Sponsor Links |
Soft Name |
|
TetrisFriends.pdf |
|
Why certain SWF encryption techniques can backfire Or Tetris For Fun and Profit. Soft Directory:Security |
|
routers-nat.pdf |
|
Whitepaper called Routers and Routing process explanation through NAT. Written in Italian. Soft Directory:Security |
|
rootkit-analysis.pdf |
|
Whitepaper called Analysis and Workings of a Rootkit in the Operating System. Written in Italian. Soft Directory:Security |
|
conficker-ms0867.pdf |
|
Whitepaper called How Conficker makes use of MS08-067. Soft Directory:Security |
|
pfadto-ibm.pdf |
|
Whitepaper called Penetration from application down to OS - Getting OS access using IBM Websphere... Soft Directory:Security |
|
pfadto-oracle.pdf |
|
Whitepaper called Penetration from application down to OS - Getting OS access using Oracle Databa... Soft Directory:Security |
|
GIFAR-iceberg.pdf |
|
Whitepaper called Exploring Below the Surface of the GIFAR Iceberg. Reported at Black Hat 2008, G... Soft Directory:Security |
|
HackingIntranets.pdf |
|
Whitepaper called Opening Intranets to attacks by using Internet Explorer. This document covers t... Soft Directory:Security |
|
dotNET-Framework-Rootkits.pdf |
|
This whitepaper, .NET Framework rootkits - backdoors inside your framework, covers various ways t... Soft Directory:Security |
|
pirelli-vuln.pdf |
|
Whitepaper discussing the Pirelli Discus DRG A226 wifi router WPA2PSK default algorithm vulnerabi... Soft Directory:Security |
|