Exploit

Results: 786



#Item
401Geometrical optics / Science of photography / Autofocus / Camera lens / Depth of field / Aperture / Pentax ME F / Nikon F-mount / Optics / Photography / Lens mounts

Using True Focus Introduction True Focus is primarily intended to relieve a situation caused by wanting to use auto-focus while having to continually make compositional changes. To be able to exploit True Focus correctly

Add to Reading List

Source URL: static.hasselblad.com

Language: English - Date: 2015-02-09 03:17:04
402Security / Software bugs / Software testing / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack / Buffer overflow / Cyberwarfare / Computer security / Computer network security

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:49:30
403Computer network security / Software testing / Metasploit Project / Rapid7 / Exploit / Penetration test / Attack / Brute-force attack / Evasion / Software / Computer security / Cyberwarfare

Test your defenses more efficiently Rapid7 Metasploit Express helps penetration testers conduct assessments with Metasploit Express your opponents’ moves helps you more efficiently by accelerating common Knowing better

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-08-27 14:54:18
404Computer network security / Software testing / Metasploit Project / Rapid7 / Hacking / Exploit / Penetration test / Attack / Evasion / Computer security / Software / Cyberwarfare

Test your defenses more efficiently Rapid7® Metasploit® Pro helps penetration testers conduct assessments with Metasploit Pro your opponents’ moves helps you more efficiently by accelerating common Knowing better pre

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-09-30 11:57:26
405

Comment optimiser A∗ adaptatif Adaptive A∗ : how to best exploit past problem-solving episodes Lou Fedon1 ,2 Antoine Cornuéjols2

Add to Reading List

Source URL: www.lri.fr

Language: French - Date: 2008-01-08 10:18:30
    406Computer network security / Software testing / Rapid7 / Metasploit Project / Exploit / Penetration test / Vulnerability scanner / Hacker / HD Moore / Software / Computer security / System software

    IT Security Case Study Rapid7 Metasploit Changes the Security Mindset at AutomationDirect AutomationDirect.com is a leading supplier of industrial automation equipment and associated components to manufacturers around t

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2012-11-27 09:30:09
    407Software / Web hosting / Cloud storage / Online backup services / Backup / Remote backup service / Mozy / Backup software / Data security / Computing

    Summary In 2006 Albert Metais, owner and founder of Steelgate, decided to exploit the market potential of online backup and founded Steelgate Technologies. The company specializes in providing secure online backup to me

    Add to Reading List

    Source URL: www.novastor.com

    Language: English - Date: 2014-11-03 21:16:30
    408C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

    Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    409Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

    AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    410Software bugs / Debuggers / Buffer overflow / Electronic filter / Filter / Vulnerability / Valgrind / Instruction set / Computing / Computer programming / Cyberwarfare

    Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software James Newsome Carnegie Mellon University [removed]

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    UPDATE