X86 architecture

Results: 1288



#Item
871Memory management / X86 architecture / Computer errors / Linux kernel / Linux / Local Descriptor Table / Kernel / C dynamic memory allocation / Loadable kernel module / Computer architecture / Computing / System software

Linux Kernel do_brk() Vulnerablility Copyright © 2003 iSEC Security Research THIS DOCUMENT AND ALL OF THE INFORMATION IT CONTAINS ARE PROVIDED "AS IS", FOR EDUCATIONAL PURPOSES ONLY, WITHOUT WARRANTY OF ANY KIND, WETHE

Add to Reading List

Source URL: isec.pl

Language: English - Date: 2013-04-06 18:26:03
872Cross-platform software / X86 architecture / X86-64 / 64-bit / Visual C++ / Linux / Solaris / Crypto++ / CimTrak / Software / Computing / Cryptographic software

RSA BSAFE Crypto-C Micro Edition[removed]Security Policy (not SPARC T4) Level 2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-26 16:07:14
873X86 architecture / Assembly languages / X86 assembly language / X86 / Algorithm / Infinite loop / Control flow / For loop / CPUID / Computer architecture / Computing / Computer programming

Next-Generation Software Engineering

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2014-01-13 14:03:55
874X86 architecture / MOV / Accumulator / Pointer / Brainfuck / .dwg / Shellcode / High Level Assembly / CPUID / Computing / Computer architecture / X86 instructions

security research Autodesk AutoCAD DWG-AC1021 Heap Corruption

Add to Reading List

Source URL: www.binamuse.com

Language: English
875X86 instructions / Programming language implementation / IBM Basic assembly language / MOS Technology / INT / Interrupts in 65xx processors / Endianness / KERNAL / Atari Assembler Editor / Computer architecture / Computing / Assembly languages

win2c64 manual (version 2.0) Aart J.C. Bik (http://www.aartbik.com/) 1 Assembler Usage

Add to Reading List

Source URL: www.aartbik.com

Language: English - Date: 2012-04-18 01:07:58
876Trusted computing / Trusted Execution Technology / x86 architecture / Intel / Trusted Computing Group / Ring / Malware / Intel vPro / Computer security / Computer hardware / Computing

Bringing The Trust Back Into Cyber Space: Extending Intel’s commitment to Security Steve Pawlowski Intel Senior Fellow

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
877Microsoft Windows / GIS software / Windows Server / Windows NT / SUSE Linux Enterprise Server / ArcGIS / Windows / X86-64 / Hyper-V / Software / Computer architecture / System software

ArcGIS Server Supported Platforms Server Platform ArcGIS Server for the Microsoft .NET

Add to Reading List

Source URL: downloads.esri.com

Language: English - Date: 2012-05-08 12:33:20
878Pentium Pro / Cyrix 6x86 / X86 / Cyrix / P5 / Windows NT / Pentium compatible processor / Silicon Integrated Systems / Cyrix Cx5x86 / Computer architecture / Computing / Microsoft Windows

I NFORMATION LINK January 1997

Add to Reading List

Source URL: www.nd.gov

Language: English - Date: 2010-12-30 15:04:52
879Computer architecture / Value added tax / X86-64 / Oracle Database / Computing / Software / Windows XP / Microsoft Windows

PDFlib 8 purchase order and licensing notes

Add to Reading List

Source URL: www.pdflib.com

Language: English - Date: 2013-06-20 07:08:45
880Computer architecture / Value added tax / Oracle Database / X86-64 / Royalties / Computing / Software / Windows XP / Microsoft Windows

PDFlib 9 purchase order and licensing notes

Add to Reading List

Source URL: www.pdflib.com

Language: English - Date: 2014-05-19 08:19:23
UPDATE