Gemplus products, solutions and services
No information avaiable
http://www.gemplus.com/
popularity:
smartcard
security
rfid
smartcards
development
programming
job
partnership
|
Cross-domain policy file specification | Adobe Developer Connection
No information avaiable
similarity:
popularity:
flash
crossdomain
security
flex
as3
xml
specification
development
policy
reference
|
Scapy
... to scapy.ml-subscribe(at)secdev.org. To send a mail to the mailing-list: scapy.ml(at)secdev.org ... Scapy reference repository is at http://hg.secdev.org/scapy ...
similarity:
popularity:
security
python
network
networking
tools
packet
tool
programming
software
hacking
|
Smashing the Stack for Fun and Profit by Aleph One
No information avaiable
similarity:
popularity:
security
programming
hacking
stack
c
tutorial
hack
linux
overflow
buffer
|
How We Learned to Cheat at Online Poker: A Study in Software Security [Cigital]
Poker is a card game that many people around the world enjoy. Poker is played at kitchen tables, in casinos, and cardrooms -- and more recently, the Web. ...
similarity:
popularity:
poker
security
programming
random
games
interesting
algorithm
algorithms
toread
cryptography
|
spychips.com - how RFID will compromise privacy, security, freedom
A project of CASPIAN that is opposed to the use of RFID tags in consumer goods.
similarity:
popularity:
rfid
privacy
security
technology
politics
activism
tech
surveillance
science
news
|
ZSFA -- The Big Ruby Vulnerabilities
No information avaiable
similarity:
popularity:
ruby
security
hacking
programming
code
rubyonrails
hacks
reading
development
zedshaw
|
W A S M . R U: Системное ∞ низкоуровневое программирование
· Документы WASM.RU · PE/PE32+/CLR/ELF/OMF/etc-формат · Реверсирование · Дзэн · Алгоритмизация ... © 2002-2009 wasm.ru - all rights reserved and reversed ...
similarity:
popularity:
programming
asm
assembler
security
development
hacking
hack
crack
russian
tools
|
0xdeadbeef dot info | raptor's labs
Extensive information about ethical hacking and vulnerability ... Send feedback to: Marco Ivaldi <raptor[at]0xdeadbeef.info> (PGP key). "Software is like sex. ...
similarity:
popularity:
security
hacking
exploits
pentest
tools
linux
hack
programming
hacker
reference
|
Digital Web Magazine - Building a Bulletproof Contact Form with PHP
Digital Web Magazine - Building a Bulletproof Contact Form with PHP ... but the rise of the spammer has made us justifiably wary of publicizing our contact ...
similarity:
popularity:
php
forms
security
form
webdesign
development
tutorial
howto
programming
contact
|
Software Quality and Security Analysis | Coverity
Static source code analysis, static analysis using software quality products to find critical software defects in system architecture & source code programming. ...
similarity:
popularity:
software
programming
testing
tools
analysis
development
security
code
staticanalysis
quality
|