Didier Stevens
I did some research and discovered that Adobe implemented a blacklist ... but that the blacklisting functionality identifies the file type of "cmd.exe" as. ...
http://blog.didierstevens.com/
popularity:
security
blog
forensics
hacking
pdf
blogs
windows
malware
computers
research
|
Marcus J. Ranum
5/2009: Schneier and Ranum Face Off. Techtarget interviewed Bruce and myself ... Ranum's Rants. I'm blogging periodically about security on Tenable's blog. ...
similarity:
popularity:
security
blog
reference
blogs
geek
computer
unix
photography
people
networking
|
Un informático en el lado del mal
Blog sobre seguridad informática de Chema Alonso, MVP Windows Server Security de Microsoft.
similarity:
popularity:
seguridad
blog
hacking
blogs
security
informatica
microsoft
linux
hack
windows
|
Metasploit
Official blog of the Metasploit Project. Monday, May 11, 2009. Mastering the Metasploit Framework ... The next official Metasploit class will be held in Las ...
similarity:
popularity:
security
metasploit
blog
hacking
exploits
blogs
framework
iphone
news
hacks
|
The Art of Software Security Assessment
Continued ramblings on software security and code auditing ... I always find these types of bugs interesting because they require such unique ...
similarity:
popularity:
security
blog
programming
software
auditing
code
books
research
blogs
book
|
Grand Stream Dreams
I have just ordered the following books after a long wait in my wish-list pile: ... Mastering Windows Network Forensics and Investigation by Steven Anson, ...
similarity:
popularity:
windows
blog
security
tips
technology
blogs
malware
tools
resource
freeware
|
Global Guerrillas
Networked tribes, systems disruption, and the emerging bazaar of violence. ... Greg Burton on GG LINKS: Mid-July 2009. Jeffery on RC LINKS: Mid July 2009 ...
similarity:
popularity:
blog
politics
security
terrorism
military
war
warfare
blogs
news
technology
|
Security Absurdity
No information avaiable
similarity:
popularity:
security
blog
hacking
tech
news
sysadmin
internet
information
interesting
computer
|
Shadowserver Foundation - Main - HomePage
Established in 2004, The Shadowserver Foundation gathers intelligence on the ... Our mission is to understand and help put a stop to high stakes cybercrime in ...
similarity:
popularity:
security
research
botnet
malware
hacking
statistics
reference
web
internet
virus
|
Ben Edelman - Home
Ben Edelman - Original research on Internet architecture and regulation - Index of recent research, publications, and events ... IPv6 Incentives & Market ...
similarity:
popularity:
spyware
security
blog
malware
adware
law
research
blogs
advertising
web
|
The Honeynet Project
Group of security professionals dedicated to learning the tools, tactics, and motives of the blackhat community and sharing those lessons learned.
similarity:
popularity:
security
honeypot
network
hacking
tools
honeynet
research
software
opensource
forensics
|