invisiblethings' blog
VM escapes, hypervisor compromises (via "classic" rootkits, as well as Bluepill ... The training offers quite a unique chance, I think, to absorb the results of 1 ...
http://theinvisiblethings.blogspot.com/
popularity:
security
blog
hacking
blogs
malware
rootkits
research
virtualization
hack
software
|
Global Guerrillas
Networked tribes, systems disruption, and the emerging bazaar of violence. ... Greg Burton on GG LINKS: Mid-July 2009. Jeffery on RC LINKS: Mid July 2009 ...
similarity:
popularity:
blog
politics
security
terrorism
military
war
warfare
blogs
news
technology
|
BugTraq.Ru
Russian Security Newsline BugTraq.Ru: Russian Security Newsline ... Наша команда, BugTraq.Ru Team объединяет более 3500 представителей стран бывшего ...
similarity:
popularity:
security
news
hacking
programming
russian
computers
software
blog
admin
it
|
Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources
Security tools, exploits, reading, and links from Fyodor.
similarity:
popularity:
security
hacking
tools
network
software
nmap
sysadmin
internet
linux
networking
|
BlogSecurity
at July 1, 2009. DM Albums™ is an inline photo album/gallery plugin that displays high quality ... Two vulnerabilities have been made public: ...
similarity:
popularity:
security
wordpress
blog
blogging
tools
blogs
hack
web
webdev
plugins
|
securosis.com
The Business Justification for Data Security. Building a Web Application Security Program. Securosis: On Holiday. Database Security: The Other First Steps ...
similarity:
popularity:
security
blog
technology
mac
sysadmin
networking
network
osx
infosec
blogs
|
cDc communications
No information avaiable
similarity:
popularity:
hacking
security
culture
underground
hacker
tech
technology
hack
blog
activism
|
Welcome to iDefense Labs -- Managed Security Services and Information Security for Government and Fortune 500 Organizations // iDefense Labs
VeriSign iDefense services deliver comprehensive, actionable intelligence regarding network-based security threats and vulnerabilities which can help organizations ...
similarity:
popularity:
security
research
hacking
software
infosec
reference
internet
utilities
programming
idefense
|
milw0rm - exploits : vulnerabilities : videos : papers : shellcode
milw0rm exploits and 0day exploits database ... send all submissions to submit[at]milw0rm.com [gpg] Videos hosted by Tradebit file hosting ...
similarity:
popularity:
security
hacking
exploits
hack
exploit
vulnerabilities
reference
tools
programming
code
|
Rational Survivability - THE Cloud & Virtualization Security Blog
No information avaiable
similarity:
popularity:
security
cloud
virtualization
blog
cloudcomputing
blogs
technology
saas
innovation
vmware
|
Zone-H.org - IT Security Information Network
Zone-H - Unrestricted Information - A global view to the world with a stress on the ITsec
similarity:
popularity:
security
hacking
news
technology
internet
resources
computer
tech
hack
reference
|