Exploit

Results: 786



#Item
121

Perfekt geschützt vor Viren & Co. Enjoy safer technology! Mit unserer bewährten Antivirus- & Antispyware-Technologie surfen Sie sicher im Netz. Der Exploit Blocker schützt Sie vor gezielten Malware-Angriffen und mit

Add to Reading List

Source URL: static3.esetstatic.com

Language: German - Date: 2015-10-09 06:22:13
    122Marketing / Business / Professional studies / Pricing / Product bundling / Product management / Software distribution / Price discrimination

    Bundling Customers: How to Exploit Trust Among Customers to Maximize Seller Profit Elchanan Mossel∗ and Omer Tamuz† arXiv:1202.0969v1 [cs.GT] 5 Feb 2012

    Add to Reading List

    Source URL: people.hss.caltech.edu

    Language: English - Date: 2012-03-08 06:44:20
    123

    SILK Defence hormone harnessed Scientists at Oxford University have discovered a new way to exploit the natural reactions of the silkworm for the large-scale production of silk with bespoke

    Add to Reading List

    Source URL: users.ox.ac.uk

    Language: English - Date: 2013-11-12 06:31:39
      124Bacteria / Biology / Cell biology / Vibrionales / Bacterial proteins / Motor proteins / Bacteriology / Flagellum / MotA / Vibrio / Buckling / Chemotaxis

      Bacteria can exploit a flagellar buckling instability to change direction

      Add to Reading List

      Source URL: stockerlab.ethz.ch

      Language: English - Date: 2015-12-16 11:47:59
      125Computing / Computer network security / Computer security / Firewall / SonicWall / DMZ / Dell / Intrusion detection system / Exploit

      NGFW Test Report_Dell SonicWALL SuperMassive E10800

      Add to Reading List

      Source URL: i.crn.com

      Language: English - Date: 2016-04-28 09:34:46
      126Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

      Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      127Computer security / Cyberwarfare / Computer network security / Computing / Software testing / Metasploit Project / Penetration test / Exploit / Transaction authentication number / Cloud computing

      POTASSIUM: Penetration Testing as a Service Richard Li, Dallin Abendroth, Xing Lin, Yuankai Guo, Hyun-wook Baek, Eric Eide, Robert Ricci, and Jacobus Van der Merwe Current Pentesting

      Add to Reading List

      Source URL: acmsocc.github.io

      Language: English - Date: 2016-02-21 03:10:51
      128

      Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures Matt Fredrikson Carnegie Mellon University Somesh Jha

      Add to Reading List

      Source URL: rist.tech.cornell.edu

      Language: English - Date: 2015-12-15 16:07:33
        129

        Metaphor  A (real) real­life Stagefright exploit    Researched and implemented by ​ NorthBit1.  Written by Hanan Be’er. 

        Add to Reading List

        Source URL: www.exploit-db.com

        Language: English - Date: 2016-03-07 13:45:07
          130Security / Cyberwarfare / Computer security / National security / Crime prevention / Computer network security / Hacking / Malware / Vulnerability / Kill chain / Mobile malware / Mobile security

          Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     Blackberry,    

          Add to Reading List

          Source URL: www.trailofbits.com

          Language: English - Date: 2016-04-15 11:36:17
          UPDATE