Exploit

Results: 786



#Item
521Internet / Political philosophy / Sociology / European Union / Federalism / .eu

Building bridges between public and private to exploit Europe’s minerals richness Brussels, 12 November 2014 The Minerals4EU Project was presented at the Stakeholders Engagement event on Tuesday 11th November 2014, at

Add to Reading List

Source URL: www.eurogeosurveys.org

Language: English - Date: 2014-11-14 09:30:37
522Financial crisis / Diversification / Government / Economics / State governments of the United States / New York City Economic Development Corporation / Economy of New York City / New York City

introduction Genuine crises almost always exploit longstanding systemic vulnerabilities. With an economy larger than many nations, New York City’s

Add to Reading List

Source URL: senseable.mit.edu

Language: English - Date: 2014-09-02 11:50:14
523

Ce Gala, unique au monde, qui met au-devant de la piste des sportifs handisport de très haut niveau, est le rendez-vous annuel de l’exploit et du dépassement de soi, il rencontre d’année en année un succès grand

Add to Reading List

Source URL: www.tthandisport.org

Language: French - Date: 2014-12-16 11:16:01
    524Security / Software testing / Risk / Hacking / Vulnerability / Patch / Social vulnerability / Exploit / Attack / Computer security / Cyberwarfare / Computer network security

    Vulnerability Disclosure Guideline for Software Developers Excerpt of Information Security Early Warning Partnership Guideline Appendix 5

    Add to Reading List

    Source URL: www.jpcert.or.jp

    Language: English - Date: 2013-05-01 02:40:04
    525

    Rames automotrices articulées GTW 2/6 et 2/8 à plancher surbaissé, pour le trafic régional de la THURBO, Suisse THURBO, une société appartenant aux Chemins de Fer Fédéraux (CFF) et au canton de Thurgovie, exploit

    Add to Reading List

    Source URL: www.stadlerrail.com

    Language: French - Date: 2014-10-27 06:14:35
      526

      Communiqué de presse Concours international de bateaux écoresponsable La HE-Arc remporte l’HydroContest ! La Haute École Arc Ingénierie a réalisé un véritable exploit, ce

      Add to Reading List

      Source URL: ingenierie.he-arc.ch

      Language: French - Date: 2014-07-26 15:25:59
        527Cyberwarfare / Computer network security / Security / Penetration test / Hacker / Vulnerability / White hat / Exploit / Security testing / Software testing / Hacking / Computer security

        Incorporating Cyber Threat Intelligence into Security Assessment

        Add to Reading List

        Source URL: digital-forensics.sans.org

        Language: English - Date: 2015-02-06 11:01:11
        528Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Exploit / Attack / Information security / Computer security / Computer network security / Cyberwarfare

        Penetration Testing “Let us find your vulnerabilities before anyone else does.” A Penetration Test or Vulnerability Assessment is used to discover what an unauthorised individual(s) may be able to achieve when target

        Add to Reading List

        Source URL: www.cndltd.com

        Language: English - Date: 2014-08-15 16:51:06
        529X86 architecture / Computer errors / X86 instructions / Assembly languages / Stack buffer overflow / X86 / MOV / Return-to-libc attack / Stack / Computing / Computer architecture / Software engineering

        Smashing the stack, an example from 2013 by Benjamin Randazzo August 2013 Stack overflow vulnerabilities have been made harder and harder to exploit over the years as

        Add to Reading List

        Source URL: www.exploit-db.com

        Language: English
        530Transmission Control Protocol / CAN bus / Toyota Prius / Toyota / Transport / Private transport / Technology

        Microsoft Word - car_hacking.docx

        Add to Reading List

        Source URL: www.exploit-db.com

        Language: English
        UPDATE