ݺߣshows by User: intrudere / http://www.slideshare.net/images/logo.gif ݺߣshows by User: intrudere / Mon, 19 Aug 2013 15:18:52 GMT ݺߣShare feed for ݺߣshows by User: intrudere Exp user guide_4.6 /slideshow/exp-user-guide46/25392467 expuserguide4-130819151853-phpapp01
Latest Metasploit Express User Guide]]>

Latest Metasploit Express User Guide]]>
Mon, 19 Aug 2013 15:18:52 GMT /slideshow/exp-user-guide46/25392467 intrudere@slideshare.net(intrudere) Exp user guide_4.6 intrudere Latest Metasploit Express User Guide <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/expuserguide4-130819151853-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Latest Metasploit Express User Guide
Exp user guide_4.6 from losalamos
]]>
1802 5 https://cdn.slidesharecdn.com/ss_thumbnails/expuserguide4-130819151853-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Remote api /slideshow/remote-api/25391858 remote-api-130819145645-phpapp02
This document describes transport, protocol, and individual methods available via the Metasploit Remote API. This API can be used to programmatically drive the Metasploit Framework and Metasploit Pro products.]]>

This document describes transport, protocol, and individual methods available via the Metasploit Remote API. This API can be used to programmatically drive the Metasploit Framework and Metasploit Pro products.]]>
Mon, 19 Aug 2013 14:56:45 GMT /slideshow/remote-api/25391858 intrudere@slideshare.net(intrudere) Remote api intrudere This document describes transport, protocol, and individual methods available via the Metasploit Remote API. This API can be used to programmatically drive the Metasploit Framework and Metasploit Pro products. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/remote-api-130819145645-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document describes transport, protocol, and individual methods available via the Metasploit Remote API. This API can be used to programmatically drive the Metasploit Framework and Metasploit Pro products.
Remote api from losalamos
]]>
1682 4 https://cdn.slidesharecdn.com/ss_thumbnails/remote-api-130819145645-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security flawsu pnp /slideshow/security-flawsu-pnp-25391621/25391621 securityflawsupnp-130819144753-phpapp02
This whitepaper details research conducted by Rapid7, which reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPnP enables devices such as routers, printers, network-attached storage (NAS), media players and smart TVs to communicate with each other]]>

This whitepaper details research conducted by Rapid7, which reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPnP enables devices such as routers, printers, network-attached storage (NAS), media players and smart TVs to communicate with each other]]>
Mon, 19 Aug 2013 14:47:52 GMT /slideshow/security-flawsu-pnp-25391621/25391621 intrudere@slideshare.net(intrudere) Security flawsu pnp intrudere This whitepaper details research conducted by Rapid7, which reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPnP enables devices such as routers, printers, network-attached storage (NAS), media players and smart TVs to communicate with each other <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityflawsupnp-130819144753-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This whitepaper details research conducted by Rapid7, which reveals that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPnP enables devices such as routers, printers, network-attached storage (NAS), media players and smart TVs to communicate with each other
Security flawsu pnp from losalamos
]]>
498 4 https://cdn.slidesharecdn.com/ss_thumbnails/securityflawsupnp-130819144753-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Zmap fast internet wide scanning and its security applications /intrudere/zmap-fast-internet-wide-scanning-and-its-security-applications zmapfastinternetwidescanninganditssecurityapplications-130819113635-phpapp02
Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space with existing tools is both difficult and slow. We introduce ZMap, a modular, open-source network scanner specifically architected to perform Internet-wide scans and capable of surveying the entire IPv4 address space in under 45 minutes from user space on a single machine,]]>

Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space with existing tools is both difficult and slow. We introduce ZMap, a modular, open-source network scanner specifically architected to perform Internet-wide scans and capable of surveying the entire IPv4 address space in under 45 minutes from user space on a single machine,]]>
Mon, 19 Aug 2013 11:36:35 GMT /intrudere/zmap-fast-internet-wide-scanning-and-its-security-applications intrudere@slideshare.net(intrudere) Zmap fast internet wide scanning and its security applications intrudere Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space with existing tools is both difficult and slow. We introduce ZMap, a modular, open-source network scanner specifically architected to perform Internet-wide scans and capable of surveying the entire IPv4 address space in under 45 minutes from user space on a single machine, <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/zmapfastinternetwidescanninganditssecurityapplications-130819113635-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space with existing tools is both difficult and slow. We introduce ZMap, a modular, open-source network scanner specifically architected to perform Internet-wide scans and capable of surveying the entire IPv4 address space in under 45 minutes from user space on a single machine,
Zmap fast internet wide scanning and its security applications from losalamos
]]>
1304 6 https://cdn.slidesharecdn.com/ss_thumbnails/zmapfastinternetwidescanninganditssecurityapplications-130819113635-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Blanco http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Effective Java Second Edition /slideshow/effective-java-second-edition/4834648 generics-100725153117-phpapp01
]]>

]]>
Sun, 25 Jul 2010 15:31:09 GMT /slideshow/effective-java-second-edition/4834648 intrudere@slideshare.net(intrudere) Effective Java Second Edition intrudere <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/generics-100725153117-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Effective Java Second Edition from losalamos
]]>
326 1 https://cdn.slidesharecdn.com/ss_thumbnails/generics-100725153117-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Swf File Format Spec V10 /slideshow/swf-file-format-spec-v10/4548571 swffileformatspecv10-100619133204-phpapp02
The SWF file format is available as an open specification to create products and technology that implement the specification. SWF 9 introduced the ActionScript™ 3.0 language and virtual machine. The SWF 10 specification expands text capabilities with support for bidirectional text and complex scripts with the new DefineFont4 tag. The DefineBitsJPEG4 tag allows embedding JPEG images that have an alpha channel for opacity and also a smoothing filter. SWF 10 also adds support for the free and open-source Speex voice codec and for higher frequencies in the existing Nellymoser codec.]]>

The SWF file format is available as an open specification to create products and technology that implement the specification. SWF 9 introduced the ActionScript™ 3.0 language and virtual machine. The SWF 10 specification expands text capabilities with support for bidirectional text and complex scripts with the new DefineFont4 tag. The DefineBitsJPEG4 tag allows embedding JPEG images that have an alpha channel for opacity and also a smoothing filter. SWF 10 also adds support for the free and open-source Speex voice codec and for higher frequencies in the existing Nellymoser codec.]]>
Sat, 19 Jun 2010 13:31:48 GMT /slideshow/swf-file-format-spec-v10/4548571 intrudere@slideshare.net(intrudere) Swf File Format Spec V10 intrudere The SWF file format is available as an open specification to create products and technology that implement the specification. SWF 9 introduced the ActionScript™ 3.0 language and virtual machine. The SWF 10 specification expands text capabilities with support for bidirectional text and complex scripts with the new DefineFont4 tag. The DefineBitsJPEG4 tag allows embedding JPEG images that have an alpha channel for opacity and also a smoothing filter. SWF 10 also adds support for the free and open-source Speex voice codec and for higher frequencies in the existing Nellymoser codec. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/swffileformatspecv10-100619133204-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The SWF file format is available as an open specification to create products and technology that implement the specification. SWF 9 introduced the ActionScript™ 3.0 language and virtual machine. The SWF 10 specification expands text capabilities with support for bidirectional text and complex scripts with the new DefineFont4 tag. The DefineBitsJPEG4 tag allows embedding JPEG images that have an alpha channel for opacity and also a smoothing filter. SWF 10 also adds support for the free and open-source Speex voice codec and for higher frequencies in the existing Nellymoser codec.
Swf File Format Spec V10 from losalamos
]]>
611 3 https://cdn.slidesharecdn.com/ss_thumbnails/swffileformatspecv10-100619133204-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Developing Adobe AIR 1.5 Applications with HTML and Ajax /slideshow/developing-adobe-air-15-applications-with-html-and-ajax/4548478 devappshtml-100619132610-phpapp02
Provides step-by-step instructions for creating Adobe AIR applications using HTML and Ajax.]]>

