Ksplice » Much ado about NULL: Exploiting a ...
No information avaiable
http://blog.ksplice.com/2010/04/exploiting-kernel-null-dereferences/
popularity:
linux
security
kernel
programming
exploit
hacking
null
pointer
c
tutorial
|
Secure Programming for Linux and Unix HOWTO
This book provides a set of design and implementation guidelines for writing ... Such programs include application programs used as viewers of remote data, web ...
similarity:
popularity:
security
programming
linux
unix
c
howto
secure
development
c++
c\/c++
|
10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) »
Me my self and quite possibly some one else. " " Who is Darknet? ... The newest contender on the block of course is BackTrack, which we have spoken about previously. ...
similarity:
popularity:
security
linux
livecd
tools
hacking
forensics
distro
software
recovery
boot
|
milw0rm - exploits : vulnerabilities : videos : papers : shellcode
milw0rm exploits and 0day exploits database ... send all submissions to submit[at]milw0rm.com [gpg] Videos hosted by Tradebit file hosting ...
similarity:
popularity:
security
hacking
exploits
hack
exploit
vulnerabilities
reference
tools
programming
code
|
www.makelinux.net
No information avaiable
similarity:
popularity:
linux
kernel
programming
documentation
tutorial
opensource
reference
education
development
unix
|
The Kernel Boot Process : Gustavo Duarte
Nguồn : http://duartes.org/gustavo/blog/post/kernel-boot-process ... linux kernel boot process; http://duartes.org/gustavo/blog/post/kernel-boot ...
similarity:
popularity:
linux
kernel
boot
os
bootloader
programming
tutorial
toread
hardware
reference
|
[lcamtuf.coredump.cx]
Click here for sample chapters, plenty of reviews, and other useful information. ... NEW Interesting vulnerabilities: exploitable DOM fuzzing crashes in multiple ...
similarity:
popularity:
security
hacking
programming
tools
network
software
people
blog
linux
geek
|
TECH SOURCE FROM BOHOL: 10 Best Hacking and Security Software Tools for Linux
Hacks, News, Tutorials, Reviews about Linux, Open Source, Ubuntu, Google, Apple, Microsoft, Programming, Gadgets, and everything related to Digital Technology.
similarity:
popularity:
linux
security
tools
hacking
software
unix
sysadmin
hack
utilities
ubuntu
|
Howto: build Linux kernel module against installed kernel w/o full kernel source tree | nixCraft
No information avaiable
similarity:
popularity:
linux
kernel
howto
module
programming
tutorial
reference
tutorials
compile
development
|
LXR / The Linux Cross Reference
The Linux Cross-Reference project is the testbed application of a general hypertext cross-referencing tool.
similarity:
popularity:
linux
kernel
programming
source
reference
code
development
opensource
documentation
lxr
|
Remote-Exploit.org - Supplying offensive security products to the world
A weak password might be very short or only use alphanumeric characters, making ... A weak password can also be one that is easily guessed by someone profiling the ...
similarity:
popularity:
security
linux
hacking
tools
livecd
hack
wifi
wireless
network
backtrack
|