

|  | 
				This is possible because Android doesn't place any restrictions on native code ... The only limitation is that the code runs as the app's unprivileged UID, but ...			 
				
					http://rdist.root.org/				
							 
						popularity:
						 
							security						 
							blog						 
							blogs						 
							crypto						 
							cryptography						 
							linux						 
							software						 
							research						 
							computers						 
							opensource						 | 
|  | 
					I know Wormblog has been very, very silent lately as I've been ... Wormblog is a project to collect and share links about worm related ... Wormblog was ...				 
							similarity:
							 
							popularity:
							 
								security							 
								blog							 
								worms							 
								virus							 
								blogs							 
								research							 
								worm							 
								malware							 
								hacking							 
								programming							 | 
|  | 
					Panel: Usability of Security Software - Is Open Source a Positive, ... July 17, 2009 by Richard Conlan. Moderator: Luke Kowalski, Corporate UI Architect, Oracle ...				 
							similarity:
							 
							popularity:
							 
								security							 
								blog							 
								usability							 
								ui							 
								blogs							 
								hci							 
								research							 
								computer							 
								identity							 
								tech							 | 
|  | 
					A collection of thoughts on information management and privacy in the information age, injected with a few personal stories.				 
							similarity:
							 
							popularity:
							 
								blog							 
								security							 
								datamining							 
								privacy							 
								surveillance							 
								semantic							 
								identity							 
								information							 
								blogs							 
								software							 | 
|  | 
					5/2009: Schneier and Ranum Face Off. Techtarget interviewed Bruce and myself ... Ranum's Rants. I'm blogging periodically about security on Tenable's blog. ...				 
							similarity:
							 
							popularity:
							 
								security							 
								blog							 
								reference							 
								blogs							 
								geek							 
								computer							 
								unix							 
								photography							 
								people							 
								networking							 | 
|  | 
					Darknet - The Darkside. Ethical Hacking, Penetration Testing & Computer Security ... Posted by Darknet to Hacking Tools, Linux Hacking, Network Hacking, Password ...				 
							similarity:
							 
							popularity:
							 
								security							 
								hacking							 
								blog							 
								tools							 
								hack							 
								linux							 
								hacks							 
								blogs							 
								computer							 
								howto							 | 
|  | 
					Features Paketto Keiretsu: a set of utilities for doing odd things to TCP/IP networks by "stretching the protocols ... Staring Into The Abyss dan@doxpara.com ... (such as www.doxpara.com) to numbers the ...				 
							similarity:
							 
							popularity:
							 
								security							 
								dns							 
								hacking							 
								blog							 
								network							 
								research							 
								internet							 
								software							 
								tools							 
								vulnerability							 | 
|  | 
					News and insights from Google on security and safety on the Internet. ... Posted by Alma Whitten, Software Engineer, Security & Privacy Teams ...				 
							similarity:
							 
							popularity:
							 
								security							 
								google							 
								blog							 
								internet							 
								blogs							 
								malware							 
								research							 
								web							 
								hacking							 
								computer							 | 
|  | 
					One of the things that makes Black Hat so friggin' awesome is the quality of the ... Bleeding-edge material, theoretical and applicable, seen no where else covering ...				 
							similarity:
							 
							popularity:
							 
								security							 
								blog							 
								hacking							 
								web							 
								javascript							 
								blogs							 
								css							 
								ajax							 
								xss							 
								hack							 | 
|  | 
					Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.				 
							similarity:
							 
							popularity:
							 
								security							 
								encryption							 
								software							 
								opensource							 
								tools							 
								cryptography							 
								windows							 
								linux							 
								freeware							 
								privacy							 | 
|  | 
					No information avaiable				 
							similarity:
							 
							popularity:
							 
								security							 
								hacking							 
								blog							 
								tutorials							 
								software							 
								blogs							 
								howto							 
								news							 
								database							 
								sysadmin							 | 
 an example search result
			an example search result