Exploit

Results: 786



#Item
361Shellcode / Software / Command shells / Batch file / Exploit / Security token / System call / Shell / Command Prompt / Computing / Scripting languages / System software

An Introduction to MOSDEF Dave Aitel Immunity, Inc http://www.immunitysec.com Who am I?

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
362Petroleum production / Energy / Measurement while drilling / Economic geology / Drill bit / Coal mining / Drilling / Coal / Weight on bit / Technology / Petroleum / Oilfield terminology

CASE STUDY / EUREKA Automatically detecting coal seams Maptek™ Eureka™ allows users to fully exploit LAS and MWD (measurements while drilling) data for building accurate coal strata models. LAS data

Add to Reading List

Source URL: www.maptek.com

Language: English - Date: 2015-03-16 23:44:58
363Virtual machines / Dynamic-link library / Computer virus / Hypervisor / Sandbox / Malware / Library / Full virtualization / VirtualBox / System software / Software / VMware

Breaking the Sandbox Author: Sudeep Singh Introduction In this paper, I would like to discuss various existing and interesting techniques which are used to evade the detection of a virus in Sandbox. We will also look at

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2014-09-09 07:50:36
364Windows Server / Science / Academia / Knowledge / Network security / Exploit / Game theory

Using Strategy Objectives for Network Security Analysis Elie Bursztein1 and John C. Mitchell2 {elie|mitchell}@cs.stanford.edu 1 Stanford University and LSV, ENS Cachan

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:56:15
365Denial-of-service attacks / Denial-of-service attack / Internet Relay Chat / Software testing / Exploit / Vulnerability / Attack / Attack patterns / Computer insecurity / Cyberwarfare / Computer network security / Computer security

DDoS for Zombies John "JI" Ioannidis AT&T Labs – Research

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-10-09 02:05:59
366Free improvisation / Musical improvisation / Shackle / Rick Deckard / Computer music / Music / Anne La Berge / Blade Runner

Shackle is Anne LaBerge on flute and electronics and Deckard on laptop-instrument. Their aim is to explicity and subtly exploit shackling in both concept and material. shackle |ˈ sh akəәl| 1. used in reference to some

Add to Reading List

Source URL: shackle.eu

Language: English - Date: 2014-01-20 10:15:49
367Cyberwarfare / Espionage / Rogue software / Multi-agent systems / Spamming / Rogue security software / Spyware / Crimeware / Pharming / Malware / System software / Computer network security

Manufacturing Compromise: The Emergence of Exploit-as-a-Service 2 †

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2012-08-25 13:54:13
368University of Groningen / Database / Geographic information system / Astronomy / European Southern Observatory / Data model / Astrophysics / Data management / Radio telescopes / Science / LOFAR

What is Astro-WISE? The Astronomical Wide-field Imaging System for Europe, Astro-WISE, is an environment consisting of hardware and software which has been developed to be able to scientifically exploit the ever increas

Add to Reading List

Source URL: www.astro.rug.nl

Language: English - Date: 2007-11-08 06:17:18
369Azure Services Platform / Platform as a service / IICCRD / Cloud communications / Cloud computing / Centralized computing / Computing

NICF-Legal and Regulatory Considerations in Cloud Computing For Whom Anyone seeking to exploit the benefits of cloud computing technologies

Add to Reading List

Source URL: www.stmi.nus.edu.sg

Language: English - Date: 2012-10-23 03:27:09
370Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 03:59:23
UPDATE