Exploit

Results: 786



#Item
431C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2011-06-28 13:43:18
432Sheryl WuDunn / Question / Brand / The New York Times / News media / Nicholas D. Kristof / Journalism / Half the Sky: Turning Oppression into Opportunity for Women Worldwide

WHO MADE MY CLOTHES? by Regina Rumford, M.Ed., IHE certificate grad, teacher PURPOSE Students will investigate the "birth place" of their clothes, learn about how those clothes are connected to the oppression and exploit

Add to Reading List

Source URL: humaneeducation.org

Language: English - Date: 2014-11-05 13:56:56
433Security / Software testing / Hacking / Vulnerability / Exploit / Social engineering / Malware / Password / Access control / Computer network security / Cyberwarfare / Computer security

Analysis of Social Engineering Threats with Attack Graphs Kristian Beckers1 , Leanid Krautsevich2 , Artsiom Yautsiukhin2 1 paluno – The Ruhr Institute for Software Technology – University of Duisburg-Essen

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2015-04-02 07:11:50
434Computing / Software testing / Hacking / Vulnerability / Buffer overflow / Intrusion prevention system / Social vulnerability / Zero-day attack / Exploit / Cyberwarfare / Computer security / Computer network security

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
435Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Exploit / Attack / Information security / Computer security / Computer network security / Cyberwarfare

Penetration Testing β€œLet us find your vulnerabilities before anyone else does.” A Penetration Test or Vulnerability Assessment is used to discover what an unauthorised individual(s) may be able to achieve when target

Add to Reading List

Source URL: www.securitywizardry.com

Language: English - Date: 2013-01-25 17:48:05
436Malware / Computing / Crimeware / Botnets / Multi-agent systems / Spamming / Trend Micro / Zeus / Exploit / Computer network security / Cyberwarfare / Computer security

Trend Micro Incorporated Research Paper 2012 The Crimeware Evolution

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-12-21 03:49:00
437Behavior / Statistics / Neural networks / Machine learning / Perceptron / Artificial neural network / Operant conditioning / Reinforcement / Matching law / Behaviorism / Learning / Computational neuroscience

1368 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 20, NO. 8, AUGUST 2009 Simple Artificial Neural Networks That Match Probability and Exploit and Explore When Confronting

Add to Reading List

Source URL: www.bcp.psych.ualberta.ca

Language: English - Date: 2012-07-11 15:01:06
438System software / Secure Shell / Port knocking / Firewall / Nmap / Vulnerability / OpenSSH / Exploit / Stateful firewall / Software / Computer network security / Computing

Advances In Single Packet Authorization Michael Rash Enterasys Networks, Inc. http://www.cipherdyne.org/ ShmooCon

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:38:56
439Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
440IBM Rational Business Developer Extension / Software development / EGL / Technology / Service-oriented architecture / IBM DeveloperWorks / IBM / Web service / Rational Software / Computing / IBM software / UML Partners

Accelerate Web and SOA development with IBM Rational Business Developer extension Exploit EGL, the newest and most advanced business language By Reginaldo W. Barosa TechWorks Practice Lead

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2008-02-28 12:33:56
UPDATE