Wednesday, June 24, 2015
Posted by manager
Reader's rate:
0
Contributed by Kevin McCoy In the beginning, the National Security Agency (NSA) was founded November 8, 1952 and headquartered at Fort George G. Meade, Maryland. The agency is tasked with collecting and processing foreign intelligence to help with military operations (“FAQs”). A primary... + continue reading
Wednesday, June 24, 2015
Posted by manager
Reader's rate:
0
Contributed by Diabolic Crab from many years ago from the old Infosecwriters archives This is a fairly new web application vulnerability. It can be used for the following purposes. Cross site scripting (XSS): This is a very common and old form of vulnerability where it allows the user... + continue reading
Wednesday, June 24, 2015
Posted by manager
Reader's rate:
0
Contributed by C0ntex back in 2004 from the old Infosecwriters archives Returning to libc is a method of exploiting a buffer overflow on a system that has a non-executable stack, it is very similar to a standard buffer overflow, in that the return address is changed to point at a new location... + continue reading
Monday, June 22, 2015
Posted by manager
Reader's rate:
5
Contributed by Marc Koser. This paper is intended to demystify the complicated subject of stack-based overflows. I have written this paper for people who may not have a background in computer science. I explain what a buffer is, what the different parts of a buffer are used for, how to craft a... + continue reading
Sunday, June 21, 2015
Posted by manager
Reader's rate:
0
Contributed by Larry Gene Hastings Jr. This paper seeks to provide an understanding of the different computing needs being utilized in public school systems by identifying devices used to provide digital communication services to employees and students. By identifying what services are being... + continue reading

Home Page

Featured Articles

Wednesday, 24/06/15 - 0 comment(s)
Contributed by Kevin McCoy In the beginning, the National Security Agency (NSA) was founded November 8, 1952 and headquartered at Fort George G. Meade, Maryland. The agency is tasked with collecting and processing foreign intelligence to help with military operations (“FAQs”). A primary objective of the agency has always been cryptanalysis as... + continue reading
Monday, 22/06/15 - 0 comment(s)
Contributed by Marc Koser. This paper is intended to demystify the complicated subject of stack-based overflows. I have written this paper for people who may not have a background in computer science. I explain what a buffer is, what the different parts of a buffer are used for, how to craft a buffer overflow, and what happens when a buffer... + continue reading

Red Tape

754
reads
38 today
Tuesday, 16/06/15 - 0 comment(s)
Contributed by Emily Walters. Online gaming is a market that is growing as more multiplayer, internet based games are released. With this growing market comes a growing risk for the consumers.... + continue reading

Cryptography

435
reads
40 today
Monday, 22/06/15 - 0 comment(s)
Contributed by Anoop M.S. The paper gives an introduction to elliptic curve cryptography (ECC) and how it is used in the implementation of digital signature (ECDSA) and key agreement (ECDH)... + continue reading

Exploitation

322
reads
43 today
Wednesday, 24/06/15 - 0 comment(s)
Contributed by Diabolic Crab from many years ago from the old Infosecwriters archives This is a fairly new web application vulnerability. It can be used for the following purposes. Cross site... + continue reading

Sistema

539
reads
43 today
Sunday, 21/06/15 - 0 comment(s)
Contributed by Larry Gene Hastings Jr. This paper seeks to provide an understanding of the different computing needs being utilized in public school systems by identifying devices used to provide... + continue reading

Et Cetera

361
reads
54 today
Wednesday, 24/06/15 - 0 comment(s)
Contributed by Kevin McCoy In the beginning, the National Security Agency (NSA) was founded November 8, 1952 and headquartered at Fort George G. Meade, Maryland. The agency is tasked with... + continue reading