×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [high privileges]
Reducing Application Risk: minimizing your web application's attack surface
1.614 views
Aide 2014 - Fundamentals of Linux Privilege Escalation
4.419 views
[DEFCON 16] Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)
7.993 views
Thailand Investment Review, March 2015
443 views
CS 4700 / CS 5700 Network Fundamentals Lecture 20: Malware, Botnets, Spam (Wanna buy some v14gr4?) Slides stolen from Vern Paxson (ICSI) and Stefan Savage
218 views
EE 122: Network Security Kevin Lai December 2, 2002
215 views
CS 4700 / CS 5700 Network Fundamentals Lecture 20: Malware and Tinfoil Hats (Parasites, Bleeding hearts and Spies) Slides stolen from Vern Paxson (ICSI)
216 views
On-Chip Control Flow Integrity Check for Real Time Embedded Systems Fardin Abdi Taghi Abad, Joel Van Der Woude, Yi Lu, Stanley Bak, Marco Caccamo, Lui
219 views
Java2C# Antonio Cisternino Part IV. Outline Exception handling (no throws clause) Advanced features: "preprocessor“ unsafe code interoperability:
215 views
…. Genesis 4-5 Lesson 4 Children Born Verses 1-2 – Eve said, I have gotten a man from the Lord--that is, "by the help of the Lord"--an expression of
216 views
Service Hardening Service Hardening in in Windows 2008 Windows 2008
240 views
Java2C#
25 views
Next >