Rootkits

Results: 310



#Item
151Spyware / Remote administration software / Trojan horses / Rootkits / Antivirus software / Computer virus / Keystroke logging / Backdoor / Back Orifice / Software / System software / Malware

TDDC03 Projects, Spring[removed]Trojans Philippe Farges, phifa124 Annick Tremblet, anntr946

Add to Reading List

Source URL: www.ida.liu.se

Language: English - Date: 2006-12-30 14:40:18
152.NET assembly / Managed Extensions for C++ / Visual Basic .NET / Hooking / Dynamic-link library / ILAsm / Rootkit / Global Assembly Cache / Windows API / Computing / Software / .NET framework

Microsoft Word - .NET Framework rootkits - backdoors inside your framework - revised.doc

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
153Rootkits / Hyper-V / Backdoor / System software / Software / Hypervisor

Security Considerations in Cloud Deployments Matthew Garrett (cloud) Computing for the Enterprise

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-06-20 19:13:26
154System software / Mebroot / Torpig / Franz Melde / Dropbox / Master boot record / Software / Rootkits / Computing

Melde- und Analysestelle Informationssicherung MELANI Torpig/Mebroot Reverse Code Engineering (RCE) Andreas Greulich, MELANI

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:28
155Trojan horses / Rootkits / Computer worms / Backdoor / Conficker / Operation Aurora / Mydoom / Password / Dropper / Malware / System software / Spyware

White Paper Global Energy Cyberattacks: “Night Dragon” By McAfee® Foundstone® Professional Services and McAfee Labs™ February 10, 2011

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:06
156Security / Crime / Conspiracy theories / Nuclear program of Iran / Rootkits / Stuxnet / Industrial espionage / Computer security / International Cybercrime / Cyberwarfare / Cybercrime / Computer crimes

Cyber Crime and Cyber Forensics for Criminal Law Practitioners Steven Chabinsky General Counsel and Chief Risk Officer, CrowdStrike Presented 20 May 2014, Continuing Legal Education & Training,

Add to Reading List

Source URL: www.armfor.uscourts.gov

Language: English - Date: 2014-06-17 14:39:05
157War / Contemporary history / Conspiracy theories / Rootkits / Electronic warfare / Stuxnet / Department of Defense Strategy for Operating in Cyberspace / United States Cyber Command / Cyberspace / Cyberwarfare / Military science / Nuclear program of Iran

UN (Jean-Marc Ferré) Members of International Telecommunications Union and UN Institute for Training and Research confer on cyber security

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-11-28 17:25:23
158Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Rootkits / Zeus / Malware / Trojan horse / Trusteer / Computing / Botnets / Computer security

C-SAWR 021 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-06-20 03:51:09
159ESET / Computing / Security / Antivirus software / Software / ESET NOD32

Endpoint Protection Antivirus and Antispyware Eliminates all types of threats, including viruses, rootkits, worms and spyware Optional cloud-powered scanning:

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2014-12-11 16:05:32
160Electronics / Hacking / Electric power transmission systems / Nuclear program of Iran / Rootkits / Stuxnet / Electrical grid / Antivirus software / Distributed generation / Computing / Technology / Cyberwarfare

Microsoft Word - GridGameArticle

Add to Reading List

Source URL: www.ironforidaho.net

Language: English - Date: 2014-11-10 15:25:08
UPDATE