Trojan

Results: 685



#Item
71

Some authors readdress Monique Wittig’s thought on literature as the Trojan horse amidst academy’s walls, the war-machine whose ‘design and goal is to pulverize the old forms and formal conventions’. Others rely

Add to Reading List

Source URL: www.ief.hr

Language: English - Date: 2016-01-26 05:41:50
    72

    TURING AWARD LECTURE Reflections on Trusting Trust To wh:t extent sh.ou!d one tr~st a statement that a program is free of Trojan horses. Perhaps It IS more Important to trust the people who wrote the software.

    Add to Reading List

    Source URL: informatiques-orphelines.fr

    Language: English - Date: 2016-05-06 15:59:41
      73Malware / Cyberwarfare / Computer access control / Surveillance / Trojan horses / FinFisher / Morgan Marquis-Boire / Citizen Lab / Internet privacy / Bahrain / Server / World Wide Web

      Research Brief March 2013 The Citizen Lab You Only Click Twice:

      Add to Reading List

      Source URL: citizenlab.org

      Language: English - Date: 2015-06-02 11:36:57
      74Computer architecture / Computing / X86 architecture / Software / Assembly languages / X Sharp / JMP / X86 assembly language

      Initial execution of this .exe file opens a graphical user interface which indicates that it is a control program for a keystroke logger, i.e. a trojan that secretly monitors and records anything typed by a user. Further

      Add to Reading List

      Source URL: www.iacertification.org

      Language: English - Date: 2010-02-01 17:42:09
      75Software engineering / Computer programming / Computing / Procedural programming languages / Quine / D / ALGOL 68 / XPL / Printf format string / C / Pascal / Name mangling

      TURING AWARD LECTURE Reflections on Trusting Trust To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

      Add to Reading List

      Source URL: www.ece.cmu.edu

      Language: English - Date: 2002-10-03 01:20:59
      76

      Possible ecological risks of transgenic organism release when transgenes affect mating success: Sexual selection and the Trojan gene hypothesis William M. Muir*† and Richard D. Howard‡ *Department of Animal Sciences

      Add to Reading List

      Source URL: www.pnas.org

      Language: English - Date: 2011-03-25 23:23:06
        77Trojan horses / National security / Crime prevention / Cyberwarfare / Hacking / SpyEye / Computer security / Zeus / Malware / Kill chain / Vulnerability / RSA Security

        The Exploit Intelligence Project Dan Guido —————————

        Add to Reading List

        Source URL: www.trailofbits.com

        Language: English - Date: 2016-04-15 11:36:17
        78

        Crown International Travel, Inc. @ ALTOUR USC Trojan Family Weekend please complete form and email or fax it to crown/altour FAX TO: EMAIL TO: (Attn: Margarita) _

        Add to Reading List

        Source URL: www.crown-international.com

        Language: English - Date: 2015-02-19 20:43:54
          79

          Los Angeles Downtown News and Information - LA Downtown News Online > Archives > Entertainment > Trojan Grub Search the Site: Search Downtown LA: Sort by ----

          Add to Reading List

          Source URL: www.moretonfig.com

          Language: English - Date: 2016-02-26 15:33:54
            80

            Crown International Travel, Inc. @ ALTOUR USC Trojan Family Weekend please complete form and email or fax it to crown/altour FAX TO: EMAIL TO: (Attn: Margarita) _

            Add to Reading List

            Source URL: www.crown-international.com

            Language: English - Date: 2015-02-19 20:32:30
              UPDATE