Sponsor Links |
Soft Name |
|
Convert Physical Windows Systems Into Virtual Machines To Be Run On A Linux Desktop |
|
This article shows how you can convert a physical Windows system (XP, 2003, 2000, NT4 SP4+) into ... Soft Directory:Security |
|
Security Issues and Countermeasure for VoIP |
|
At first, this paper gives a brief introduction of VoIP techniques: the network structure, networ... Soft Directory:Security |
|
Kernel Malware: The Attack from Within |
|
"Kernel Malware: The Attack from Within" ¨C is about kernel malware, explaining what th... Soft Directory:Security |
|
Overtaking Google Desktop + Demo |
|
The Google Desktop security flaw was coordinated with the Google Security Team. Google has been r... Soft Directory:Security |
|
(Ethical) Hacking Techniques |
|
Network based System Hacking Web Server Hacking, Physically enter the Target Building, WLAN (Wire... Soft Directory:Security |
|
Security and Privacy on the Semantic Web |
|
This chapter provides an introduction to policy-based security and privacy protection, by analyzi... Soft Directory:Security |
|
Data Hiding in a Kind of PDF Texts for Secret Communication |
|
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. Soft Directory:Security |
|
Preventing Injection Attacks with Syntax |
|
Software written in one language often needs to construct sentences in another language, such as ... Soft Directory:Security |
|
Oracle Rootkits 2.0 |
|
Introduction, OS rootkits, Database 1.0 rootkits, Advanced database rootkits 2.0, Conclusion. Soft Directory:Security |
|
Drive-By Pharming |
|
In this paper, we describe how a web site can attack home routers from the inside and mount sophi... Soft Directory:Security |
|