Provides step-by-step instructions for creating Adobe AIR applications using HTML and Ajax.]]>
Sat, 19 Jun 2010 13:26:00 GMT /slideshow/developing-adobe-air-15-applications-with-html-and-ajax/4548478 intrudere@slideshare.net(intrudere) Developing Adobe AIR 1.5 Applications with HTML and Ajax intrudere Provides step-by-step instructions for creating Adobe AIR applications using HTML and Ajax. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/devappshtml-100619132610-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Provides step-by-step instructions for creating Adobe AIR applications using HTML and Ajax.
Developing Adobe AIR 1.5 Applications with HTML and Ajax from losalamos
]]>
583 3 https://cdn.slidesharecdn.com/ss_thumbnails/devappshtml-100619132610-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bshield osdi2006 /slideshow/bshield-osdi2006/4384724 bshield-osdi2006-100602004933-phpapp02
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML ]]>

BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML ]]>
Wed, 02 Jun 2010 00:49:26 GMT /slideshow/bshield-osdi2006/4384724 intrudere@slideshare.net(intrudere) Bshield osdi2006 intrudere BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bshield-osdi2006-100602004933-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
Bshield osdi2006 from losalamos
]]>
780 2 https://cdn.slidesharecdn.com/ss_thumbnails/bshield-osdi2006-100602004933-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
"Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP Congestion Control" /slideshow/performance-evaluation-and-comparison-of-westwood-new-reno-and-vegas-tcp-congestion-control/4262914 ccrv31-100524021850-phpapp02
Luigi A. Grieco, Saverio Mascolo. ACM CCR, Vol.34 No.2, April 2004. This article aims at evaluating a comparison between three TCP congestion control algorithms. A really interesting reading.]]>

Luigi A. Grieco, Saverio Mascolo. ACM CCR, Vol.34 No.2, April 2004. This article aims at evaluating a comparison between three TCP congestion control algorithms. A really interesting reading.]]>
Mon, 24 May 2010 02:18:43 GMT /slideshow/performance-evaluation-and-comparison-of-westwood-new-reno-and-vegas-tcp-congestion-control/4262914 intrudere@slideshare.net(intrudere) "Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP Congestion Control" intrudere Luigi A. Grieco, Saverio Mascolo. ACM CCR, Vol.34 No.2, April 2004. This article aims at evaluating a comparison between three TCP congestion control algorithms. A really interesting reading. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ccrv31-100524021850-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Luigi A. Grieco, Saverio Mascolo. ACM CCR, Vol.34 No.2, April 2004. This article aims at evaluating a comparison between three TCP congestion control algorithms. A really interesting reading.
"Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP Congestion Control" from losalamos
]]>
1101 5 https://cdn.slidesharecdn.com/ss_thumbnails/ccrv31-100524021850-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tcp santa cruz /slideshow/tcp-santa-cruz/4262710 tcpsantacruz-100524012801-phpapp02
C. Parsa, J.J. Garcia-Luna-Aceves. This paper describes TCP Santa Cruz, a really interesting congestion control algorithm designed to work with path asymmetries, out-of-order packet delivery, and networks with lossy links, limited bandwidth and dynamic changes in delay. ]]>

C. Parsa, J.J. Garcia-Luna-Aceves. This paper describes TCP Santa Cruz, a really interesting congestion control algorithm designed to work with path asymmetries, out-of-order packet delivery, and networks with lossy links, limited bandwidth and dynamic changes in delay. ]]>
Mon, 24 May 2010 01:27:57 GMT /slideshow/tcp-santa-cruz/4262710 intrudere@slideshare.net(intrudere) Tcp santa cruz intrudere C. Parsa, J.J. Garcia-Luna-Aceves. This paper describes TCP Santa Cruz, a really interesting congestion control algorithm designed to work with path asymmetries, out-of-order packet delivery, and networks with lossy links, limited bandwidth and dynamic changes in delay. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/tcpsantacruz-100524012801-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> C. Parsa, J.J. Garcia-Luna-Aceves. This paper describes TCP Santa Cruz, a really interesting congestion control algorithm designed to work with path asymmetries, out-of-order packet delivery, and networks with lossy links, limited bandwidth and dynamic changes in delay.
Tcp santa cruz from losalamos
]]>
502 4 https://cdn.slidesharecdn.com/ss_thumbnails/tcpsantacruz-100524012801-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
"Start-up dynamics of TCP's Congestion Control and Avoidance Schemes" /slideshow/startup-dynamics-of-tcps-congestion-control-and-avoidance-schemes/4262654 hoe-thesis-100524051526-phpapp01
Janie Hoe. Master Thesis 1995. This master thesis is really interesting since Janie Hoe was the first who introduced some basic concepts which could be found few times later in many algorithms which deal with recovery from multiple losses inside a window a data. ]]>

