Backdoor

Results: 134



#Item
31

Hi The proposed amendments look suspiciously like a backdoor attempt to introduce an identity system in Scotland with ID cards. Any sharing of any individual’s data out with the NHS database should first have the indiv

Add to Reading List

Source URL: www.gov.scot

Language: English - Date: 2015-03-31 07:52:21
    32Spyware / Antivirus software / Malware / Computer network security / Email / Backdoor / Spam / Phoning home / Windows Vista / Internet / Computing / Espionage

    Microsoft Word - MitigationMonday_UNCLAS.doc

    Add to Reading List

    Source URL: www.nsa.gov

    Language: English - Date: 2008-11-12 13:16:34
    33Spyware / Computer worms / Agobot / W32 / Backdoor / Kaspersky Lab / Keystroke logging / Storm Worm / Insurrection / Malware / System software / Espionage

    Hacking in a Foreign Language: A Network Security Guide to Russia Kenneth Geers CISSP

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:35
    34Cyberwarfare / Backdoor / Computer keyboard / Keystroke logging / AutoRun / Espionage / Spyware / System software

    Microsoft PowerPoint - Blackhat2004.ppt

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:40
    35MySQL / Relational database management systems / Cross-platform software / SQL / Backdoor / Select / Oracle Database / User-defined function / MySQL Workbench / Software / Data management / Computing

    Backdoors for Mysql by Vicente Díaz () This document explores the possibility of creating backdoors for the last version of Mysqlusing the same techniques present in other RDBMs like Oracl

    Add to Reading List

    Source URL: www.edge-security.com

    Language: English - Date: 2007-05-05 14:27:19
    36Videotelephony / Android software / Skype / Web 2.0 / Tru / Microsoft / Lawful interception / Skype security / Skype Technologies / Software / Voice over IP / Computing

    Microsoft and Skype set to allow backdoor eavesdropping By < HYPERLINK "http://memeburn.com/author/stevennorris/" o "Posts by Steven Norris: Gearburn Editor" >Steven Norris: Gearburn EditorSource: < HYPERLINK

    Add to Reading List

    Source URL: www.1215.org

    Language: English - Date: 2013-03-14 05:55:50
    37Computer security / Cyberwarfare / Cloud computing / Veracode / Cryptography / Backdoor / Chris Wysopal / @stake / Rootkit / L0pht / Malware / System software

    PDF Document

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:26
    38Espionage / Backdoor / Rootkit / Code injection / Veracode / Loadable kernel module / Hooking / Eval / Self-modifying code / Malware / System software / Cyberwarfare

    PDF Document

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:26
    39Spamming / Malware / Backdoor / Linux / Perl / Spam / Daemon / Email spam / Computing / Software / Cross-platform software

    Unboxing Linux/Mumblehard Muttering spam from your servers Marc-Etienne M.Léveillé April 2015

    Add to Reading List

    Source URL: www.welivesecurity.com

    Language: English - Date: 2015-04-29 04:17:18
    40Fabless semiconductor companies / Cryptography / Actel / Backdoor / Microsemi / Field-programmable gate array / Joint Test Action Group / Power analysis / Advanced Encryption Standard / Espionage / Electronic engineering / Electronics

    Researchers’ response: Microsemi: Security claims with respect to ProASIC3 May 31, 2012 It was not our intention to make public disclosure at this time as the final paper “Breakthrough silicon scanning discovers back

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2012-06-01 10:28:42
    UPDATE