Hooking

Results: 319



#Item
51Hooking / X Window System / Session / Software / Computing / Control flow

getting started Manual NeurOptimal® vW8/3 Copyright 2014 Zengar Institute Inc. All rights reserved.

Add to Reading List

Source URL: www.zengar.com

Language: English - Date: 2015-01-08 16:31:28
52Television / Hook / SpongeBob SquarePants / Control flow / Hooking / Bowling

PERSONAL Manual NeurOptimal® vW8/3 Copyright © 2014 Zengar Institute Inc. All rights reserved.

Add to Reading List

Source URL: www.zengar.com

Language: English - Date: 2015-01-08 16:31:41
53Software testing / Control flow / Fuzz testing / Exception handling / Breakpoint / C / Stack / Hooking / Debugging / Software engineering / Computing / Computer programming

In Memory Fuzzing Real Time Input Tracing and In Memory Fuzzing by sinn3r – twitter.com/_sinn3r 2010 Introduction

Add to Reading List

Source URL: chzv.net

Language: English - Date: 2010-10-23 03:10:15
54OpenCV / SURF / Internet privacy / Callback / Hooking / Face detection / Principal component analysis / Eigenface / A Scanner Darkly / Computer vision / Artificial intelligence / Vision

A Scanner Darkly: Protecting User Privacy From Perceptual Applications Suman Jana∗ ∗ The Arvind Narayanan†

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2013-03-05 13:40:34
55C++ / POSIX / Control flow / C programming language / C POSIX library / C++ classes / Hooking / Struct / Exec / Computing / Software engineering / Computer programming

Perl versiondocumentation - perlintern NAME perlintern - autogenerated documentation of purely internal Perl functions DESCRIPTION

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:05:48
56.NET assembly / Managed Extensions for C++ / Visual Basic .NET / Hooking / Dynamic-link library / ILAsm / Rootkit / Global Assembly Cache / Windows API / Computing / Software / .NET framework

Microsoft Word - .NET Framework rootkits - backdoors inside your framework - revised.doc

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
57Computer file formats / Dynamic-link library / Hooking / Portable Executable / Linker / Subroutine / Pointer / Portable Executable Automatic Protection / Computing / Computer programming / Software

QuietRIATT: Rebuilding the Import Address Table Using Hooked DLL Calls Jason Raber () Brian Krumheuer () Riverside Research Institute January 2009

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
58Sea turtles / Circle hook / Longline fishing / Bycatch / Leatherback sea turtle / Hooking / Fishing / Fauna of Asia / Fishing industry

COMISIÓN INTERAMERICANA DEL ATÚN TROPICAL INTER-AMERICAN TROPICAL TUNA COMMISSION WORKING GROUP ON BYCATCH 5TH MEETING BUSAN, KOREA

Add to Reading List

Source URL: www.iattc.org

Language: English - Date: 2011-05-17 17:31:56
59Malware / Software bugs / Shellcode / Antivirus software / Buffer overflow / Computer virus / Code injection / Portable Executable / Hooking / Cyberwarfare / Computer security / Failure

WiShMaster Windows Shellcode Mastery BlackHat EuropeBenjamin CAILLAT

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
60Tcl / Hooking / Hook / Tk / AT-hook / Railway coupling / Objective-C / Software engineering / Computer programming / Computing

TIP #379: Add a Command for Delivering Events Without Tk _____________________________________________________________________________ TIP: 379 Title: Add a Command for Delivering Events Without Tk Version: $Revision: 1.

Add to Reading List

Source URL: www.tcl.tk

Language: English
UPDATE