Janie Hoe. Master Thesis 1995. This master thesis is really interesting since Janie Hoe was the first who introduced some basic concepts which could be found few times later in many algorithms which deal with recovery from multiple losses inside a window a data. ]]>
Mon, 24 May 2010 01:10:43 GMT /slideshow/startup-dynamics-of-tcps-congestion-control-and-avoidance-schemes/4262654 intrudere@slideshare.net(intrudere) "Start-up dynamics of TCP's Congestion Control and Avoidance Schemes" intrudere Janie Hoe. Master Thesis 1995. This master thesis is really interesting since Janie Hoe was the first who introduced some basic concepts which could be found few times later in many algorithms which deal with recovery from multiple losses inside a window a data. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hoe-thesis-100524051526-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Janie Hoe. Master Thesis 1995. This master thesis is really interesting since Janie Hoe was the first who introduced some basic concepts which could be found few times later in many algorithms which deal with recovery from multiple losses inside a window a data.
"Start-up dynamics of TCP's Congestion Control and Avoidance Schemes" from losalamos
]]>
903 3 https://cdn.slidesharecdn.com/ss_thumbnails/hoe-thesis-100524051526-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Conficker summary-review-07may10-en /intrudere/conficker-summaryreview07may10en conficker-summary-review-07may10-en-100524050339-phpapp01
A paper released today by ICANN provides a chronology of events related to the containment of the Conficker worm. The report, "Conficker Summary and Review (PDF)," is authored by Dave Piscitello, ICANN's Senior Security Technologist on behalf of the organization's security team. Below is the introduction excerpt from the paper: The Conficker worm first appeared in October 2008 and quickly earned as much notoriety as Code Red, Blaster, Sasser and SQL Slammer. The infection is found in both home and business networks, including large multi‐national enterprise networks. Attempts to estimate the populations of Conficker infected hosts at any given time have varied widely, but all estimates exceed millions of personal computers. ]]>

A paper released today by ICANN provides a chronology of events related to the containment of the Conficker worm. The report, "Conficker Summary and Review (PDF)," is authored by Dave Piscitello, ICANN's Senior Security Technologist on behalf of the organization's security team. Below is the introduction excerpt from the paper: The Conficker worm first appeared in October 2008 and quickly earned as much notoriety as Code Red, Blaster, Sasser and SQL Slammer. The infection is found in both home and business networks, including large multi‐national enterprise networks. Attempts to estimate the populations of Conficker infected hosts at any given time have varied widely, but all estimates exceed millions of personal computers. ]]>
Mon, 24 May 2010 00:40:32 GMT /intrudere/conficker-summaryreview07may10en intrudere@slideshare.net(intrudere) Conficker summary-review-07may10-en intrudere A paper released today by ICANN provides a chronology of events related to the containment of the Conficker worm. The report, "Conficker Summary and Review (PDF)," is authored by Dave Piscitello, ICANN's Senior Security Technologist on behalf of the organization's security team. Below is the introduction excerpt from the paper: The Conficker worm first appeared in October 2008 and quickly earned as much notoriety as Code Red, Blaster, Sasser and SQL Slammer. The infection is found in both home and business networks, including large multi‐national enterprise networks. Attempts to estimate the populations of Conficker infected hosts at any given time have varied widely, but all estimates exceed millions of personal computers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/conficker-summary-review-07may10-en-100524050339-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A paper released today by ICANN provides a chronology of events related to the containment of the Conficker worm. The report, &quot;Conficker Summary and Review (PDF),&quot; is authored by Dave Piscitello, ICANN&#39;s Senior Security Technologist on behalf of the organization&#39;s security team. Below is the introduction excerpt from the paper: The Conficker worm first appeared in October 2008 and quickly earned as much notoriety as Code Red, Blaster, Sasser and SQL Slammer. The infection is found in both home and business networks, including large multi‐national enterprise networks. Attempts to estimate the populations of Conficker infected hosts at any given time have varied widely, but all estimates exceed millions of personal computers.
Conficker summary-review-07may10-en from losalamos
]]>
665 6 https://cdn.slidesharecdn.com/ss_thumbnails/conficker-summary-review-07may10-en-100524050339-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Jscriptdeviationsfromes3 /slideshow/jscriptdeviationsfromes3/3990697 jscriptdeviationsfromes3-100506055555-phpapp01
]]>

