Windows NT kernel

Results: 156



#Item
11Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Add to Reading List

Source URL: www.lse.epita.fr

Language: English - Date: 2016-08-09 05:04:08
12Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute  Why Memory Forensics?

Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics?

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2012-10-01 09:12:55
13CodeValue C o lleg e Windows Internals Windows 2, 8.x, Server 2012, Server 2012 R2 Course Summary Table

CodeValue C o lleg e Windows Internals Windows 2, 8.x, Server 2012, Server 2012 R2 Course Summary Table

Add to Reading List

Source URL: www.codevalue.net

Language: English - Date: 2015-08-13 08:30:40
14High performance kernel mode web server for Windows Degree Project D, 10 credits Bo Brant´en Department for Applied Physics and Electronics at Ume˚ a University 1st June 2005

High performance kernel mode web server for Windows Degree Project D, 10 credits Bo Brant´en Department for Applied Physics and Electronics at Ume˚ a University 1st June 2005

Add to Reading List

Source URL: www.acc.umu.se

Language: English
15Rethinking the Library OS from the Top Down

Rethinking the Library OS from the Top Down

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2012-02-04 20:18:03
16Figures  FIGURE 1–1 Microsoft Windows NT 3.1 FIGURE 1–2 Copland architecture FIGURE 1–3 BeOS FIGURE 1–4 NEXTSTEP

Figures FIGURE 1–1 Microsoft Windows NT 3.1 FIGURE 1–2 Copland architecture FIGURE 1–3 BeOS FIGURE 1–4 NEXTSTEP

Add to Reading List

Source URL: osxbook.com

Language: English - Date: 2014-06-16 13:23:37
17Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http://free-electrons.com  1/45 Thomas Petazzoni I

Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http://free-electrons.com 1/45 Thomas Petazzoni I

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2013-11-21 12:14:40
18Kernel Attacks through User-Mode Callbacks Tarjei Mandt Norman Threat Research   Abstract. 15 years ago, Windows NT 4.0 introduced Win32k.sys to

Kernel Attacks through User-Mode Callbacks Tarjei Mandt Norman Threat Research Abstract. 15 years ago, Windows NT 4.0 introduced Win32k.sys to

Add to Reading List

Source URL: mista.nu

Language: English - Date: 2016-01-01 16:54:29
    19Virtual device passthrough for high speed VM networking Stefano Garzarella Giuseppe Lettieri  Luigi Rizzo

    Virtual device passthrough for high speed VM networking Stefano Garzarella Giuseppe Lettieri Luigi Rizzo

    Add to Reading List

    Source URL: info.iet.unipi.it

    Language: English - Date: 2015-03-15 11:52:49
    20IsGameOver() Anyone? Joanna Rutkowska Alexander Tereshkin  Invisible Things Lab

    IsGameOver() Anyone? Joanna Rutkowska Alexander Tereshkin Invisible Things Lab

    Add to Reading List

    Source URL: invisiblethingslab.com

    Language: English - Date: 2009-01-04 16:42:44