Exploit

Results: 786



#Item
301System software / Android / Embedded Linux / Malware / Cloud clients / Android Market / Android software development / Computer virus / Trojan horse / Software / Computing / Smartphones

PREC: Practical Root Exploit Containment for Android Devices Tsung-Hsuan Ho, Daniel Dean, Xiaohui Gu, William Enck Department of Computer Science North Carolina State University

Add to Reading List

Source URL: www.enck.org

Language: English
302Computer network security / Metasploit Project / Software testing / FOSDEM / Exploit / Ruby / Perl / Software / Computing / Scripting languages

METASPLOIT FOSDEM 2007 who am i ? H D Moore Metasploit project

Add to Reading List

Source URL: archive.fosdem.org

Language: English - Date: 2012-01-09 13:58:11
303Computer network security / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Metasploit Project / Exploit / Conficker / Computer virus / Cyberwarfare / Computer security / Computing

Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

Add to Reading List

Source URL: www.ics.forth.gr

Language: English - Date: 2012-03-22 09:28:01
304Information / Communications protocol / Eugene Thacker / Internet / Geert Lovink / Computer network / Technology / Alexander R. Galloway / Year of birth missing / Data

The Exploit Electronic Mediations Katherine Hayles, Mark Poster, and Samuel Weber, Series Editors 21 The Exploit: A Theory of Networks Alexander R. Galloway and Eugene Thacker

Add to Reading List

Source URL: dss-edit.com

Language: English - Date: 2012-03-07 01:35:33
305

TEXTE N°7 La notion d’exploit dans la petite enfance PLAN Introduction : qu’est-ce qu’un exploit quand on a entre 0 et 6 ans ? I. L’exploit pour se construire et construire son langage : de quelques mois à 3-4

Add to Reading List

Source URL: progmaternelle.free.fr

Language: French - Date: 2013-09-22 12:56:07
    306Cyberwarfare / Buffer overflow / Exploit / GNU Debugger / Stack / Buffer overflow protection / Shellcode / Software bugs / Computing / Computer programming

    CS 395, Section 22 Introduction to Computer Systems Dinda, Fall 2001

    Add to Reading List

    Source URL: www.cs.northwestern.edu

    Language: English - Date: 2003-01-31 17:41:14
    307Camera lens / M3 / C mount / Set screw / Objective / Mechanical engineering / Visual arts / Lens mounts / Screws / Technology

    Microscope Components Built-in Type Compact Microscope Series Compact and lightweight. Best-selling compact microscopes for production lines. Overview These compact microscopes exploit the exceptional performance of Nik

    Add to Reading List

    Source URL: nikon.com

    Language: English - Date: 2011-03-01 08:57:13
    308

    TEXTE N°8 (suite du N°7) Ce qui se joue dans le « Bravo ! » adressé aux enfants J’ai choisi de continuer l’exploration de la notion d’exploit, cette fois-ci dans un cadre d’accueil collectif des enfants. Plu

    Add to Reading List

    Source URL: progmaternelle.free.fr

    Language: French - Date: 2013-09-22 12:56:07
      309Internet / Internet Information Services / Email / Password / Exploit / Network security / Cyberwarfare / Hacking / Computing / Computer network security / Malware

      The Getaway: Methods and Defenses for Data Exfiltration Sean V Coyne Sean (dot) Coyne (at) MANDIANT.com January 2011

      Add to Reading List

      Source URL: media.blackhat.com

      Language: English - Date: 2012-04-07 14:20:14
      310Film production / Multimedia / E-learning / Lecture hall / Lecture / Education / Communication design / Design

      Encouraging staff to fully exploit the multimedia lecture room Jo Hamilton-Jones Andrew Rothery

      Add to Reading List

      Source URL: www.agocg.ac.uk

      Language: English - Date: 1999-02-17 09:07:16
      UPDATE