]]>
Thu, 06 May 2010 05:55:45 GMT /slideshow/jscriptdeviationsfromes3/3990697 intrudere@slideshare.net(intrudere) Jscriptdeviationsfromes3 intrudere <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jscriptdeviationsfromes3-100506055555-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Jscriptdeviationsfromes3 from losalamos
]]>
596 2 https://cdn.slidesharecdn.com/ss_thumbnails/jscriptdeviationsfromes3-100506055555-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sourcefire Vulnerability Research Team Labs /slideshow/sourcefire-vulnerability-research-team-labs/3880048 sfvrt-nrt-100428011155-phpapp01
Today's client side attack threats represent a boon for the attacker in ways to obfuscate, evade, and hide their attacks methods. Adobe PDF, Flash, Microsoft Office documents, and Javascript require a very deep understanding of the file format, how its interpreted in the Browser, and understanding of the byte code paths that some of these formats can generate. To effectively handle some of these types of attacks it requires processing of these files multiple times to deal with compression, obfuscation, program execution, etc. This requires a new type of system to handle this type of inspection. The NRT system allows for this deep file format understanding and inspection. ]]>

Today's client side attack threats represent a boon for the attacker in ways to obfuscate, evade, and hide their attacks methods. Adobe PDF, Flash, Microsoft Office documents, and Javascript require a very deep understanding of the file format, how its interpreted in the Browser, and understanding of the byte code paths that some of these formats can generate. To effectively handle some of these types of attacks it requires processing of these files multiple times to deal with compression, obfuscation, program execution, etc. This requires a new type of system to handle this type of inspection. The NRT system allows for this deep file format understanding and inspection. ]]>
Wed, 28 Apr 2010 01:05:27 GMT /slideshow/sourcefire-vulnerability-research-team-labs/3880048 intrudere@slideshare.net(intrudere) Sourcefire Vulnerability Research Team Labs intrudere Today's client side attack threats represent a boon for the attacker in ways to obfuscate, evade, and hide their attacks methods. Adobe PDF, Flash, Microsoft Office documents, and Javascript require a very deep understanding of the file format, how its interpreted in the Browser, and understanding of the byte code paths that some of these formats can generate. To effectively handle some of these types of attacks it requires processing of these files multiple times to deal with compression, obfuscation, program execution, etc. This requires a new type of system to handle this type of inspection. The NRT system allows for this deep file format understanding and inspection. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sfvrt-nrt-100428011155-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Today&#39;s client side attack threats represent a boon for the attacker in ways to obfuscate, evade, and hide their attacks methods. Adobe PDF, Flash, Microsoft Office documents, and Javascript require a very deep understanding of the file format, how its interpreted in the Browser, and understanding of the byte code paths that some of these formats can generate. To effectively handle some of these types of attacks it requires processing of these files multiple times to deal with compression, obfuscation, program execution, etc. This requires a new type of system to handle this type of inspection. The NRT system allows for this deep file format understanding and inspection.
Sourcefire Vulnerability Research Team Labs from losalamos
]]>
1256 6 https://cdn.slidesharecdn.com/ss_thumbnails/sfvrt-nrt-100428011155-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mixing Games And Applications /slideshow/mixing-games-and-applications/3001168 mixinggamesandapplications-100127015921-phpapp01
Target audience: Interaction designers, Introductory game design This talk is about building learning and fun into your applications. If you’ve ever wondered how games work and how they can help you build better apps, this is the talk for you. Along the way, we’ll discuss a new philosophy of interaction design that is already creating a major competitive advantage for innovative application developers.]]>

