Aggregator
Trie树与Word Puzzles
10 years 5 months ago
Terenceli
WireLurker: new malware targets Apple users
10 years 5 months ago
A new malware has been discovered that targets both Apple Mac computers and iPhones, Neowin reports. It is the first known malware that can infect iPhones that have not been jailbroken.
ELF文件格式简介
10 years 5 months ago
Terenceli
Facebook welcomes private browsers with dedicated Tor link
10 years 5 months ago
Facebook has opened its doors to privacy concerned users, but opening up a dedicated Tor link, guaranteeing that people who visit the social networking site through anonymous browsers aren't mistaken for botnets, Gizmodo reports.
How to make sure Adobe Flash is up-to-date and enabling it on-demand
10 years 5 months ago
Learn how to update Adobe Flash Player, to help protect against malware attacks.
遍历序列确定二叉树
10 years 5 months ago
Terenceli
Intel和VMware应聘小记
10 years 5 months ago
Terenceli
Top 5 Scariest Zombie Botnets
10 years 6 months ago
An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.
The Evolution of Webinject
10 years 6 months ago
Last month, we presented “The Evolution of Webinject” in Seattle at the 24th Virus Bulletin conference. This blog post will go over its key findings and provide links to the various material that has been released in the last few weeks.
Botnet malware: What it is and how to fight it
10 years 6 months ago
Malware or malicious computer code has been around in some form or other for over 40 years, but the use of malware to take control of a group of computers that are then organized into something called a botnet is more a twenty-first century phenomenon.
Myths about malware: an exploit is the same as malware
10 years 6 months ago
In this post we want to share with you a question that arose from the first post in this series: whether exploits are the same as malware. What are we talking about? The best way to debunk any myth is to start by understanding what it is we are talking about.
Botnets: remote controls for cybercriminals
10 years 6 months ago
As promised in our post about the European Cyber Security Month during October, we are publishing about Botnets and Exploits this week. Even though we had the Poodle flaw in the web encryption standard a few days ago, we are using this week to explain what are botnets and exploits and how they work.
监控线程的 Mach 异常
10 years 6 months ago
xnu是采用了微内核的架构,因此
Proteas
xcode中处理工程警告的几种方法
10 years 6 months ago
随着项目的慢慢发展,工程中的警告shu
Proteas
ip2dec, dec2ip, ip2hex and hex2ip
10 years 6 months ago
dieyushi
Privacy online - what you can do (and what you can’t)
10 years 6 months ago
Many of us have moments when we need, or want, to be more private online - when searching for a new job, for instance, or when having a private business conversation.
Facebook 'Safety Check' allows travelers to alert family
10 years 6 months ago
Facebook is introducing a new feature targeted at users it believes are in or near a disaster zone to let their loved ones know they are okay, according to The Independent.
October is the Cyber Security Month: stats, events and advice
10 years 6 months ago
Since October 2012, the European Cyber Security Month is going live as a pilot plan across Europe. Inspired by the concept of other similar projects that were successfully implemented around the globe. One of them is the Stop. Thinking. Connect campaign supported by the National Cyber Security Awareness Month in the United States.
Tinba Malware: Domain Generation Algorithm Means New, Improved, and Persistent
10 years 6 months ago
Tinba, also known as "Tinybanker", "Zusy" and "HµNT€R$", is a banking Trojan.