阿碼外傳-阿碼科技非官方中文 Bl...
惡意的PDF檔案一點都不是新聞,過去 doc、flash 以及圖片等都已經被大量利用在 PC 的感染中,但前一陣子在日本以及各地頻傳的事件 (1,2) 顯示,才 ... 這次利用的攻擊瀏覽器方式稱為 JSRedir-R,它其實是一種攻擊方式的通稱,在友廠的分類說明中可以見到它是利用 PDF, Flash/SWF 的漏洞來讓瀏覽器, ...
http://armorize-cht.blogspot.com/
popularity:
security
blog
技
其他
tech
free
network
|
Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
|
PaulDotCom's Web Site
PaulDotCom Security Weekly - Episode 159 - July 9, 2009. Metasploit OWC ActiveX Exploit ... The PaulDotCom/i-Hacked DEFCON Party ...
similarity:
popularity:
security
podcast
hacking
blog
infosec
podcasts
network
blogs
technology
networking
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
Marcus J. Ranum
5/2009: Schneier and Ranum Face Off. Techtarget interviewed Bruce and myself ... Ranum's Rants. I'm blogging periodically about security on Tenable's blog. ...
similarity:
popularity:
security
blog
reference
blogs
geek
computer
unix
photography
people
networking
|
Network Endpoint Security News - Watch Your End
Chris Ogle from Whangerei in New Zealand got more than he bargained for when he ... Some files contained telephone numbers for soldiers who were posted to ...
similarity:
popularity:
security
news
blog
networking
hacking
network
endpoint
hacker
computer
internet
|
网络安全焦点::自由的信息安全、黑客攻防和漏洞研究组织
自由的信息安全、黑客攻防和漏洞研究组织 ... http://hope.xfocus.net. 精华文档. 文档:xfocus.chm. 日期:2006-01-14. 大小:17.81M. 京ICP备05012090号. Copyright © 1998-2006 XFOCUS Team. All Rights Reserved ...
similarity:
popularity:
security
网络安全
hack
network
hacker
安全
黑客
tech
linux
hacking
|
Jeremiah Grossman
One of the things that makes Black Hat so friggin' awesome is the quality of the ... Bleeding-edge material, theoretical and applicable, seen no where else covering ...
similarity:
popularity:
security
blog
hacking
web
javascript
blogs
css
ajax
xss
hack
|
SunbeltBLOG
No information avaiable
similarity:
popularity:
security
blog
spyware
blogs
software
anti-spyware
news
technology
malware
virus
|
[lcamtuf.coredump.cx]
Click here for sample chapters, plenty of reviews, and other useful information. ... NEW Interesting vulnerabilities: exploitable DOM fuzzing crashes in multiple ...
similarity:
popularity:
security
hacking
programming
tools
network
software
people
blog
linux
geek
|
SecGuru
Remember the good old days, when all you needed was a phone number and maybe a ... And on top of all that we've added LinkedIn and Facebook accounts and ...
similarity:
popularity:
security
tools
hacking
news
network
infosec
exploits
linux
blog
vulnerabilities
|