Blackhat

Results: 880



#Item
861Computer security / Configuration files / Antivirus software / Computer worms / AutoRun / Conficker / ESET / David Harley / Autorun.inf / Malware / System software / Software

March[removed]Feature Article: BlackHat Japanning Table of Contents Feature Article: BlackHat Japanning .....................................................................................................................

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-04-06 11:22:35
862C dynamic memory allocation / Computer programming / D-ary heap / Heap / Pointer / Memory management / Computing / C Standard Library

Understanding the Low Fragmentation Heap Blackhat USA 2010 Chris Valasek X-Force Researcher [removed]

Add to Reading List

Source URL: illmatics.com

Language: English - Date: 2010-08-11 08:34:52
863

New Tricks For Defeating SSL In Practice Moxie Marlinspike [removed]

Add to Reading List

Source URL: www.blackhat.com

- Date: 2014-08-18 14:45:40
    864Computing / FIFO / Framebuffer / Data buffer / Virtual machine / System software / Software / VMware

    Cloudburst: Hacking 3D (and Breaking Out of VMware) for Black Hat USA 2009

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-08-18 14:47:50
    865Computer programming / C++ / Iterator / Object-oriented programming / IBM / Sequence container / Microsoft Visual Studio / Linux kernel / String / Computing / Software / C++ Standard Library

    IBM Global Services July 2007 Breaking C++ Applications BlackHat Briefings 2007

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-08-18 14:47:13
    866Design of experiments / Random number generation / Buffer overflow / Randomization / Computing / Scientific method / Statistics / Randomness / Address space layout randomization / Software bugs

    Bypassing ASLR by predicting a process’ randomization Hagen Fritsch January 23nd, 2009

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-08-18 14:46:16
    867Law enforcement / Crime prevention / Surveillance / Mass surveillance / Telecommunications data retention / Computer surveillance / Traffic analysis / Data mining / Deep packet inspection / National security / Security / Espionage

    Global Spying: Realistic Probabilities in Modern Signals Intelligence

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-08-18 14:47:58
    868

    Cutting-edge Think Tank BLACK HAT EUROPE 2008 CLIENT-SIDE SECURITY

    Add to Reading List

    Source URL: www.blackhat.com

    - Date: 2014-08-18 14:46:12
      869Satellite Internet / Inmarsat / Broadband Global Area Network / Broadband / SwiftBroadband / Backdoor / Satellite Internet access / Vulnerability / Password / Technology / Electronics / Electronic engineering

      TECHNICAL WHITE PAPER SATCOM Terminals: Hacking by Air, Sea, and Land Ruben Santamarta Principal Security Consultant

      Add to Reading List

      Source URL: www.blackhat.com

      Language: English - Date: 2014-08-18 14:44:04
      870Official / Black hat

      2015 SUSTAINING PARTNER PROGRAM www.blackhat.com/html/sponsors_sustaining.html PROGRAM DESCRIPTION

      Add to Reading List

      Source URL: liveevents.techweb.com

      Language: English - Date: 2014-06-26 14:09:22
      UPDATE