Rootkits

Results: 310



#Item
31Advanced	
  x86:	
    BIOS	
  and	
  System	
  Management	
  Mode	
  Internals	
   SMRAM	
  (System	
  Management	
  RAM)	
   Xeno	
  Kovah	
  &&	
  Corey	
  Kallenberg	
   LegbaCore,	
  LLC	
  

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   SMRAM  (System  Management  RAM)   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:08:48
32Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

Add to Reading List

Source URL: www.sentinelone.com

Language: English - Date: 2016-05-23 01:13:39
33The High Cost of Cutting Corners As the cost and likelihood of a breach grows you can’t afford “good enough” protection before, during, AND after an attack. Rootkits  Worms

The High Cost of Cutting Corners As the cost and likelihood of a breach grows you can’t afford “good enough” protection before, during, AND after an attack. Rootkits Worms

Add to Reading List

Source URL: www.testeznous.lu

Language: English - Date: 2016-04-14 08:33:53
    34Rootkits & Stealth Malware Medium-granularity class topics covered Xeno Kovah CC BY AT licensed hosted at OpenSecurityTraining.info

    Rootkits & Stealth Malware Medium-granularity class topics covered Xeno Kovah CC BY AT licensed hosted at OpenSecurityTraining.info

    Add to Reading List

    Source URL: www.opensecuritytraining.info

    Language: English - Date: 2014-03-02 22:01:32
      35Rootkits: What they are and how to find them Part 2 Xeno Kovah – 2010 xkovah at gmail

      Rootkits: What they are and how to find them Part 2 Xeno Kovah – 2010 xkovah at gmail

      Add to Reading List

      Source URL: www.opensecuritytraining.info

      Language: English - Date: 2014-03-02 22:01:43
        36Rootkits: What they are and how to find them Part 3 Xeno Kovah – 2010 xkovah at gmail

        Rootkits: What they are and how to find them Part 3 Xeno Kovah – 2010 xkovah at gmail

        Add to Reading List

        Source URL: www.opensecuritytraining.info

        Language: English - Date: 2014-03-02 22:01:46
          37Hardware Virtualization Rootkits Dino A. Dai Zovi  Agenda •

          Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda •

          Add to Reading List

          Source URL: www.trailofbits.com

          Language: English - Date: 2016-04-15 11:36:17
          38Challenges of Coordinated Linux & Android Intrusions IMF 2014 Eoghan Casey May 12, 2014

          Challenges of Coordinated Linux & Android Intrusions IMF 2014 Eoghan Casey May 12, 2014

          Add to Reading List

          Source URL: www.imf-conference.org

          Language: English - Date: 2014-05-21 12:58:37
          39ADVANCED MAC OS X ROOTKITS DINO A. DAI ZOVI  Abstract. The Mac OS X kernel (xnu) is a hybrid BSD and Mach kernel. While Unix-oriented rootkit techniques are pretty well known,

          ADVANCED MAC OS X ROOTKITS DINO A. DAI ZOVI Abstract. The Mac OS X kernel (xnu) is a hybrid BSD and Mach kernel. While Unix-oriented rootkit techniques are pretty well known,

          Add to Reading List

          Source URL: www.trailofbits.com

          Language: English
          40Cites & Insights: Crawford at Large

          Cites & Insights: Crawford at Large

          Add to Reading List

          Source URL: www.citesandinsights.info

          Language: English - Date: 2006-07-15 15:59:31