IBM / Information Security Solutions Europe / Advanced Micro Devices Inc. / Exploiting Embedded Systems / Intel Corporation / Layer 2 Switched Local Area Networks / Trusted Computing Group / /
Country
Germany / /
Event
FDA Phase / /
Facility
Marcel Winandy Horst G¨ortz Institute / /
IndustryTerm
free and open source software / downloadable applications / certain malware applications / secure and interoperable operating systems / download server / commodity computing platforms / application server / free software / virus infection routines and network / required organizational and technical infrastructure / platform technology / software distribution system / software distribution sites / antivirus tools / network intrusion detection systems / anti-malware tools / technology architectural overview / malicious software / open source application software / trust management / probed technology / non-writable boot media / visible-started software / large network / software applications / decryption algorithms / free and open software applications / code decryption algorithms / secured protocols / secure operating systems / commodity operating systems / law enforcement / computing / network transmission protocol / Internet service / Wireless LAN takeovers / binary executable applications / security protocols / automatic wireless network selection / context virtualization technology / software distribution / /
Movie
Man in the middle / /
OperatingSystem
Windows Vista / Mac OS X / Linux / Windows 98 / DOS / Windows XP / Microsoft Windows / /
Organization
federal investigation office / U.S. Securities and Exchange Commission / Marcel Winandy Horst G¨ortz Institute for IT Security Ruhr-Universit¨at Bochum / IEEE Computer Society / /
Person
Figure / /
Position
system administrator / Engineer / author / dia player / seeking forward / administrator / /