exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files

Xcon2005_Liuxin.pdf
Posted Aug 31, 2005
Authored by LiuXin | Site xcon.xfocus.org

Xcon 2005: Research on Same Source Feature Measuring Technology of Software

SHA-256 | ecc8660c93c2e4c28023a871eed92a3fcae596c38b1fdc637a4405a90417300f
Xcon2005_ICBM.pdf
Posted Aug 31, 2005
Authored by ICBM | Site xcon.xfocus.org

Xcon 2005: Security in development environment

SHA-256 | ada975a45131d41540dbee4e5a081c01c8e6f6a5bc963b2035b134a6ac3b7f82
Xcon2005_Shok.pdf
Posted Aug 31, 2005
Authored by Matt Conover | Site xcon.xfocus.org

Xcon 2005: Profiling Malware and Rootkits from Kernel-Mode

tags | kernel
SHA-256 | f35044fbda6b53c3159c28d612cabdbcf4ab5bf98de1368f2d90bf6256db271e
Xcon2005_Baiyuanfan.pdf
Posted Aug 31, 2005
Authored by Baiyuanfan | Site xcon.xfocus.org

Xcon 2005: New thoughts in ring3 nt rootkit

SHA-256 | d0dc6ba9e5e2a145d29838a6a02926fda4ac8adb83af61bd3c4f840f4af2a2f0
Xcon2005_Seak.pdf
Posted Aug 31, 2005
Authored by Seak | Site xcon.xfocus.org

Xcon 2005: New architecture and approach in Network Virus Detection

tags | virus
SHA-256 | cdd1681d944eb8cec64eb1adac29df6247f521b7c6d350d79d1fe380205c85f0
Xcon2005_Tombkeeper.pdf
Posted Aug 31, 2005
Authored by TombKeeper | Site xcon.xfocus.org

Xcon 2005: I want to see farther

SHA-256 | b915fe90362db76cec184c3a1d6e71e00a87d32076bff84f7c84c37374aff602
Xcon2005_SoBeIt.pdf
Posted Aug 31, 2005
Authored by SoBeIt | Site xcon.xfocus.org

Xcon 2005: Windows Kernel Pool Overflow Exploitation

tags | overflow, kernel
systems | windows
SHA-256 | c7ba43a585d9880a05a3ab27f0be73b6725629e574a219b07e112b67dc36bfad
Xcon2005_San.pdf
Posted Aug 31, 2005
Authored by san | Site xcon.xfocus.org

Xcon 2005: Hacking Windows CE

systems | windows
SHA-256 | 590f520dff1623d1a11b0e8d49ad52cb7733604cf0dae833442b8908ea8a6183
Xcon2005_Marc_Schoenefeld.pdf
Posted Aug 31, 2005
Authored by Marc Schoenefeld | Site xcon.xfocus.org

Xcon 2005: Java & Secure Programming

tags | java
SHA-256 | d6b3ac72fd172c204d6d57072918910fec85af743030e6cc24440b1c52cf37dd
Xcon2005_Funnywei.pdf
Posted Aug 31, 2005
Authored by Funnywei | Site xcon.xfocus.org

Xcon 2005: Structural Signature and Signature's Structure

SHA-256 | 9ec4308f69278371a19a8fd3ad829146dc1f6e9bc11d2c805f3853f54a516609
Xcon2005_Sowhat.pdf
Posted Aug 31, 2005
Authored by Sowhat | Site xcon.xfocus.org

Xcon 2005: Talking About 0day

SHA-256 | e4d859a8ae5ae21d8225ae5961d59c20dbcc3a791da1b98ee61f8c0a40955b69
Xcon2005_CoolQ.pdf
Posted Aug 31, 2005
Authored by CoolQ | Site xcon.xfocus.org

Xcon 2005: Advanced trojans in Grub

tags | trojan
SHA-256 | 9d66bf700c197ee8747ecbb8dfaa34a5442d6818524958c82f1113b916ec28ba
Xcon2005_Cawan.pdf
Posted Aug 31, 2005
Authored by Cawan | Site xcon.xfocus.org

Xcon 2005: Reconfigurable Synchronization Technique

SHA-256 | d37c98176daf5cff75d8b5aca1d5000624f20a50609b605b80e35356b1932238
Xcon2005_Drew_Copley.pdf
Posted Aug 31, 2005
Authored by Drew Copley | Site xcon.xfocus.org

Xcon 2005: Anti-Virus Heuristics

tags | virus
SHA-256 | 2ecef563b1af1bdb7220834ff9434253e41dce6fe29512d70e68840d9ba22576
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close