Didier Stevens
I did some research and discovered that Adobe implemented a blacklist ... but that the blacklisting functionality identifies the file type of "cmd.exe" as. ...
http://blog.didierstevens.com/
popularity:
security
blog
forensics
hacking
pdf
blogs
windows
malware
computers
research
|
Offensive Computing | Community Malicious code research and analysis
Finding the TDSS authors and affiliates ---- An Analysis. Released Buster Sandbox Analyzer ... Intelligence and operational level by Siberia Exploit Pack ...
similarity:
popularity:
security
malware
virus
hacking
research
reference
tools
spyware
software
exploits
|
securosis.com
The Business Justification for Data Security. Building a Web Application Security Program. Securosis: On Holiday. Database Security: The Other First Steps ...
similarity:
popularity:
security
blog
technology
mac
sysadmin
networking
network
osx
infosec
blogs
|
Hacking Truths
No information avaiable
similarity:
popularity:
hacking
security
hacks
blog
tips
resources
blogs
computer
hack
hacker
|
Lenny Zeltser's Website
Lenny Zeltser's publications, research, and projects related to information security, risk management, business, and life in general.
similarity:
popularity:
security
malware
web
hacking
people
blog
virus
technology
management
infosec
|
heise Security UK - it security news and services
No information avaiable
similarity:
popularity:
security
news
internet
blog
research
web
hacking
heise
php
computer
|
BugTraq.Ru
Russian Security Newsline BugTraq.Ru: Russian Security Newsline ... Наша команда, BugTraq.Ru Team объединяет более 3500 представителей стран бывшего ...
similarity:
popularity:
security
news
hacking
programming
russian
computers
software
blog
admin
it
|
Dark Reading - The Business of IT Security
Dark Reading is the premier online resource helping information security professionals manage the balance between protection and access. It offers breaking news and ...
similarity:
popularity:
security
news
hacking
technology
it
blog
reference
magazine
sysadmin
software
|
Hacker Factor: Computer Consulting, Solutions, and Security
Hacker Factor, a leader in cutting edge computer forensics research, provides ... A simple tool that determines an author's gender by vocabulary statistics. ...
similarity:
popularity:
security
hacking
tools
forensics
blog
news
hacker
analysis
writing
hack
|
Raymond.CC Blog - Daily updated news of useful advanced computer tips and tricks
Raymond.CC Blog. Daily updated news of useful advanced computer tips and tricks ... I would say that currently all of my time is dedicated in taking care of my baby ...
similarity:
popularity:
blog
windows
tips
hacks
security
tutorials
howto
computer
software
blogs
|
System Advancements at the Monastery
Information about developments at the Monastery ... July 19th 2009, "Blacklisting with Snort," http://blog.securitymonks.com/2009/07/19/blacklisting-with-snort ...
similarity:
popularity:
security
blog
blogs
infosec
|