«
Expand/Collapse
24 items tagged "understanding"
Related tags:
asia [+],
black hat [+],
whitepaper [+],
heap [+],
security authors [+],
paper [+],
joe grand [+],
hardware hacking [+],
Hardware [+],
vuln [+],
usa [+],
unexpected [+],
system [+],
russ rogers tags [+],
russ rogers [+],
portuguese [+],
persistent data [+],
office documents [+],
office [+],
microcontrollers [+],
kingdom [+],
keys to the kingdom [+],
keys [+],
justin ferguson tags [+],
justin ferguson [+],
exploitation techniques [+],
data structure [+],
dang [+],
covert channel [+],
command execution [+],
bruce dang [+],
basic [+],
audio [+],
arm architecture [+],
architecture [+],
ARM [+],
xss [+],
voltage divider [+],
video [+],
timothy brueggemann [+],
threat intelligence [+],
targeted [+],
social networking [+],
slides [+],
security [+],
ryan permeh [+],
realistic view [+],
rajendra [+],
pic microcontrollers [+],
pic [+],
name of the game [+],
microcontroller [+],
meter [+],
li tags [+],
krakow [+],
internet worms [+],
internet [+],
intelligence [+],
information [+],
hspii [+],
flash actionscript [+],
flash [+],
exploiting [+],
eddie schwartz [+],
demographic variables [+],
decoding [+],
data retention [+],
dale coddington [+],
capacitance meter [+],
capacitance [+],
boston [+],
authors [+],
analog circuits [+],
action script flash [+]
-
-
10:01
»
Hack a Day
Building a capacitance meter is a great exercise. If you’re feeling quite safe in your digital-circuit-only life, this will push just far enough out of the comfort zone for you to see there’s nothing to fear in adding analog circuits to your designs. Here, [Raj] compares a voltage divider and RC timer to calculate the value of [...]
-
-
5:01
»
Hack a Day
Interrupts are the name of the game for more functional microcontroller firmware. [Rajendra] just posted a tutorial covering all of the interrupt types for the PIC 16F688 microcontroller. He gives an overview of all of the major points: what an interrupt is, what causes interrupts, how to read the datasheet (often overlooked) to set up [...]
-
-
15:05
»
Packet Storm Security Recent Files
Whitepaper called Understanding the heap by breaking it. A case study of the heap as a persistent data structure through non-traditional exploitation techniques.
-
15:05
»
Packet Storm Security Misc. Files
Whitepaper called Understanding the heap by breaking it. A case study of the heap as a persistent data structure through non-traditional exploitation techniques.
-
-
0:16
»
SecDocs
Authors:
Timothy Brueggemann Tags:
security data retention Event:
Source Conference Boston 2010 Abstract: Protection of Highly Sensitive Personally Identifiable Information (HSPII) data is essential to every organization and requires a well-developed set of rules and processes to be enforced by the Information Technology (IT) organization. These rules and processes must be incorporated into a formal HSPII protection program that is understood by all IT workers in the organization. The purpose of this study was to examine the IT employee understanding of HSPII programs. The assumption is made that the security of the vast amount of HSPII data stored on organizational systems is directly related to the understanding level of the HSPII programs implemented . There were significant correlations between each of the six demographic variables examined in this study as they related to understanding. The results of this study provide a realistic view of the IT professional's understanding of their responsibility and ability in protecting HSPII data.
-
-
1:00
»
darkc0de
Best Paper for Understanding XSS with Samples