Torpig

Results: 22



#Item
11Microsoft PowerPoint - botnet_detection2009.ppt

Microsoft PowerPoint - botnet_detection2009.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-06-18 01:23:21
12Microsoft PowerPoint - botnet_detection2009.ppt

Microsoft PowerPoint - botnet_detection2009.ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-06-18 01:23:20
13FOUO: SECURITY  1 Executive Summary On 2012, NBNCERT logged an investigation related to a suspected infected host on the NBNCO internal network. The host was

FOUO: SECURITY 1 Executive Summary On 2012, NBNCERT logged an investigation related to a suspected infected host on the NBNCO internal network. The host was "beaconing" to a server located in

Add to Reading List

Source URL: www.nbnco.com.au

Language: English - Date: 2015-03-15 14:57:04
14Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Department of Computer S

Your Botnet is My Botnet: Analysis of a Botnet Takeover Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Department of Computer S

Add to Reading List

Source URL: www.catonmat.net

Language: English - Date: 2010-04-12 16:52:45
15Melde- und Analysestelle Informationssicherung MELANI  Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:28
16Counter-Intelligence Against the Quickest Adversary Lance James  Numbers

Counter-Intelligence Against the Quickest Adversary Lance James Numbers

Add to Reading List

Source URL: antispywarecoalition.org

Language: English - Date: 2008-02-01 18:58:57
17Counter-Intelligence Against the Quickest Adversary Lance James  Numbers

Counter-Intelligence Against the Quickest Adversary Lance James Numbers

Add to Reading List

Source URL: www.antispywarecoalition.org

Language: English - Date: 2008-02-01 18:58:57
18Redesigning CERT.at’s incident handling capabilities – cherrypicking and learning from AH and Megatron L. Aaron Kaplan  <kaplan@cert.at>

Redesigning CERT.at’s incident handling capabilities – cherrypicking and learning from AH and Megatron L. Aaron Kaplan 

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2012-05-14 06:32:04
19Microsoft PowerPoint - Cert-Lexsi-DeadAngle-PRG-vs-Torpig.ppt [Mode de compatibilité]

Microsoft PowerPoint - Cert-Lexsi-DeadAngle-PRG-vs-Torpig.ppt [Mode de compatibilité]

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2009-02-05 11:24:01
20Malware Analysis  Analysis of a

Malware Analysis Analysis of a

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2013-08-28 21:33:56