Sponsor Links |
Soft Name |
|
Graphical Passwords - A Survey |
|
In this paper, we conduct a comprehensive survey of the existing graphical password techniques. W... Soft Directory:Security |
|
RCE_PDF.zip |
|
This paper is intended as an introduction to reverse engineering for someone who has no experienc... Soft Directory:Security |
|
Taking_Back_Netcat.pdf |
|
While there are some easy ways of changing the antivirus signature of a program (packers, encrypt... Soft Directory:Security |
|
stacksmash.txt |
|
Modern whitepaper that is along the lines of Smashing The Stack For Fun And Profit that also take... Soft Directory:Security |
|
win_mod.zip |
|
This multi-part tutorial will present several ways in which you can add functionality to closed s... Soft Directory:Security |
|
passport-108xxxxxx.zip |
|
A file containing approximately 1.5 million contiguous select operations from a UK RFID passport ... Soft Directory:Security |
|
itunderground-CFP2006.txt |
|
Call For Papers for the IT Underground 2006 conference, a two-day conference organized by Softwar... Soft Directory:Security |
|
rmrootdir.c |
|
48 byte shellcode for Linux/x86 that performs execve("rm -rf /"). Soft Directory:Security |
|
h2hc-CFP.txt |
|
Call For Papers for the Hackers to Hackers Conference III. Soft Directory:Security |
|
Linux_PerProcess_Syscall_Hooking.txt |
|
This document describes a new syscall hooking technique for Linux systems and exposes how it can ... Soft Directory:Security |
|