Hacking

Results: 3953



#Item
891

DEFCON CTF ’08 Binary 400 FreeBSD 6.x Kernel Module Hacking Binary 400: http://nopsr.us/ctf2008qual/reversing400-b05c8059389c8ade8e1a10314f458be5

Add to Reading List

Source URL: ruffnex.oc.to

Language: Japanese - Date: 2009-01-21 11:21:57
    892War / Information operations / Electronic warfare / Hacking / Military technology / IWar / Information warfare / United States Military Academy / United States Air Force Academy / Military science / Colorado counties / Cyberwarfare

    THE CYBER DEFENSE EXERCISE: AN EVALUATION OF THE EFFECTIVENESS OF INFORMATION ASSURANCE EDUCATION Wayne J. Schepens National Security Agency Information Technology Operations Center United States Military Academy

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:30
    893News International phone hacking scandal / Satellite television / RAI / Broadcasting / Television / United Kingdom / British brands / BSkyB / Digital television in the United Kingdom

    Media rights sales - UEFA Europa League

    Add to Reading List

    Source URL: de.uefa.org

    Language: English - Date: 2015-04-11 01:08:30
    894Cyberwarfare / War / Electronic engineering / Military science / Electromagnetism / Rajiv Gandhi National Cyber Law Center / Electronic warfare / Hacking / Military technology

    Electronics with cyber security what? It does

    Add to Reading List

    Source URL: www.smallpeicetrust.org.uk

    Language: English - Date: 2015-04-09 09:36:36
    895Hacking / Booz Allen Hamilton / Cyberwarfare / Malware / War / Military science / Advanced persistent threat / Computer security / Electronic warfare

    Countering Advanced Persistent Threats: A Strategic Approach to a Growing Danger

    Add to Reading List

    Source URL: mena.boozallen.com

    Language: English - Date: 2015-04-28 01:21:07
    896Computing / Software testing / Hacking / Cross-site scripting / Cross-site tracing / Vulnerability / Electronic commerce / SQL injection / Web application security / Cyberwarfare / Computer security / Computer network security

    Challenges of Automated Web Application Scanning "Why automated scanning only solves half the problem." Black Hat Federal Washington D.C. October 2, 2003 © 2003 by WhiteHat Security, Inc.

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:30
    897Internet / Computer security / Computer networking / Hacking / Internet ethics / DNS rebinding / DNS spoofing / Proxy server / Cross-site request forgery / Computing / Computer network security / Domain name system

    Intranet Invasion Through Anti-DNS Pinning David Byrne, CISSP, MCSE Security Architect EchoStar Satellite / Dish Network

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    898Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2014-08-24 01:28:14
    899Computer security / Computing / Hacking / Symantec / Cyberwarfare / Information security / Lords of Dharmaraja / Cyber-security regulation / Security / Crime prevention / National security

    WHITE PAPER: CYBER RESILIENCE: INTELLIGENT SECURITY .FORTODAY’SCONNECTED . . . . . . . . . . . .ENTERPRISE

    Add to Reading List

    Source URL: wcc.on24.com

    Language: English - Date: 2015-02-26 10:59:33
    900Computer network security / Hacking / Software testing / Vulnerability / Attack / Mitre Corporation / Mitre / Cyberwarfare / Computer security / Clothing

    Unforgivable Vulnerabilities Steve Christey The MITRE Corporation August 2, 2007

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    UPDATE