Computer worm

Results: 494



#Item
1Worms / Computer worm / Gaming

Report on the WoRMS virtual Steering Committee meeting 16 December 2015 Venue: Virtual meeting, through Skype, start at 12h (noon) UTC time Present:

Add to Reading List

Source URL: www.marinespecies.org

Language: English - Date: 2016-01-13 05:59:54
2Worms /  Germany / Yeah / Computer worm / Aqua Teen Hunger Force / Dirt

VAGABOND WORMS this is the story of two worms vagabond worms looking for a home happily married and settled in they were just about to begin their lives together in an apple tree

Add to Reading List

Source URL: www.kindiependent.com

Language: English - Date: 2015-04-07 23:52:27
3Computer worms / Cyberwarfare / Cybercrime / Computer security

EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and

Add to Reading List

Source URL: aao.sinica.edu.tw

Language: English - Date: 2014-10-02 04:23:39
4Cyberwarfare / Computer security / Engineering / Automation / Malware / Rootkits / Stuxnet / Programmable logic controller / Computer worm / Transmission Control Protocol / Blaster

PLC-Blaster: A Worm Living Solely in the PLC Ralf Spenneberg, Maik Brüggemann, Hendrik Schwartke 1 OpenSource Security Ralf Spenneberg

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2016-03-30 22:52:18
5Computer security / Cyberwarfare / Security / Cybercrime / Antivirus software / Computer network security / E-commerce / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 13:10:29
6Computer security / Cyberwarfare / Security / Cybercrime / Antivirus software / Computer network security / E-commerce / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-19 18:33:37
7Computing / Security / Linear Tape-Open / Information science / Data management / Backup / Data security / Data corruption / Computer security / Linear Tape File System / Magnetic tape data storage

Security » Easily stored offline to protect against on-line data corruption » Easily stored offsite in case of a disaster recovery situation » Hardware based data encryption for added data security » WORM cartrid

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:24:42
8Computer security / Cyberwarfare / Security / Cybercrime / Computer network security / E-commerce / Antivirus software / Secure communication / Phishing / Malware / Computer worm / Trusteer

the importance of layered security_fin-01

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55
9Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Command and control / Storm Worm / Email spam / Storm botnet / Kelihos botnet

Challenges in Experimenting with Botnet Detection Systems Adam J. Aviv Andreas Haeberlen University of Pennsylvania Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:23
10Silk / Insects as food / Traditional Chinese medicine / Bombycidae / Bombyx mori / Worm / Gu / Morus / Computer worm / Linda Sue Park

Silk Diary by Mad Scientist Ed Park What follows is the diary kept by my father about his experience raising silkworms. The photos were taken by my nephew, Craig Park. Many thanks

Add to Reading List

Source URL: www.lindasuepark.com

Language: English - Date: 2010-10-04 22:02:46
UPDATE