×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [attacker control]
Technology
GSF 2011 Tom Albert 2-1 Web-Cybersecurity
263 views
Documents
1 Buffer Overflows Nick Feamster CS 6262 Spring 2009 (credit to Vitaly S. from UT for slides)
222 views
Documents
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Dr. Ron Ross Computer Security Division Information Technology Laboratory Defending the United States
216 views
Documents
How to Steal Passwords: SSLstrip, LNK Attack, Cross-Site Request Forgery & Scary SSL Attacks Sam Bowne
228 views
Technology
Webinar: Insights from CYREN's Q3 trend report
81 views
Technology
IPv6 Security
271 views
Documents
Slide 1 Vitaly Shmatikov CS 378 Buffer Overflow Exploits
224 views
Documents
Exploiting Memory Vitaly Shmatikov CS 6431. slide 2 Famous Internet Worms uMorris worm (1988): overflow in fingerd 6,000 machines infected (10% of existing
215 views
Documents
Buffer Overflow Exploits
42 views
Documents
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an
216 views
Documents
Buffer Overflow and Other Memory Corruption Attacks
35 views
Documents
Buffer Overflow and Stack Smashing
81 views
Next >