Rootkits

Results: 310



#Item
31Computer architecture / Computing / Computer engineering / X86 architecture / Rootkits / System Management Mode / IBM PC compatibles / Central processing unit / X86-64 / X86 / SMI / Processor register

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   SMRAM  (System  Management  RAM)   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:08:48
32Cyberwarfare / Malware / Computer security / Computer network security / Deception / Rootkits / Zero-day / Computer virus / Ransomware / SentinelOne / Antivirus software / Computer worm

Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

Add to Reading List

Source URL: www.sentinelone.com

Language: English - Date: 2016-05-23 01:13:39
33

The High Cost of Cutting Corners As the cost and likelihood of a breach grows you can’t afford “good enough” protection before, during, AND after an attack. Rootkits Worms

Add to Reading List

Source URL: www.testeznous.lu

Language: English - Date: 2016-04-14 08:33:53
    34

    Rootkits & Stealth Malware Medium-granularity class topics covered Xeno Kovah CC BY AT licensed hosted at OpenSecurityTraining.info

    Add to Reading List

    Source URL: www.opensecuritytraining.info

    Language: English - Date: 2014-03-02 22:01:32
      35

      Rootkits: What they are and how to find them Part 2 Xeno Kovah – 2010 xkovah at gmail

      Add to Reading List

      Source URL: www.opensecuritytraining.info

      Language: English - Date: 2014-03-02 22:01:43
        36

        Rootkits: What they are and how to find them Part 3 Xeno Kovah – 2010 xkovah at gmail

        Add to Reading List

        Source URL: www.opensecuritytraining.info

        Language: English - Date: 2014-03-02 22:01:46
          37Software / System software / Computing / Hardware virtualization / Hypervisor / Virtual machine / VM / Virtualization / Protection ring / Operating system / Hardware-assisted virtualization / System virtual machine

          Hardware Virtualization Rootkits Dino A. Dai Zovi Agenda •

          Add to Reading List

          Source URL: www.trailofbits.com

          Language: English - Date: 2016-04-15 11:36:17
          38Cyberwarfare / Cryptography / Spyware / National security / Rootkits / Malware / Backdoor / Computer security

          Challenges of Coordinated Linux & Android Intrusions IMF 2014 Eoghan Casey May 12, 2014

          Add to Reading List

          Source URL: www.imf-conference.org

          Language: English - Date: 2014-05-21 12:58:37
          39Computer architecture / Software / System software / Monolithic kernels / Inter-process communication / Operating system kernels / Mach / FreeBSD / XNU / Kernel / Rootkit / Microkernel

          ADVANCED MAC OS X ROOTKITS DINO A. DAI ZOVI Abstract. The Mac OS X kernel (xnu) is a hybrid BSD and Mach kernel. While Unix-oriented rootkit techniques are pretty well known,

          Add to Reading List

          Source URL: www.trailofbits.com

          Language: English
          40Digital media / Business / Compact Disc and DVD copy protection / Digital rights management / Rootkits / Sony / Copyright law / Sony BMG copy protection rootkit scandal / Edward Felten / MediaMax CD-3 / E-book / Sony BMG

          Cites & Insights: Crawford at Large

          Add to Reading List

          Source URL: www.citesandinsights.info

          Language: English - Date: 2006-07-15 15:59:31
          UPDATE