The Latest in IT Security

Posts Tagged ‘presence’

I got such a chuckle out of this message I had to share it. There is a whole new field opening up of how to handle people’s online presence after death (for example this Mashable post), however I would bet that sending the type of message below isn’t considered one of the acceptable methods. Email […]

Read more ...

I’ve written about Shell Extension without ASLR support before. Not only do they open up explorer.exe to ROP attacks, but other applications too, like Adobe Reader and Microsoft Office. You could use EMET to force ASLR on these DLLs, assuming you know which applications load shell extensions. Because shell extensions are not only loaded into […]

Read more ...

Recently, Facebook has seen a rise in the popularity of Smash or Pass groups. These are communities wherein teens post their pictures so that other teens may comment with either ‘smash’ or ‘pass’. Smash would mean that they would willingly engage with sexual intercourse with the person should the opportunity arise; and Pass if they […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments