Aggregator
C# 捕获屏幕源码
用 JavaScript 做一些有趣的事情
Dll Hijacker - 杀死比特
PE文件格式学习之PE头移位 - 杀死比特
第一篇文章
DARPA Proves Automated Systems Can Detect, Patch Software Flaws at Machine Speed
Leading E-Commerce Platform Magento Cracked by Cybercriminals
There’s a modern joy we’re all too familiar with. We’ve all made an online purchase while reclining in pajamas, computer...
The post Leading E-Commerce Platform Magento Cracked by Cybercriminals appeared first on McAfee Blog.
远程线程注入shellcode笔记 - 杀死比特
October security releases and v6 LTS "Boron" security inclusions
A Great Collaborative Effort: Increasing the Strength of the Zone Signing Key for the Root Zone
A few weeks ago, on Oct. 1, 2016, Verisign successfully doubled the size of the cryptographic key that generates Domain Name System Security Extensions (DNSSEC) signatures for the internet’s DNS root zone. With this change, root zone Domain Name System (DNS) responses can be fully validated using 2048-bit RSA keys. This project involved work by […]
The post A Great Collaborative Effort: Increasing the Strength of the Zone Signing Key for the Root Zone appeared first on Verisign Blog.
第二十四期 电子数据取证的培训和认证(四)
October 2016 security update release
October 2016 security update release
Android漏洞CVE-2015-3825分析及exploit实战:从Crash到劫持PC
DDoS’s Newest Minions: IoT Devices (Volume 1)
Mirai: The IoT Bot that Took Down Krebs and Launched a Tbps Attack on OVH
The Old, The New, and The Future: McAfee Labs September Threats Report
As technology makes our lives increasingly convenient, we rely on it more. We use it constantly nowadays, even entrusting our...
The post The Old, The New, and The Future: McAfee Labs September Threats Report appeared first on McAfee Blog.
What You Can Gain from National Cyber Security Awareness Month
Since 2004, October has been deemed National Cyber Security Awareness Month—a time when government and private organizations come together to...
The post What You Can Gain from National Cyber Security Awareness Month appeared first on McAfee Blog.
Defending Against Layer 7 DDoS Attacks
Layer 7 attacks are some of the most difficult attacks to mitigate because they mimic normal user behavior and are harder to identify. The application layer (per the Open Systems Interconnection model) consists of protocols that focus on process-to-process communication across an IP network and is the only layer that directly interacts with the end […]
The post Defending Against Layer 7 DDoS Attacks appeared first on Verisign Blog.