root labs rdist
This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...
http://rdist.root.org/
popularity:
security
blog
blogs
crypto
cryptography
linux
software
research
computers
opensource
|
worm blog
I know Wormblog has been very, very silent lately as I've been ... Wormblog is a project to collect and share links about worm related ... Wormblog was ...
similarity:
popularity:
security
blog
worms
virus
blogs
research
worm
malware
hacking
programming
|
Usable Security
Panel: Usability of Security Software - Is Open Source a Positive, ... July 17, 2009 by Richard Conlan. Moderator: Luke Kowalski, Corporate UI Architect, Oracle ...
similarity:
popularity:
security
blog
usability
ui
blogs
hci
research
computer
identity
tech
|
Marcus J. Ranum
5/2009: Schneier and Ranum Face Off. Techtarget interviewed Bruce and myself ... Ranum's Rants. I'm blogging periodically about security on Tenable's blog. ...
similarity:
popularity:
security
blog
reference
blogs
geek
computer
unix
photography
people
networking
|
Darknet - The Darkside | Ethical Hacking, Penetration Testing & Computer Security
Darknet - The Darkside. Ethical Hacking, Penetration Testing & Computer Security ... Posted by Darknet to Hacking Tools, Linux Hacking, Network Hacking, Password ...
similarity:
popularity:
security
hacking
blog
tools
hack
linux
hacks
blogs
computer
howto
|
DoxPara Research
Features Paketto Keiretsu: a set of utilities for doing odd things to TCP/IP networks by "stretching the protocols ... Staring Into The Abyss dan@doxpara.com ... (such as www.doxpara.com) to numbers the ...
similarity:
popularity:
security
dns
hacking
blog
network
research
internet
software
tools
vulnerability
|
Google Online Security Blog
News and insights from Google on security and safety on the Internet. ... Posted by Alma Whitten, Software Engineer, Security & Privacy Teams ...
similarity:
popularity:
security
google
blog
internet
blogs
malware
research
web
hacking
computer
|
Jeremiah Grossman
One of the things that makes Black Hat so friggin' awesome is the quality of the ... Bleeding-edge material, theoretical and applicable, seen no where else covering ...
similarity:
popularity:
security
blog
hacking
web
javascript
blogs
css
ajax
xss
hack
|
TrueCrypt - Free Open-Source On-The-Fly Disk Encryption Software for Windows Vista/XP, Mac OS X and Linux
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
Security-Hacks.com - Security tips and tricks!
No information avaiable
similarity:
popularity:
security
hacking
blog
tutorials
software
blogs
howto
news
database
sysadmin
|
Krebs on Security
No information avaiable
similarity:
popularity:
security
blog
blogs
computer
news
virus
tech
info
krebs
forensics
|