Exploit

Results: 786



#Item
751Nanomaterials / Chemical safety assessment / Science / NANO / Time / Future / Regulation of nanotechnology / Impact of nanotechnology / Nanotechnology / Emerging technologies / Toxicology

European NGOs position paper on the Regulation of nanomaterials Nanomaterials are different from their bulk counterparts. They are specifically engineered to exploit the novel properties deriving from their size. The Eur

Add to Reading List

Source URL: www.beuc.eu

Language: English - Date: 2014-04-07 07:35:01
752European Union law / Federalism / .eu / Consumer protection / Internal Market / Euro / Law / Small business / Directive on services in the internal market / European Union / Economy of the European Union / Europe

A Common Sales Law for Europe What’s the issue? Despite the existence of the single European market, in reality only large multinational companies with armies of legal staff can exploit it to its full potential. Most s

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-02-03 12:26:46
753Nanomaterials / Chemical safety assessment / Science / NANO / Time / Future / Regulation of nanotechnology / Impact of nanotechnology / Nanotechnology / Emerging technologies / Toxicology

European NGOs position paper on the Regulation of nanomaterials Nanomaterials are different from their bulk counterparts. They are specifically engineered to exploit the novel properties deriving from their size. The Eur

Add to Reading List

Source URL: www.beuc.org

Language: English - Date: 2014-04-07 07:35:01
754Software quality / Stack buffer overflow / Shellcode / Vulnerability / Stack / X86 instruction listings / Pointer / X86 / Exploit / Computing / Software bugs / Cyberwarfare

University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

Add to Reading List

Source URL: www.cprover.org

Language: English - Date: 2009-10-05 15:17:48
755Computer programming / Stack buffer overflow / Data types / Buffer overflow / Return-to-libc attack / Primitive types / Address space layout randomization / C standard library / Constructor / Computing / Software bugs / Software engineering

Linux exploit development part 4 - ASCII armor bypass + return-to-plt NOTE: In case you missed my previous papers you can check them out here: Linux exploit development part 1 - Stack overflow Linux Exploit Writing Tuto

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2011-05-14 09:23:46
756Failure / Software testing / Hacking / Vulnerability / Exploit / Attack / Buffer overflow / Computer virus / Zero-day attack / Cyberwarfare / Computer security / Computer network security

The Lifecycle of a Vulnerability Copyright© 2005 internet Security Systems, Inc. All rights reserved worldwide Ahead of the threat.™ The Lifecycle of a Vulnerability

Add to Reading List

Source URL: www.iss.net

Language: English - Date: 2009-11-01 00:49:10
757

Paris, le 28 juin[removed]Position du CNPMEM en réponse à la consultation de la Commission européenne sur une éventuelle révision de la mise en œuvre du régime de l’Union européenne relatif aux pêcheries exploit

Add to Reading List

Source URL: ec.europa.eu

Language: French - Date: 2014-03-27 11:14:59
    758Antivirus software / Software testing / Malware / Address space layout randomization / Exploit / Vulnerability / Attack / Computer virus / Data Execution Prevention / Computer security / Cyberwarfare / Computer network security

    Anti-Exploitation Features Cyber attackers want access to your sensitive information or intellectual property for strategic advantage, or more commonly, for monetary gain. They commonly attempt to exploit vulnerabilitie

    Add to Reading List

    Source URL: www.nsa.gov

    Language: English - Date: 2013-11-21 11:32:47
    759Computer network security / Metasploit Project / Software testing / FOSDEM / Andrew Morton / Attack / Exploit / Computer security / Software / Cyberwarfare

    FOSDEM Metasploit Summary

    Add to Reading List

    Source URL: birmingham.pm.org

    Language: English - Date: 2007-03-21 09:20:16
    760Security / Risk / Hacking / Software testing / Vulnerability / Zero-day attack / Social vulnerability / Exploit / Full disclosure / Computer security / Computer network security / Cyberwarfare

    ►►EXPOSING THE SECURITY WEAKNESSES WE TEND TO OVERLOOK As security analysts we often get asked the question: “What threats and vulnerabilities do you expect we will see in the future?” This is a very interesting

    Add to Reading List

    Source URL: www.outpost24.com

    Language: English - Date: 2013-09-24 06:53:36
    UPDATE