 | 
     | 88 | Sucuri Security | http://blog.sucuri.net/ | 3 | 
     | 89 | TaoSecurity | http://taosecurity.blogspot.com/ | 6 | 
     | 90 | TechMeditation | http://techmeditation.blogspot.com/ | 0 | 
     | 91 | The Cuckoo's Egg | http://gucosc011.blogspot.com/ | 4 | 
     | 92 | The Dark Visitor | http://www.thedarkvisitor.com/ | 5 | 
     | 93 | The Grey Corner | http://grey-corner.blogspot.com/ | 1 | 
     | 94 | The Security Blog | http://www.thesecurityblog.com/ | 2 | 
     | 95 | TrendLabs | Malware Blog - by Trend Micro | http://blog.trendmicro.com/ | 6 | 
     | 96 | VRT | http://vrt-sourcefire.blogspot.com/ | 5 | 
     | 97 | Windows Incident Response | http://windowsir.blogspot.com/ | 4 | 
     | 98 | xecurity.de | http://xecurity.de/ | 2 | 
     | 99 | Your Online Security Authority Blog | http://www.onlinesecurityauthority.com/ | 3 | 
     | 100 | ZoneAlarm Blog | http://blog.zonealarm.com/blog/ | 6 | 
 
Bl4ckSecurity es el blog que anunció la falsa muerte de Str0ke hace unos meses.
ResponderEliminarjoé, cierto, si hasta vendían camisetas. Recientemente añadieron un post sobre smpctf y lo incluí en la lista. Pero vamos, que busco otro y lo cambio, ¿alguna sugerencia?
ResponderEliminarpd. curiosos los comentarios en chino, una belleza al traducirlos...
http://am0nr4.blogspot.com/
ResponderEliminarThanks! I've already added its feeds to our English blogroll
ResponderEliminarThanks to adding my Blog :D
ResponderEliminarNice list Bro...
TnX 4 l1sT-1n
ResponderEliminartnx4u all!
ResponderEliminarAdded + 12 new blogs to our English blogroll.
ResponderEliminarCurrently displaying 117. Need more?
I really enjoyed this post. You write about this topic very well. There are many cherished moments in life, why not wear a beautiful dress! When looking back on special memories of your child wearing a gorgeous dress, it will make a fond memory.
ResponderEliminararoma essential oils
great post as usual!
ResponderEliminarcialis
Hi,
ResponderEliminarPlease let me know your opinion about this. It is working wonders for me; i want to see if you too have the same experience with it.
http://Amara76.edigital.track.clicksure.com
Above is the link.
Safegadget.com has security tutorials for end users on How to secure their computers, smartphones, wifi, etc...
ResponderEliminarhttp://www.safegadget.com
I would recommend adding Seculert's blog on advanced persistent threats. It features industry news, security 101, and findings from our Research Lab. Check it out at http://www.seculert.com/blog/.
ResponderEliminarNice to find this useful resource from you.
ResponderEliminarThanks for sharing. Learn a lot from your Blog.I have read your blog about it-security-matter It is very help full.I really enjoyed reading it, you may be a great author.I must say you've done a wonderful job by sharing your article with us.Penetration Testing UK
ResponderEliminarsecurity and antivirus is very much important now a days,
ResponderEliminarwww.mcafee.com/mavw/retailcard