Exploit

Results: 786



#Item
421Shellcode / Computer programming / GNU Debugger / NOP / Assembly language / INT / Exploit / Computing / Computer architecture / X86 instructions

Writing Remote Exploit [removed] Aug 2004 Over View

Add to Reading List

Source URL: www.chroot.org

Language: English - Date: 2004-10-03 12:23:07
422Government / Knowledge / Design / Economics / National innovation system / Technological change / Science policy / Knowledge economy / America COMPETES Act / Innovation / Science and technology studies / Science

VI MALAYSIA19 A. Introduction Scientific advancement and technological change are important drivers of economic performance today. The ability to create, distribute and exploit knowledge has become

Add to Reading List

Source URL: nis.apctt.org

Language: English - Date: 2011-12-02 00:19:38
423Shellcode / System software / Application programming interfaces / File descriptor / Standard streams / Exec / Port / System call / Exploit / Computing / Unix / Software

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery AKA: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-12-14 04:47:49
424Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
425Computer network security / Hacking / Software testing / National security / Secure communication / Vulnerability / Exploit / Password / Markov decision process / Cyberwarfare / Computer security / Statistics

Towards Modelling Adaptive Attacker’s Behaviour⋆ Leanid Krautsevich1 , Fabio Martinelli2 , and Artsiom Yautsiukhin2 1 2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2012-10-09 09:04:02
426

Exploit Test (Windows XP) of Internet Security Productswww.av-comparatives.org Anti-Virus Comparative

Add to Reading List

Source URL: www.av-comparatives.org

Language: Chinese - Date: 2014-09-16 08:35:29
    427Privacy / Radio-frequency identification / Wireless / Isis Innovation / Solar cell / Technology / Automatic identification and data capture / Technology transfer

    Exploit new tech for competitiveness: ITF Projects Commercialisation Workshop Date: 23 & 24 Apr 2015 Time: 14:00 – 17:30

    Add to Reading List

    Source URL: www.hketa.org.hk

    Language: English - Date: 2015-04-09 04:32:25
    428Computer network security / Metasploit Project / Exploit / Snort / Attack / Grep / Transmission Control Protocol / Communications protocol / Software / Computer security / Computing

    Text Crossing the Streams with State Machines in IDS Signature Languages Michael Rash ShmooCon 2014 FireTalks

    Add to Reading List

    Source URL: www.cipherdyne.org

    Language: English - Date: 2014-01-18 20:47:09
    429Linux / SUSE Linux distributions / Filesystem Hierarchy Standard / File system / Linux architecture / Cooperative Linux / Software / System software / Computing

    Linux for S/390 How can Linux exploit the strengths of S/390? What different ways can Linux be installed on S/390?

    Add to Reading List

    Source URL: www.redbooks.ibm.com

    Language: English - Date: 2002-03-21 06:11:53
    430Position-independent code / David Brumley / Computing

    Update on Q: Exploit Hardening Made Easy Edward J. Schwartz Thanassis Avgerinos David Brumley

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-12-17 15:18:11
    UPDATE