Exploit

Results: 786



#Item
771Cybercrime / Anti-spam techniques / Email spam / Spam / Botnet / Honeypot / Malware / Phishing / Mail Abuse Prevention System / Spamming / Internet / Computing

Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs—An In-Depth Analysis

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-07-12 01:47:14
772IPhone / IOS / Address space layout randomization / Mobile application development / GNU Debugger / Mobile apps / Computing / Smartphones / Software

Whitepaper iOS Application (In)Security

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2012-05-04 03:51:33
773Sailing / Marine propulsion / Ship construction / Naval architecture / Navigation / Sail / Points of sail / Keel / Apparent wind / Boating / Watercraft / Water

The physics of sailing Bryon D. Anderson Sails and keels, like airplane wings, exploit Bernoulli’s principle.

Add to Reading List

Source URL: twodresslers.com

Language: English - Date: 2008-03-26 13:56:53
774Supermarket / Food industry / Michael Bergdahl / Walmart / Economy of the United States / Business

Case Study: How to Exploit Wal-Mart’s

Add to Reading List

Source URL: zenith-consulting.com

Language: English - Date: 2007-06-23 15:59:34
775Touchpoint / Advertising / Business / Marketing / Customer experience management / Brand management

Exploit innovaton potential to the maximum

Add to Reading List

Source URL: www.accelerom.com

Language: English - Date: 2012-11-01 11:14:13
776Hacking / Computer network security / Software testing / Zero-day attack / Exploit / Vulnerability / Adobe Flash / Malware / Arbitrary code execution / Cyberwarfare / Computer security / Software

Security Response The Elderwood Project

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2012-09-24 09:35:19
777Nobel laureates in Physics / Paris Institute of Technology / Ludwik Leibler / ESPCI ParisTech / Pierre and Marie Curie University / French National Centre for Scientific Research / Marie Curie / University of Paris 1 Pantheon-Sorbonne / ParisTech / France / Science / University of Paris

WORKSHOP / / NEW MATERIALS FOR ART Who can exploit the invisible nature ?

Add to Reading List

Source URL: www.labos.upmc.fr

Language: English - Date: 2009-10-21 07:38:29
778Software testing / Hacking / Computer network security / Vulnerability / Zero-day attack / Full disclosure / Exploit / Social vulnerability / Windows Metafile vulnerability / Computer security / Cyberwarfare / Risk

DRAFT The legitimate vulnerability market:

Add to Reading List

Source URL: securityevaluators.com

Language: English - Date: 2008-10-22 17:59:19
779

Captain Deasy’s Daring Drive (GB[removed]et la Martini : deux textes Le tournage de la réédition manquée de l’exploit du capitaine Deasy sur Martini n’est

Add to Reading List

Source URL: www.images.ch

Language: French - Date: 2008-04-15 16:13:23
    780Computer network security / Software testing / Metasploit Project / Software bugs / Hacking / Buffer overflow / Shellcode / Exploit / Internet Information Services / Computer security / Software / Cyberwarfare

    327_SSPC_12.qxd[removed]

    Add to Reading List

    Source URL: www.ecsl.cs.sunysb.edu

    Language: English - Date: 2011-02-10 11:07:34
    UPDATE