what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files

Xcon2005_Liuxin.pdf
Posted Aug 31, 2005
Authored by LiuXin | Site xcon.xfocus.org

Xcon 2005: Research on Same Source Feature Measuring Technology of Software

SHA-256 | ecc8660c93c2e4c28023a871eed92a3fcae596c38b1fdc637a4405a90417300f
Xcon2005_ICBM.pdf
Posted Aug 31, 2005
Authored by ICBM | Site xcon.xfocus.org

Xcon 2005: Security in development environment

SHA-256 | ada975a45131d41540dbee4e5a081c01c8e6f6a5bc963b2035b134a6ac3b7f82
Xcon2005_Shok.pdf
Posted Aug 31, 2005
Authored by Matt Conover | Site xcon.xfocus.org

Xcon 2005: Profiling Malware and Rootkits from Kernel-Mode

tags | kernel
SHA-256 | f35044fbda6b53c3159c28d612cabdbcf4ab5bf98de1368f2d90bf6256db271e
Xcon2005_Baiyuanfan.pdf
Posted Aug 31, 2005
Authored by Baiyuanfan | Site xcon.xfocus.org

Xcon 2005: New thoughts in ring3 nt rootkit

SHA-256 | d0dc6ba9e5e2a145d29838a6a02926fda4ac8adb83af61bd3c4f840f4af2a2f0
Xcon2005_Seak.pdf
Posted Aug 31, 2005
Authored by Seak | Site xcon.xfocus.org

Xcon 2005: New architecture and approach in Network Virus Detection

tags | virus
SHA-256 | cdd1681d944eb8cec64eb1adac29df6247f521b7c6d350d79d1fe380205c85f0
Xcon2005_Tombkeeper.pdf
Posted Aug 31, 2005
Authored by TombKeeper | Site xcon.xfocus.org

Xcon 2005: I want to see farther

SHA-256 | b915fe90362db76cec184c3a1d6e71e00a87d32076bff84f7c84c37374aff602
Xcon2005_SoBeIt.pdf
Posted Aug 31, 2005
Authored by SoBeIt | Site xcon.xfocus.org

Xcon 2005: Windows Kernel Pool Overflow Exploitation

tags | overflow, kernel
systems | windows
SHA-256 | c7ba43a585d9880a05a3ab27f0be73b6725629e574a219b07e112b67dc36bfad
Xcon2005_San.pdf
Posted Aug 31, 2005
Authored by san | Site xcon.xfocus.org

Xcon 2005: Hacking Windows CE

systems | windows
SHA-256 | 590f520dff1623d1a11b0e8d49ad52cb7733604cf0dae833442b8908ea8a6183
Xcon2005_Marc_Schoenefeld.pdf
Posted Aug 31, 2005
Authored by Marc Schoenefeld | Site xcon.xfocus.org

Xcon 2005: Java & Secure Programming

tags | java
SHA-256 | d6b3ac72fd172c204d6d57072918910fec85af743030e6cc24440b1c52cf37dd
Xcon2005_Funnywei.pdf
Posted Aug 31, 2005
Authored by Funnywei | Site xcon.xfocus.org

Xcon 2005: Structural Signature and Signature's Structure

SHA-256 | 9ec4308f69278371a19a8fd3ad829146dc1f6e9bc11d2c805f3853f54a516609
Xcon2005_Sowhat.pdf
Posted Aug 31, 2005
Authored by Sowhat | Site xcon.xfocus.org

Xcon 2005: Talking About 0day

SHA-256 | e4d859a8ae5ae21d8225ae5961d59c20dbcc3a791da1b98ee61f8c0a40955b69
Xcon2005_CoolQ.pdf
Posted Aug 31, 2005
Authored by CoolQ | Site xcon.xfocus.org

Xcon 2005: Advanced trojans in Grub

tags | trojan
SHA-256 | 9d66bf700c197ee8747ecbb8dfaa34a5442d6818524958c82f1113b916ec28ba
Xcon2005_Cawan.pdf
Posted Aug 31, 2005
Authored by Cawan | Site xcon.xfocus.org

Xcon 2005: Reconfigurable Synchronization Technique

SHA-256 | d37c98176daf5cff75d8b5aca1d5000624f20a50609b605b80e35356b1932238
Xcon2005_Drew_Copley.pdf
Posted Aug 31, 2005
Authored by Drew Copley | Site xcon.xfocus.org

Xcon 2005: Anti-Virus Heuristics

tags | virus
SHA-256 | 2ecef563b1af1bdb7220834ff9434253e41dce6fe29512d70e68840d9ba22576
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Power Pages Misconfigurations Exposing Sensitive Data
Posted Nov 15, 2024

tags | headline, privacy, microsoft, data loss
Man Gets 5 Years For Laundering Crypto From Bitfinex Hack
Posted Nov 15, 2024

tags | headline, hacker, data loss, fraud, cryptography
Five Eyes Infosec Agencies List 2024's Most Exploited Software Flaws
Posted Nov 14, 2024

tags | headline, government, usa, canada, britain, australia, flaw, new zealand
CISA, FBI Confirm China Hacked Telecoms To Spy
Posted Nov 14, 2024

tags | headline, government, privacy, usa, phone, china, data loss, cyberwar, spyware, backdoor
Two Men Charged For Hacking US Tax Preparation Firms
Posted Nov 14, 2024

tags | headline, hacker, privacy, usa, fraud, identity theft
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures
Posted Nov 14, 2024

tags | headline, hacker, fraud, phish, iran
Air National Guardsman Gets 15 Years For Leaking Docs On Discord
Posted Nov 13, 2024

tags | headline, government, usa, data loss, military
Citrix, Cisco, Fortinet Zero-Days Among 2023's Most Exploited Vulnerabilities
Posted Nov 13, 2024

tags | headline, hacker, flaw, cisco, zero day
Ivanti Patches 50 Vulnerabilities Across Several Products
Posted Nov 13, 2024

tags | headline, flaw, patch
Intel And AMD Have Released Many Advisories
Posted Nov 13, 2024

tags | headline, flaw, patch, intel
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close