Exploit

Results: 786



#Item
611Computing / DNS spoofing / Domain Name System Security Extensions / Name server / Microsoft DNS / Fully qualified domain name / Dan Kaminsky / Anycast / Root name server / Internet / Domain name system / Network architecture

Incident Response Guide to the Kaminsky DNS Cache Poison Exploit

Add to Reading List

Source URL: www.team-cymru.com

Language: English - Date: 2014-10-13 13:28:05
612Midale /  Saskatchewan / Evaporite

UTILIZING PETROGRAPHIC DATA TO EXPLOIT MIDALE BED RESERVOIRS IN THE ALAMEDA WEST STEELMAN AREA OF THE WILLISTON BASIN IN SOUTHEAST SASKATCHEWAN Gary A. Posehn, Athena Resources Ltd., Calgary, Alberta gary.posehn@athenare

Add to Reading List

Source URL: www.geoconvention.com

Language: English - Date: 2014-04-01 11:29:31
613Sex crimes / Slavery / Child labour / International criminal law / Ethics / Sexual slavery / Commercial sexual exploitation of children / Human trafficking in France / Human trafficking in Uruguay / Crime / Human trafficking / Crimes against humanity

Protected Innocence Challenge State Action . National Change. Maryland Report Card 2013 Maryland’s sex trafficking law makes it a crime to exploit a minor under 18 through commercial sex acts and does not

Add to Reading List

Source URL: sharedhope.org

Language: English - Date: 2013-11-06 10:17:08
614WordPress / Vulnerability / Exploit / Slider / Firefox / Software / PHP programming language / Blog software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-08-27 17:58:48
615Simple biosphere model

How can we exploit fluorescence simulations and retrievals? (or: what am I doing here?) Ian Baker Colorado State University

Add to Reading List

Source URL: www.kiss.caltech.edu

Language: English - Date: 2012-08-29 14:02:10
    616Computer architecture / MOV / Hooking / Pointer / Native API / Ntoskrnl.exe / High Level Assembly / Computing / Software engineering / Shellcode

    MS11[removed]Dissecting a 0 day By Ronnie Johndas 1

    Add to Reading List

    Source URL: www.exploit-db.com

    Language: English - Date: 2012-04-06 09:43:43
    617Security / Risk / Hacking / Software testing / Vulnerability / CVSS / Exploit / Attack / Social vulnerability / Computer network security / Cyberwarfare / Computer security

    IBM Security Systems IBM X-Force Threat Intelligence Quarterly, 3Q 2014 Get a closer look at Heartbleed—from the latest attack activity to mitigation strategies— using 2014 mid-year data and ongoing research

    Add to Reading List

    Source URL: public.dhe.ibm.com

    Language: English - Date: 2014-11-14 13:40:07
    618Security / Electronic commerce / Secure communication / Crime prevention / National security / Password / Vulnerability / Zero-day attack / Exploit / Cyberwarfare / Computer network security / Computer security

    HEARTBLEED — WHAT’S THE BIG FUSS? Heartbleed is a bug that some have described as the most serious vulnerability since the beginning of the Internet. OpenSSL — the encryption technology used by millions of websites

    Add to Reading List

    Source URL: www.aarnet.edu.au

    Language: English - Date: 2014-08-18 02:21:42
    619Member states of the African Union / Member states of the United Nations / International relations / Nationalism / Robert Mugabe / Vitalis Zvinavashe / Democratic Republic of the Congo / Global Witness / Zimbabwe / Africa / Political geography / Least developed countries

    “[OSLEG has] the resources to protect and defend, support logistically, and assist generally in the development of commercial ventures to explore, research, exploit and market the mineral, timber, and other resources h

    Add to Reading List

    Source URL: www.swradioafrica.com

    Language: English - Date: 2013-05-22 09:07:43
    620Biofuels / Bioenergy / Ethanol / Ethanol fuel / Biomass / Cellulosic ethanol / Butanol fuel / Biorefinery / Cellulosic ethanol commercialization / Sustainability / Chemistry / Energy

    The Entrepreneur and Technology - The Road Less Travelled I recently read through a book by Denzil J. Doyle titled : “Making Technology Happen - How to find, exploit and manage innovative products, services, and proces

    Add to Reading List

    Source URL: www.suschemalliance.ca

    Language: English - Date: 2014-09-13 01:27:54
    UPDATE