Target audience: Interaction designers, Introductory game design This talk is about building learning and fun into your applications. If you’ve ever wondered how games work and how they can help you build better apps, this is the talk for you. Along the way, we’ll discuss a new philosophy of interaction design that is already creating a major competitive advantage for innovative application developers.]]>
Wed, 27 Jan 2010 01:59:15 GMT /slideshow/mixing-games-and-applications/3001168 intrudere@slideshare.net(intrudere) Mixing Games And Applications intrudere Target audience: Interaction designers, Introductory game design This talk is about building learning and fun into your applications. If you’ve ever wondered how games work and how they can help you build better apps, this is the talk for you. Along the way, we’ll discuss a new philosophy of interaction design that is already creating a major competitive advantage for innovative application developers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mixinggamesandapplications-100127015921-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Target audience: Interaction designers, Introductory game design This talk is about building learning and fun into your applications. If you’ve ever wondered how games work and how they can help you build better apps, this is the talk for you. Along the way, we’ll discuss a new philosophy of interaction design that is already creating a major competitive advantage for innovative application developers.
Mixing Games And Applications from losalamos
]]>
1273 8 https://cdn.slidesharecdn.com/ss_thumbnails/mixinggamesandapplications-100127015921-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cryptointro /slideshow/cryptointro/3001147 cryptointro-100127015448-phpapp01
An Introduction to Cryptography and Digital Signatures]]>

An Introduction to Cryptography and Digital Signatures]]>
Wed, 27 Jan 2010 01:54:40 GMT /slideshow/cryptointro/3001147 intrudere@slideshare.net(intrudere) Cryptointro intrudere An Introduction to Cryptography and Digital Signatures <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cryptointro-100127015448-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An Introduction to Cryptography and Digital Signatures
Cryptointro from losalamos
]]>
543 2 https://cdn.slidesharecdn.com/ss_thumbnails/cryptointro-100127015448-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Astaro Orange Paper Oss Myths Dispelled /slideshow/astaro-orange-paper-oss-myths-dispelled/3001134 astaroorangepaperossmythsdispelled-100127015154-phpapp01
Myth One: Open Source Software Is Too Risky for IT Security]]>

Myth One: Open Source Software Is Too Risky for IT Security]]>
Wed, 27 Jan 2010 01:51:51 GMT /slideshow/astaro-orange-paper-oss-myths-dispelled/3001134 intrudere@slideshare.net(intrudere) Astaro Orange Paper Oss Myths Dispelled intrudere Myth One: Open Source Software Is Too Risky for IT Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/astaroorangepaperossmythsdispelled-100127015154-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Myth One: Open Source Software Is Too Risky for IT Security
Astaro Orange Paper Oss Myths Dispelled from losalamos
]]>
1417 7 https://cdn.slidesharecdn.com/ss_thumbnails/astaroorangepaperossmythsdispelled-100127015154-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Apache Eng https://es.slideshare.net/slideshow/apache-eng/3001125 conociendodb2expressv9-5-100127014837-phpapp02
Securing your Apache Web Server with a thawte Digital Certificate with a thawte Digital Certificate A STEP- BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your Apache Web Server...]]>

Securing your Apache Web Server with a thawte Digital Certificate with a thawte Digital Certificate A STEP- BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your Apache Web Server...]]>
Wed, 27 Jan 2010 01:48:26 GMT https://es.slideshare.net/slideshow/apache-eng/3001125 intrudere@slideshare.net(intrudere) Apache Eng intrudere Securing your Apache Web Server with a thawte Digital Certificate with a thawte Digital Certificate A STEP- BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your Apache Web Server... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/conociendodb2expressv9-5-100127014837-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Securing your Apache Web Server with a thawte Digital Certificate with a thawte Digital Certificate A STEP- BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your Apache Web Server...
from losalamos
]]>
1623 4 https://cdn.slidesharecdn.com/ss_thumbnails/conociendodb2expressv9-5-100127014837-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Conociendo Db2 Express V9.5 https://es.slideshare.net/slideshow/conociendo-db2-express-v95/2857580 25v58n03a13072472pdf001-100108013949-phpapp02
Innovación es la piedra fundamental del progreso en el área tecnológica. En IBM, innovación ha sido parte fundamental en la evolución de nuestros servidores de datos. Habiendo sido pioneros en tecnologías de manejo de datos en los sesentas y setentas, hemos continuado haciendo disponibles tecnologías innovadoras en el área de manejo de datos. Esto se demuestra por las miles de patentes en esta área creados por especialistas de IBM. Como resultado, muchas de las grandes empresas del mundo de hoy en día cuentan en los productos de IBM, como DB2, para manejar sus soluciones que requieren de mucho poder y capacidad y que son de misión critica.]]>

Innovación es la piedra fundamental del progreso en el área tecnológica. En IBM, innovación ha sido parte fundamental en la evolución de nuestros servidores de datos. Habiendo sido pioneros en tecnologías de manejo de datos en los sesentas y setentas, hemos continuado haciendo disponibles tecnologías innovadoras en el área de manejo de datos. Esto se demuestra por las miles de patentes en esta área creados por especialistas de IBM. Como resultado, muchas de las grandes empresas del mundo de hoy en día cuentan en los productos de IBM, como DB2, para manejar sus soluciones que requieren de mucho poder y capacidad y que son de misión critica.]]>
Fri, 08 Jan 2010 01:39:33 GMT https://es.slideshare.net/slideshow/conociendo-db2-express-v95/2857580 intrudere@slideshare.net(intrudere) Conociendo Db2 Express V9.5 intrudere Innovación es la piedra fundamental del progreso en el área tecnológica. En IBM, innovación ha sido parte fundamental en la evolución de nuestros servidores de datos. Habiendo sido pioneros en tecnologías de manejo de datos en los sesentas y setentas, hemos continuado haciendo disponibles tecnologías innovadoras en el área de manejo de datos. Esto se demuestra por las miles de patentes en esta área creados por especialistas de IBM. Como resultado, muchas de las grandes empresas del mundo de hoy en día cuentan en los productos de IBM, como DB2, para manejar sus soluciones que requieren de mucho poder y capacidad y que son de misión critica. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/25v58n03a13072472pdf001-100108013949-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Innovación es la piedra fundamental del progreso en el área tecnológica. En IBM, innovación ha sido parte fundamental en la evolución de nuestros servidores de datos. Habiendo sido pioneros en tecnologías de manejo de datos en los sesentas y setentas, hemos continuado haciendo disponibles tecnologías innovadoras en el área de manejo de datos. Esto se demuestra por las miles de patentes en esta área creados por especialistas de IBM. Como resultado, muchas de las grandes empresas del mundo de hoy en día cuentan en los productos de IBM, como DB2, para manejar sus soluciones que requieren de mucho poder y capacidad y que son de misión critica.
from losalamos
]]>
363 2 https://cdn.slidesharecdn.com/ss_thumbnails/25v58n03a13072472pdf001-100108013949-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mision De Cada Signo https://es.slideshare.net/slideshow/mision-de-cada-signo/2047005 misiondecadasigno-090923030452-phpapp01
la influencia de los astros en la personalidad y la realidads diaria del ser humano.]]>

la influencia de los astros en la personalidad y la realidads diaria del ser humano.]]>
Wed, 23 Sep 2009 03:04:49 GMT https://es.slideshare.net/slideshow/mision-de-cada-signo/2047005 intrudere@slideshare.net(intrudere) Mision De Cada Signo intrudere la influencia de los astros en la personalidad y la realidads diaria del ser humano. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/misiondecadasigno-090923030452-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> la influencia de los astros en la personalidad y la realidads diaria del ser humano.
from losalamos
]]>
755 6 https://cdn.slidesharecdn.com/ss_thumbnails/misiondecadasigno-090923030452-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-intrudere-48x48.jpg?cb=1660942170 I like free desig. elrincondelpoetamaldito.blogspot.com https://cdn.slidesharecdn.com/ss_thumbnails/expuserguide4-130819151853-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/exp-user-guide46/25392467 Exp user guide_4.6 https://cdn.slidesharecdn.com/ss_thumbnails/remote-api-130819145645-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/remote-api/25391858 Remote api https://cdn.slidesharecdn.com/ss_thumbnails/securityflawsupnp-130819144753-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-flawsu-pnp-25391621/25391621 Security flawsu pnp