Rootkit

Results: 605



#Item
331Windows NT architecture / Svchost.exe / Malware / Service Control Manager / Session Manager Subsystem / Windows Registry / Rootkit / Environment variable / Windows service / Microsoft Windows / System software / Computing

S A N S D F I R C urriculum

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-03-14 15:52:44
332Computer forensics / Digital forensics / Malware / Forensic disk controller / Anti-computer forensics / Rootkit / Network forensics / Mobile device forensics / EnCase / Computer security / System software / Computing

C O U R S E C A T A L O G SANS Forensics Curriculum SANS Digital Forensics and Incident Response line-up features courses both

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2013-09-16 10:47:34
333Security / Evasion / Firewall / Rootkit / Intrusion prevention system / Honeypot / Computer network security / Computer security / Cyberwarfare

Agile Defensive Technologies IOC Bucket, LLC Agenda  Anatomy of the Attack  Defense in Depth Capabilities

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-02-18 18:41:54
334Multi-agent systems / Spamming / Bitcoin / Peer-to-peer computing / Botnets / Malware / Cryptographic nonce / Rootkit / Mining / Computing / Internet / Computer network security

Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier∗ , Damon McCoy† , Stefan Savage, Nicholas Weaver∗ Alex C. Snoeren and Kirill Levchenko UC San D

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:56
335Cyberwarfare / Malware / Microsoft Security Essentials / Kaspersky Lab / Spyware / Phishing / Rootkit / Zero-day attack / Kaspersky Internet Security / Antivirus software / System software / Computer security

IT SECURITY BY THE NUMBERS: CALCULATING THE TOTAL COST OF PROTECTION The Hidden Cost of Complexity Cloud computing … mobile devices … web applications…

Add to Reading List

Source URL: go.kaspersky.com

Language: English - Date: 2014-12-13 16:25:27
336Software bugs / Stack buffer overflow / Memory safety / Buffer overflow / Vulnerability / Arbitrary code execution / Rootkit / Shellcode / Code injection / Computer security / Cyberwarfare / Computing

Recent Developments in Low-Level Software Security Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, and Frank Piessens IBBT-Distrinet, Katholieke Universiteit Leuven, Belgium, [removed]uve

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:02
337Computer security / ESET NOD32 / ESET / Real-time protection / Malware / Rootkit / Spyware / Panda Pro / Hitman Pro / Antivirus software / System software / Software

ESET NOD32 ANTIVIRUS 8 User Guide (intended for product version 8.0 and higher) Microsoft Windows[removed]Vista / XP / Home Server[removed]Home Server 2011 Click here to download the most recent version of this docu

Add to Reading List

Source URL: download.eset.com

Language: English - Date: 2014-10-21 10:11:58
338Virtual machines / Computer security / Malware / Rootkit / Monolithic kernels / Hypervisor / Kernel / Loadable kernel module / Ring / System software / Software / Linux kernel

Hello rootKitty: A lightweight invariance-enforcing framework Francesco Gadaleta, Nick Nikiforakis, Yves Younan, and Wouter Joosen IBBT-DistriNet Katholieke Universiteit Leuven Celestijnenlaan 200A B3001

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-01-01 13:06:07
339Software / Computer virus / Heuristic analysis / Heuristic / Dropper / Polymorphic code / Rootkit / Virus / Computer worm / System software / Malware / Antivirus software

:: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too.

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:03
340Antivirus software / Smartphones / Targeted threat / Android / Rogue security software / Trend Micro / Rootkit / Bolt / Conficker / System software / Malware / Software

TrendLabs 2Q 2013 Security Roundup Mobile Threats Go Full Throttle Device Flaws Lead to Risky Trail TREND MICRO | TrendLabs 2Q 2013 Security Roundup

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2013-08-06 02:19:50
UPDATE