Aggregator
MS509团队获三星官方致谢
9 years 4 months ago
近日,三星手机公司发布了2016年11月份的安全公告[1],对MS509团队发现的一中危漏洞予以致谢。漏洞详
MS509团队获三星官方致谢
9 years 4 months ago
近日,三星手机公司发布了2016年11月份的安全公告[1],对MS509团队发现的一中危漏洞予以致谢。漏洞详
MS509团队获三星官方致谢
9 years 4 months ago
近日,三星手机公司发布了2016年11月份的安全公告[1],对MS509团队发现的一中危漏洞予以致谢。漏洞详
App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
9 years 4 months ago
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality...
The post App Store Flooded with Phony Retail Apps to Kick Off Holiday Season appeared first on McAfee Blog.
McAfee
Little Trickbot Growing Up: New Campaign
9 years 5 months ago
Recently there have been several reports of a financial malware named TrickBot; this malware's code looks similar to Dyre.
Little Trickbot Growing Up: New Campaign
9 years 5 months ago
Recently there have been several reports of a financial malware named TrickBot; this malware's code looks similar to Dyre.
Little Trickbot Growing Up: New Campaign
9 years 5 months ago
Recently there have been several reports of a financial malware named TrickBot; this malware's code looks similar to Dyre.
DBHelper 类
9 years 5 months ago
C# 操作数据库辅助类
Yes, My Name is ||
9 years 5 months ago
Different cultures and nationalities have different naming conventions; I came from a one that led me to face the universe with a personal name "Or". I fact, my name has different meanings in different languages. In English the meaning of "Or" is function word that indicate alternatives and in computer coding languages the name "Or" is being used as Boolean operator that enable us to write conditions in our code.
Or Katz
Planning for the End of 2016: A Leap Second and the End-of-Support for SHA-1 TLS Certificates
9 years 5 months ago
A leap second and the final end of browser support for SHA-1 TLS certificates will happen and can potentially break software systems and applications.
Erik Nygren
C# 捕获屏幕源码
9 years 5 months ago
C# 捕获屏幕源码示例代码
用 JavaScript 做一些有趣的事情
9 years 5 months ago
昨天晚上正逛着博客园,突然室友说英雄联盟有个“末日仪式召唤提莫大魔王”,活动要求点击按钮500次,就可以领取末日小兵图标。然后就看见室友“哒哒哒”的点击着鼠标。我心想,这不得累死,难道就不能写个Js脚
Dll Hijacker - 杀死比特
9 years 5 months ago
#coding=utf-8 # # Dll Hijacker # # platform: Python 2.x @ Windows # # author:Coca1ne import os,sys,time import pefile def main(): try: pe = pefile.PE(sys.argv[1]) exportTable ...
杀死比特
Arch Linux上使用ACR122U破解鲜奶卡
9 years 5 months ago
PE文件格式学习之PE头移位 - 杀死比特
9 years 5 months ago
以前刚开始学网络安全,是从免杀开始的。记得那时候杀毒软件还很弱。金山江民瑞星还存在。 那会什么原理也不懂,就一直瞎鼓捣。(后来转入渗透行列了) 这段时间一直在学PE格式,突然想起来以前很古老的PE文件头移位。 网上搜了搜,看大家虽然做了视频,但是竟然没人讲原理。借着刚好在学PE格式的知识,就做个PE
杀死比特
第一篇文章
9 years 5 months ago
时至今日,博客程序也差不多完成了。欢迎提意见。
DARPA Proves Automated Systems Can Detect, Patch Software Flaws at Machine Speed
9 years 5 months ago
According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.
DARPA Proves Automated Systems Can Detect, Patch Software Flaws at Machine Speed
9 years 5 months ago
According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.
DARPA Proves Automated Systems Can Detect, Patch Software Flaws at Machine Speed
9 years 5 months ago
According to DARPA, it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc.