The Latest in IT Security

Posts Tagged ‘level details’

The shellcode described in this post was obtained from the Eleonore v1.2 exploit kit. High-level details about that kit are mentioned in my April 2012 blog post. This post is a technical view of the actual shellcode and is intended to be instructive to the inquisitive reader. Since this code is relatively old, the main […]

Read more ...

24
Sep
2011

I have been in Buenos Aires attending the ekoParty security conference, which has recently exploded in popularity. This year saw more than 1,000 attendees. ekoParty is a premier technical conference in Latin America (think Defcon/Blackhat) that showcases presenters from around the world, with the bulk of them local to Argentina. The conference runs three days […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments