|
Les Tweets pour OComputing |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour " OComputing" (34 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter OComputing[2012-02-28] - 22:46:10 - How To Make your CFP Submission Not Suck by @Niki7a , gatekeeper of all things Defcon and maybe Blackhat https://t.co/KxAre41E[2012-02-17] - 21:50:35 - Detecting debuggers in Windows via the stack http://t.co/oCnf7R4n[2012-02-17] - 05:30:10 - Bruteforcing sysent discovery for OS X rootkits http://t.co/F2o2Iuvd[2012-02-14] - 02:16:16 - DNS servers have been changed, enjoy everyone.[2012-02-07] - 21:04:48 - Working with C++ DLL exports without headers http://t.co/2OvaY88Y[2012-02-02] - 01:00:55 - Abusing Mach-O to crash GDB in OS X http://t.co/JZE612E0[2012-02-02] - 01:00:55 - Queue the Facebook IPO malware phishing campaigns in 3...2...1...[2012-01-23] - 08:09:08 - @senihr Faster (sub 500 ms) searches with full text indexes running on a server with 16TB more space. Coming after ShmooCon[2012-01-18] - 06:00:14 - Elegant obfuscations, clever antidebugging, then complete failure on functionality. It makes me giggle when malware authors screw up.[2011-12-26] - 08:11:50 - Dynamic instrumentation in Java from NYU Poly http://t.co/A1ZMfL4J[2011-12-24] - 08:04:29 - Integer overflow predictions thwarted by pesky optimizing compiler http://t.co/WE6hFu50[2011-10-21] - 22:47:13 - Deobfuscating malicious javascript layer by layer from @Panda_Security http://t.co/DqtYdnHY[2011-08-09] - 21:09:51 - Defcon was good this year, it was good seeing everybody.[2011-07-19] - 13:34:00 - USB fuzzing for the masses http://t.co/jfhO9fe[2011-07-12] - 01:44:27 - @Lcstyle @s7ephen Not that I know of. They usually take a few months but will have the full videos online, and pdfs shortly after.[2011-06-23] - 04:31:33 - Overview of hardware for GPU bitcoin mining and password cracking http://t.co/jy79mhp[2011-06-11] - 05:10:27 - A writeup of the solution to the Defcon CTF quals binary leetness 300 http://t.co/riXcgj8[2011-05-24] - 12:29:25 - Fixing peer reviewed sec. research Step 2) Write an exploit. Learn to pentest. Learn assembly.[2011-04-28] - 11:51:43 - Feds hack botnet, uninstall compromised hosts. http://bit.ly/hxHDxP[2011-03-18] - 01:36:07 - OffensiveComputing.net might be temporarily down while we play DNS server three card monty.[2011-03-05] - 17:15:52 - @__sporkbomb VERA was written with wxWidgets to allow for a Linux/Mac port. Writing portable C++ code is the big hang up at this point.[2011-02-21] - 10:41:45 - What is the RSA Conference? It's been described as Blackhat with a marketing budget.This is a better description: http://bit.ly/icRB6z[2010-12-28] - 14:33:47 - Building a cheap USB protocol analyzer by @rootlabs http://goo.gl/cUNSZ[2010-12-21] - 02:38:30 - Researchers Create Botnet to study. http://bit.ly/hL3ayo AV vendors denounce in 3...2...1 (Tnx @FireEye for the link)[2010-12-17] - 03:36:56 - Shmoocon talk accepted. Prepare to have your minds blown by malware visualization hotness.[2010-12-17] - 03:36:56 - RT @sanitybit: @OComputing My first learning experience with Windows rootkits was hooking those functions to get a pink bluescreen. #nos ...[2010-12-15] - 16:19:17 - Mark Russinovich shows Windows kernel hot patching technique to change blue screens to Christmas colors http://bit.ly/h4xOUm[2010-12-03] - 01:42:34 - If you had a license to IDA prior to the 6.0 release you can get the Windows, Mac, and Linux clients too. That's nice of Hex Rays.[2010-12-01] - 17:50:06 - I love ShmooCon. :)[2010-11-25] - 10:15:40 - AV is also a glorified rootkit that arbitrarily phones home with your private information.[2010-11-20] - 06:23:27 - Reverse Engineering in academic circles means understanding source code. In my circles if you have the source code you're nearly done.[2010-09-30] - 22:26:54 - Zeus botnet broken up. Congrats @mikkohypponen http://fxn.ws/90joiS[2010-09-30] - 22:26:54 - FBI Press release on the Zeus botnet arrests. http://bit.ly/bzx1h1[2010-09-21] - 07:07:45 - Time how long Adobe takes to patch the 0day. Then time how long it takes to fix responsibly reported bugs. Vendor pressure works.
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|