Hacking

Results: 3953



#Item
381

Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example Saghar Estehghari University College London

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-07-01 11:29:05
    382

    Georgia Weidman Novatec Copyright © 2014 by Georgia Weidman. Title of English-language original: Penetration Testing: A Hands-On Introduction to Hacking, ISBN8, published by No Starch Press. Portugues

    Add to Reading List

    Source URL: www.novatec.com.br

    Language: Portuguese - Date: 2014-10-15 09:22:18
      383

      De broncode van een Hot-Potatoes oefening. De belangrijkste wijzigingen en aanpassingen. Alhoewel er complexe methodes zijn om een hot-potatoes oefening helemaal naar je hand te zetten (zie hacking in hot-potatoes, a li

      Add to Reading List

      Source URL: hotpot.klascement.net

      Language: English - Date: 2012-02-27 07:58:49
        384

        Georgia Weidman Novatec Copyright © 2014 by Georgia Weidman. Title of English-language original: Penetration Testing: A Hands-On Introduction to Hacking, ISBN8, published by No Starch Press. Portugues

        Add to Reading List

        Source URL: www.novatec.com.br

        Language: Portuguese - Date: 2014-10-15 09:22:24
          385

          Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2014-04-21 13:48:10
            386

            Report Briefing for the Italian Government on Hacking Team’s surveillance

            Add to Reading List

            Source URL: s3.amazonaws.com

            Language: English - Date: 2015-04-15 17:29:53
              387

              HACKING, SURVEILLING, AND DECEIVING VICTIMS ON SMART TV SeungJin Lee (1st Author)

              Add to Reading List

              Source URL: media.blackhat.com

              Language: English - Date: 2013-07-31 04:11:57
                388

                Exploiting browsers, the logical way Bas Venis ~ ‘Kinine’ Abstract Hacking a browser might seem difficult for people with little experience in the security field. People tend to think exploiting browsers is about buf

                Add to Reading List

                Source URL: conference.hitb.org

                Language: English - Date: 2015-05-28 11:43:38
                  389

                  Boyne Tech Outline – Hacking Physics into Math Speaker notes: 50 minute session Outline number indicates slide number Intro Physics Video Tracker: https://www.cabrillo.edu/~dbrown/tracker/ http://goo.gl/wJG1Ae

                  Add to Reading List

                  Source URL: www.andrewbusch.us

                  Language: English - Date: 2014-06-19 14:36:33
                    390

                    My primary goal of hacking was the intellectual curiosity, the seduction of adventure. The Computer Itself is

                    Add to Reading List

                    Source URL: www.wavemaker.com

                    - Date: 2015-05-04 14:13:32
                      UPDATE