Rootkit

Results: 605



#Item
161Computer security / Canadian Security Intelligence Service / Public Safety Canada / Malware / Wireless security / NTFS / Computer virus / Rootkit / Cyberwarfare / System software / Computing

CSIS Academy Be Better Course overview April, 2014 © CopyrightCSIS Security Group A/S. All rights reserved

Add to Reading List

Source URL: www.csis.dk

Language: English - Date: 2014-04-10 00:17:39
162Malware / Rootkits / Computer security / Computer network security / Spyware / Greg Hoglund / Keystroke logging / Sony BMG copy protection rootkit scandal / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Espionage / System software / Cyberwarfare

R_: The Exponential Growth of Rootkit Techniques by Jamie Butler Bill Arbaugh Nick Petroni

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
163Cyberwarfare / Malware / Computer security / Multi-agent systems / Botnets / Rootkit / Fast flux / Internet security / Anti-spam techniques / Spamming / Computer network security / Computing

Best Practices to Address Online and Mobile Threats prepared by members of the london action plan and m3aawg

Add to Reading List

Source URL: cauce.typepad.com

Language: English - Date: 2012-10-28 10:50:16
164Computer virus / Avast! / Clam AntiVirus / USB flash drive / Rootkit / Computer worm / AVG / Personal computer / Norton AntiVirus / Software / Antivirus software / System software

FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions Henry Corrigan-Gibbs Jay Chen

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2014-10-09 04:15:41
165Intrusion detection systems / OSSEC / Rootkit / Installation / Linux distribution / SYS / Linux / Berkeley Software Distribution / System software / Software / Computer network security

Chapter 2 Installation Solutions in this chapter: ■

Add to Reading List

Source URL: www.ossec.net

Language: English - Date: 2012-06-29 13:37:34
166Multi-agent systems / Spamming / Bitcoin / Peer-to-peer computing / Botnets / Malware / Cryptographic nonce / Rootkit / Silk Road / Computing / Internet / Computer network security

Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier⇤ , Damon McCoy† , Stefan Savage, Nicholas Weaver⇤ Alex C. Snoeren and Kirill Levchenko UC San D

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2014-02-22 21:23:21
167Rootkits / Sony / Computing / Pwnie Awards / Sony BMG copy protection rootkit scandal / USENIX / Cryptography / Green Dam Youth Escort / MediaMax CD-3 / Software / Edward Felten / System software

 Hayward Street Ann Arbor, mi  usa (mobile ) +    J. Alex Halderman

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2015-04-03 18:03:06
168Computer security / System Management Mode / Rootkit / Unified Extensible Firmware Interface / Coreboot / Shellcode / Flash memory / Trusted Platform Module / Booting / BIOS / System software / Computing

Defeating Signed BIOS Enforcement

Add to Reading List

Source URL: www.mitre.org

Language: English - Date: 2014-03-11 11:39:24
169Antivirus software / Windows NT / Windows Vista / BIOS / Unified Extensible Firmware Interface / Rootkit / Malware / Microsoft Security Essentials / Windows Defender / Microsoft Windows / Software / System software

Horizontal logotype - left aligned

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2013-02-13 11:02:55
170.NET assembly / Managed Extensions for C++ / Visual Basic .NET / Hooking / Dynamic-link library / ILAsm / Rootkit / Global Assembly Cache / Windows API / Computing / Software / .NET framework

Microsoft Word - .NET Framework rootkits - backdoors inside your framework - revised.doc

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
UPDATE