Rootkit

Results: 605



#Item
311Computer security / Malware / Rootkit / Linux kernel / Keystroke logging / Loadable kernel module / Kernel / System software / Software / Cyberwarfare

Undermining the Linux Kernel:  Malicious Code Injec:on via /dev/mem  Anthony Lineberry  [removed]   Black Hat Europe 2009 

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
312Computer security / Computer virus / Malware / Avira / Rootkit / Avast! / Antivirus software / System software / Software

Dr.  Craig  Wright      GSE  GSM  GSC  LLM    [removed]     Just  running  an  Anti-­‐Virus    program  is  no  longer  enough.  You  n

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:53
313Computer security / Multi-agent systems / Spamming / Malware / Botnets / Computer worm / Rootkit / Trojan horse / Antivirus software / Computer network security / Computing / Cyberwarfare

Unclassified DSTI/ICCP/REG[removed]Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:44:21
314MOV / Rootkit / JMP / Dropper / Computer security / Computing / X86 architecture / Assembly languages / X86 instructions / Malware / Cyberwarfare

Microsoft PowerPoint - Rustock.C - When a myth comes true.ppt

Add to Reading List

Source URL: www.reconstructer.org

Language: English - Date: 2008-10-24 14:17:41
315Espionage / Computer network security / Antivirus software / Trojan horse / Computer worm / Botnet / Computer virus / Spyware / Rootkit / Malware / System software / Cyberwarfare

DSTI/ICCP/REG[removed]FINAL FOREWORD Addressed primarily to policy makers, this report has been developed in the course of 2007, by the OECD Working Party on Information Security and Privacy (WPISP) in partnership with t

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 04:20:17
316Computer network security / Spamming / Cyberwarfare / Computer security / Zeus / Malware / Rootkit / Storm botnet / Computing / Botnets / Multi-agent systems

Botnet Resistent Coding Presentation

Add to Reading List

Source URL: media.hacking-lab.com

Language: English - Date: 2011-06-08 04:51:58
317Computer security / Electronic warfare / Hacking / Military technology / Stuxnet / Rootkit / Malware / Advanced persistent threat / Hacker / Computing / Cyberwarfare / Security

Cyberwar, Advanced Persistent Threat and Cybercrime Modern Criminal Networks: Infrastructure and Tasks Segmentation

Add to Reading List

Source URL: www.isss.ch

Language: English - Date: 2011-04-08 06:20:28
318Cyberwarfare / Computer virus / Malware / Rootkit / Vulnerability / Macro virus / Norton AntiVirus / System software / Computer security / Antivirus software

<4D6963726F736F667420576F7264202D2031305F955793498C5E8D558C828381815B838B81838AEB8CAF89F194F0818491CE8DF482CC82B582A882E85F91E63194C589FC82502E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-29 21:17:15
319VMware / Computer forensics / Mathematical finance / The Sleuth Kit / Malware / Microsoft Security Essentials / Rootkit / Volatility / Internet Explorer / Software / System software / Computing

toolsmith SIFT Workstation 2.0: SANS Investigative Forensic Toolkit ISSA Journal | May 2010

Add to Reading List

Source URL: holisticinfosec.org

Language: English - Date: 2010-05-03 19:24:30
320Computer forensics / Digital forensics / Malware / Forensic disk controller / Anti-computer forensics / Rootkit / Network forensics / Mobile device forensics / EnCase / Computer security / System software / Computing

C O U R S E C A T A L O G SANS Forensics Curriculum SANS Digital Forensics and Incident Response line-up features courses both

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-03-14 15:52:44
UPDATE