Blackhat

Results: 880



#Item
171

www.taddong.com A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications David Perez

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:21
    172

    BLACK  HAT  REGISTRATION  UPDATE  FORM     Please  complete  this  form  and  fax  it  to  -­‐6011.       If  changes  are  needed  while  an

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-06-03 18:05:43
      173

      BLACK  HAT  REGISTRATION  UPDATE  FORM     Please  complete  this  form  and  fax  it  to  -­‐6011.       If  changes  are  needed  while  an

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2015-05-28 15:50:42
        174

        Fun and Games with Mac OS X and iPhone Payloads Charlie Miller Independent Security Evaluators

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2015-05-28 15:51:34
          175

          Exploiting Lawful Intercept to Wiretap the Internet Blackhat DC, 2010 Tom Cross Manager, X-Force Research

          Add to Reading List

          Source URL: www.blackhat.com

          Language: English - Date: 2015-05-28 15:51:27
            176

            Sour Pickles Shellcoding in Python’s serialisation format Marco Slaviero Abstract: Python’s Pickle module provides a known capability for running arbitrary Python functions and, by extension, permitting remote code e

            Add to Reading List

            Source URL: media.blackhat.com

            Language: English - Date: 2012-04-07 15:16:20
              177

              Code  Reviewing  Web  App  Framework  Based  Applications   By  Abraham  Kang,  Principal  Security  Researcher,  Software  Security  Research,  HP     The  content

              Add to Reading List

              Source URL: media.blackhat.com

              Language: English - Date: 2012-07-22 17:24:50
                178

                OpenBSD Remote Exploit ”Only two remote holes in the default install” Alfredo Ortega, Gerardo Richarte Core Security

                Add to Reading List

                Source URL: www.blackhat.com

                Language: English - Date: 2015-05-28 15:51:45
                  179

                  Suchmaschinenmarketing: Whitehat vs. Blackhat Impulsvortrag zur „rechtlichen Seite“ Köln, 2. Februar 2009 Jens Eckhardt JUCONOMY Rechtsanwälte

                  Add to Reading List

                  Source URL: online-marketing.eco.de

                  Language: German - Date: 2014-04-16 09:00:06
                    180Pseudorandom number generators / Cryptography / Multiply-with-carry / Random number generation / Fortuna / Entropy / Random seed / RSA / E0 / Pseudorandomness / Yarrow algorithm / Cryptographically secure pseudorandom number generator

                    PDF Document

                    Add to Reading List

                    Source URL: media.blackhat.com

                    Language: English - Date: 2013-07-31 04:39:02
                    UPDATE