The Latest in IT Security

Posts Tagged ‘level details’

The shellcode described in this post was obtained from the Eleonore v1.2 exploit kit. High-level details about that kit are mentioned in my April 2012 blog post. This post is a technical view of the actual shellcode and is intended to be instructive to the inquisitive reader. Since this code is relatively old, the main […]

Read more ...


I have been in Buenos Aires attending the ekoParty security conference, which has recently exploded in popularity. This year saw more than 1,000 attendees. ekoParty is a premier technical conference in Latin America (think Defcon/Blackhat) that showcases presenters from around the world, with the bulk of them local to Argentina. The conference runs three days […]

Read more ...


TUESDAY, MAY 21, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments