Index of /files/Technology/Bibliothek/Hacking/


../
(Ebook - Computer) Hacking The Windows Registry..> 19-Mar-2014 03:25    222K
(eBook - PDF) Hugo Cornwall - The Hacker's Hand..> 19-Mar-2014 03:22    278K
(eBook pdf) Hacking into computer systems - a b..> 19-Mar-2014 03:23    615K
(ebook_-_pdf)_Hacking_IIS_Servers.pdf              19-Mar-2014 03:25     31K
64-bit rugrats.pdf                                 18-Mar-2014 22:57     30K
A Beginners Guide To Hacking Computer Systems.pdf  19-Mar-2014 03:14    615K
A Bypass of Cohen's Impossibility Result.pdf       18-Mar-2014 22:52    107K
A Classification of Viruses through Recursion T..> 18-Mar-2014 22:55    157K
A Comprehensive Program for Preventing and Dete..> 18-Mar-2014 22:59      1M
A Computational Model of Computer Virus Propaga..> 18-Mar-2014 22:57     14K
A Computer Virus Is A Thought Manifested.pdf       18-Mar-2014 22:57    5774
A Cooperative Immunization System for an Untrus..> 18-Mar-2014 22:53     75K
A Cost Analysis of Typical Computer Viruses and..> 18-Mar-2014 22:57     91K
A Critical Look at the Regulation of Computer V..> 18-Mar-2014 22:52     96K
A Distributed Approach against Computer Viruses..> 18-Mar-2014 22:58    509K
A Dozen Dangerous Myths About Computer Viruses.pdf 18-Mar-2014 22:59    111K
A Failure to Learn from the Past.pdf               18-Mar-2014 22:58     95K
A Fast Static Analysis Approach To Detect Explo..> 18-Mar-2014 22:55    320K
A Feature Selection and Evaluation Scheme for C..> 18-Mar-2014 22:56    231K
A Filter That Prevents the Spread of Mail-Attac..> 18-Mar-2014 22:54    139K
A Formal Definition of Computer Worms and Some ..> 18-Mar-2014 22:55      1M
A Framework for Deception.pdf                      18-Mar-2014 22:59      3M
A Framework to Detect Novel Computer Viruses vi..> 18-Mar-2014 22:55    311K
A Generic Virus Detection Agent on the Internet..> 18-Mar-2014 22:58    560K
A Generic Virus Scanner in C++.pdf                 18-Mar-2014 22:58     96K
A History Of Computer Viruses - Introduction.pdf   18-Mar-2014 22:58    373K
A History Of Computer Viruses - The Famous `Tri..> 18-Mar-2014 22:58      1M
A History Of Computer Viruses - Three Special V..> 18-Mar-2014 22:58    790K
A Hybrid Model to Detect Malicious Executables.pdf 18-Mar-2014 22:57    246K
A Hygiene Lesson.pdf                               18-Mar-2014 22:54    212K
A Mathematical Theory for the Spread of Compute..> 18-Mar-2014 22:59    400K
A Memory Symptom-based Virus Detection Approach..> 18-Mar-2014 22:54    167K
A Method for Detecting Obfuscated Calls in Mali..> 18-Mar-2014 22:57      1M
A Methodology to Detect and Characterize Kernel..> 18-Mar-2014 22:53    266K
A Mixed Abstraction Level Simulation Model of L..> 18-Mar-2014 22:59    338K
A Model for Detecting the Existence of Unknown ..> 18-Mar-2014 22:49    164K
A Network Worm Vaccine Architecture.pdf            18-Mar-2014 22:53     71K
A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM..> 18-Mar-2014 22:58    715K
A Pact with the Devil.pdf                          18-Mar-2014 22:57    106K
A Plague of Viruses Biological, Computer and Ma..> 18-Mar-2014 22:53    133K
A Potency Relation for Worms and Next-Generatio..> 18-Mar-2014 22:58    282K
A Proposed Taxonomy of Software Weapons.pdf        18-Mar-2014 22:59    657K
A Public Health Approach to Preventing Malware ..> 18-Mar-2014 22:57    708K
A Response to the March 31, 2005 Wall Street Jo..> 18-Mar-2014 22:57     12K
A Retrovirus Inspired Algorithm for Virus Detec..> 18-Mar-2014 22:59    343K
A Self-reproducing Analogue.pdf                    18-Mar-2014 22:59    304K
A Semantics-Based Approach to Malware Detection..> 18-Mar-2014 22:58    344K
A Sense of 'Danger' for Windows Processes.pdf      18-Mar-2014 22:57    274K
A Sense of Self for Unix Processes.pdf             18-Mar-2014 22:59     68K
A Short Course on Computer Viruses.pdf             18-Mar-2014 22:58    715K
A Short Visit to the Bot Zoo.pdf                   18-Mar-2014 22:59    742K
A Specter Is Haunting Networks - The Specter of..> 18-Mar-2014 22:52    226K
A Study of Detecting Computer Viruses in Real-I..> 18-Mar-2014 22:58    175K
A Study of Malcode-Bearing Documents.pdf           18-Mar-2014 22:59      1M
A Survey of Cryptologic Issues in Computer Viro..> 18-Mar-2014 22:57    271K
A Taxonomy of Computer Worms.pdf                   18-Mar-2014 22:57    100K
A Technique for Removing an Important Class of ..> 18-Mar-2014 22:56     84K
A Theoretical Superworm.pdf                        18-Mar-2014 22:58    310K
A Tour of the Worm.pdf                             18-Mar-2014 22:52     70K
A Trust System Based on Multi Level Virus Detec..> 18-Mar-2014 22:53    193K
A Virtual Honeypot Framework.pdf                   18-Mar-2014 22:59    451K
A Web-Based Network Worm Simulator.pdf             18-Mar-2014 22:57    145K
A Worst-Case Worm.pdf                              18-Mar-2014 22:51     66K
A bit of viral protection is worth a megabyte o..> 18-Mar-2014 22:55    417K
A fault tolerance approach to computer viruses.pdf 18-Mar-2014 22:57    680K
A framework for modelling trojans and computer ..> 18-Mar-2014 22:59    228K
A general definition of malware.pdf                18-Mar-2014 22:54    407K
A method to detect metamorphic computer viruses..> 18-Mar-2014 22:58      2M
A note on Cohen's formal model for computer vir..> 18-Mar-2014 22:58    182K
A parallel String Matching Engine for use in hi..> 18-Mar-2014 22:56    375K
A pilot study on college student's attitudes to..> 18-Mar-2014 22:53     76K
A software authentication system for the preven..> 18-Mar-2014 22:55    379K
A statistical model for undecidable viral detec..> 18-Mar-2014 22:58    276K
A study of anti-virus' response to unknown thre..> 18-Mar-2014 22:52    142K
A theoretical model of differential social attr..> 18-Mar-2014 22:57    425K
A unified prediction of computer virus spread i..> 18-Mar-2014 22:52    163K
A week is a long time in computer ethics.pdf       18-Mar-2014 22:51     66K
ACPI and SMI handlers some limits to trusted co..> 18-Mar-2014 22:55      1M
AGISA Towards Automatic Generation of Infection..> 18-Mar-2014 22:58    288K
API Win32 ancestrales pour Chevaux de Troie hyp..> 18-Mar-2014 22:56    408K
ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETE..> 18-Mar-2014 22:52     72K
ARTISTA A Network for ARTifical Immune SysTems.pdf 18-Mar-2014 22:55    391K
ASM-based Modelling of Self-Replicating Program..> 18-Mar-2014 22:57     93K
AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS D..> 18-Mar-2014 22:53     82K
Abstract Detection of Computer Viruses.pdf         18-Mar-2014 22:50    163K
Abstraction-Based Intrusion Detection In Distri..> 18-Mar-2014 22:57    577K
Abstracts of Recent Articles and Literature.pdf    18-Mar-2014 22:55     98K
Accurately Detecting Source Code of Attacks Tha..> 18-Mar-2014 22:55    139K
Acquisition of Malicious Code Using Active Lear..> 18-Mar-2014 22:51    155K
Adequacy of Checksum Algorithms for Computer Vi..> 18-Mar-2014 22:58    236K
Advanced Code Evolution Techniques and Computer..> 18-Mar-2014 22:55    581K
Advanced Metamorphic Techniques in Computer Vir..> 18-Mar-2014 22:56    311K
Advanced Polymorphic Techniques.pdf                18-Mar-2014 22:58    532K
Advanced Routing Worm and Its Security Challeng..> 18-Mar-2014 22:59    228K
Advanced fuzzing in the VoIP space.pdf             18-Mar-2014 22:58    504K
Algebraic Specification of Computer Viruses and..> 18-Mar-2014 22:58    162K
An Abstract Theory of Computer Viruses.pdf         18-Mar-2014 22:56    730K
An Analysis of How Antivirus Methodologies Are ..> 18-Mar-2014 22:53     67K
An Approach to Containing Computer Viruses.pdf     18-Mar-2014 22:59      1M
An Approach towards Disassembly of Malicious Bi..> 18-Mar-2014 22:57      1M
An Architecture for Generating Semantic-Aware S..> 18-Mar-2014 22:55    263K
An Effective Architecture and Algorithm for Det..> 18-Mar-2014 22:57    607K
An Efficient Control of Virus Propagation.pdf      18-Mar-2014 22:58    189K
An Email Worm Vaccine Architecture.pdf             18-Mar-2014 22:56    215K
An Epidemic Model of Mobile Phone Virus.pdf        18-Mar-2014 22:50     49K
An Epidemiological View of Worms and Viruses.pdf   18-Mar-2014 22:55    142K
An Evaluation of Two Host Based Intrusion Preve..> 18-Mar-2014 22:58    171K
An Internet-Worm Early Warning System.pdf          18-Mar-2014 22:52     81K
An Introduction to Computer Viruses.pdf            18-Mar-2014 22:54     38K
An Introduction to Intrusion-Detection Systems.pdf 18-Mar-2014 22:55    196K
An OS Independent Heuristics-based Worm-contain..> 18-Mar-2014 22:58    159K
An Overview of Computer Viruses in a Research E..> 18-Mar-2014 22:52     72K
An Overview of Unix Rootkits.pdf                   18-Mar-2014 22:59    403K
An Undetectable Computer Virus.pdf                 18-Mar-2014 22:54     33K
An epidemiological model of virus spread and cl..> 18-Mar-2014 22:56    150K
Analysis and Detection of Computer Viruses and ..> 18-Mar-2014 22:58    652K
Analysis and detection of metamorphic computer ..> 18-Mar-2014 22:59    932K
Analysis of Virus Algorithms.pdf                   18-Mar-2014 22:58     69K
Analysis of Web Application Worms and Viruses.pdf  18-Mar-2014 22:58    589K
Analysis of a scanning model of worm propagatio..> 18-Mar-2014 22:55    397K
Analysis of rxbot.pdf                              18-Mar-2014 22:55    816K
Analyzing Worms and Network Traffic using Compr..> 18-Mar-2014 22:53    196K
Anatomy of a Semantic Virus.pdf                    18-Mar-2014 22:59    306K
Ani-hilate this week.pdf                           19-Mar-2014 04:31     64K
Anomalous Payload-based Network Intrusion Detec..> 19-Mar-2014 04:36    285K
Anomalous Payload-based Worm Detection and Sign..> 19-Mar-2014 04:39    279K
Anonymous and Malicious.pdf                        19-Mar-2014 04:21    248K
Anti-Disassembly using Cryptographic Hash Funct..> 19-Mar-2014 04:29    162K
Anti-Forensics The Rootkit Connection.pdf          19-Mar-2014 04:23    596K
Anti-Malware Tools Intrusion Detection Systems.pdf 19-Mar-2014 04:13    893K
Anti-Spyware Coalition Definitions and Supporti..> 19-Mar-2014 04:13    274K
Anti-Virus Product Evaluation in the Real World..> 19-Mar-2014 04:33     57K
Anti-Virus in the Corporate Arena.pdf              19-Mar-2014 04:36     90K
Antivirus Software Testing for the New Milleniu..> 19-Mar-2014 04:22     53K
Antivirus update reaction times of major antivi..> 19-Mar-2014 04:34    232K
Application of Data Mining based Malicious Code..> 18-Mar-2014 22:59    111K
Application of Hardware Accelerated Extensible ..> 19-Mar-2014 04:27    377K
Applications of Genetic Algorithms to Malware D..> 19-Mar-2014 04:30    144K
Applications of Immune System Computing.pdf        19-Mar-2014 04:23    606K
Applied parallel coordinates for logs and netwo..> 19-Mar-2014 04:33      3M
Approaches to Integrated Malware Detection and ..> 19-Mar-2014 04:31     62K
Approaching Zero - The Extraordinary Underworld..> 19-Mar-2014 04:33      2M
Architecture of a Morphological Malware Detecto..> 19-Mar-2014 04:26    787K
Are Computer Hacker Break-ins Ethical.pdf          19-Mar-2014 04:22     44K
Are Evolutionary Rule Learning Algorithms Appro..> 19-Mar-2014 04:36     90K
Are Handheld Viruses a Significant Threat.pdf      18-Mar-2014 22:59    117K
Are Metamorphic Viruses Really Invincible.pdf      19-Mar-2014 04:34    343K
Are computer viruses spread by the media.pdf       19-Mar-2014 04:21    4025
Are current antivirus programs able to detect c..> 19-Mar-2014 04:31    941K
Are the Current Computer Crime Laws Sufficient ..> 19-Mar-2014 04:40    229K
Artificial Immune System against Viral Attack.pdf  19-Mar-2014 04:10    342K
Artificial Immune Systems and the Grand Challen..> 19-Mar-2014 04:25    213K
As Japanese Bring Work Home, Virus Hitches a Ri..> 19-Mar-2014 04:30    202K
Attack of the Clones.pdf                           19-Mar-2014 04:21     39K
Attack of the killer virus!.pdf                    19-Mar-2014 04:36     79K
Attack of the quantum worms.pdf                    19-Mar-2014 02:38    410K
Attacking Antivirus.pdf                            19-Mar-2014 02:49    260K
Attacking the DNS Protocol.pdf                     19-Mar-2014 03:22    322K
Attitude Adjustment Trojans and Malware on the ..> 19-Mar-2014 04:30    207K
Auerbach.Practical.Hacking.Techniques.and.Count..> 19-Mar-2014 03:31    144M
Auto-Sign an automatic signature generator for ..> 19-Mar-2014 04:37    586K
Autoimmune computer virus.pdf                      19-Mar-2014 04:38    187K
Autoimmune viruses.pdf                             19-Mar-2014 04:38    187K
Automated Classification and Analysis of Intern..> 18-Mar-2014 23:05    489K
Automated Defense from Rootkit Attacks.pdf         19-Mar-2014 04:19    193K
Automated Malware Invariant Generation.pdf         19-Mar-2014 04:26    176K
Automated Web Patrol with Strider HoneyMonkeys ..> 19-Mar-2014 04:18    618K
Automated Worm Fingerprinting.pdf                  19-Mar-2014 04:11    547K
Automatic Comparison of Malware.pdf                19-Mar-2014 04:22      1M
Automatic Extraction of Computer Virus Signatur..> 19-Mar-2014 04:10    622K
Automatic Reverse Engineering of Malware Emulat..> 19-Mar-2014 04:36      1M
Automatic Static Unpacking of Malware Binaries.pdf 19-Mar-2014 04:20    142K
Automatic binary deobfuscation.pdf                 19-Mar-2014 04:21      2M
Automatically Generating Signatures for Polymor..> 18-Mar-2014 22:58    171K
Avoiding Windows Rootkit Detection.pdf             19-Mar-2014 04:24    106K
BIRD Binary Interpretation using Runtime Disass..> 18-Mar-2014 22:59    109K
Backdoors et rootkits avanc%2b%aes %5bSLIDES%5d..> 19-Mar-2014 04:26    302K
Backdoors et rootkits avanc%2b%aes.pdf             19-Mar-2014 04:17    248K
Bad Transfer.pdf                                   19-Mar-2014 04:22     44K
Becoming Positive.pdf                              19-Mar-2014 04:31     74K
Benefits and Considerations for a Single-Vendor..> 18-Mar-2014 22:59    123K
Beyond Layers and Peripheral Antivirus Security..> 19-Mar-2014 04:25    213K
Binary Obfuscation Using Signals.pdf               18-Mar-2014 22:58    175K
Biological Aspects of Computer Virology.pdf        18-Mar-2014 23:06    135K
Biological Models of Security for Virus Propaga..> 19-Mar-2014 04:31     65K
Biological versus Computer Viruses.pdf             19-Mar-2014 04:25    912K
Biologically Inspired Defenses Against Computer..> 19-Mar-2014 04:16    234K
Blast off!.pdf                                     19-Mar-2014 04:21     30K
Blended Attacks Exploits, Vulnerabilities and B..> 19-Mar-2014 04:24      1M
Blueprint for a Computer Immune System.pdf         18-Mar-2014 23:06    133K
Bot Software Spreads, Causes New Worries.pdf       19-Mar-2014 04:26    178K
Botnetsand Applications.pdf                        19-Mar-2014 03:01    679K
Broadband Network Virus Detection System Based ..> 19-Mar-2014 04:26    183K
CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD..> 19-Mar-2014 04:20    251K
COMPUTE!'s computer viruses.pdf                    19-Mar-2014 04:39      5M
COMPUTER VIRUS FUTURE CYBER WEAPONS.pdf            19-Mar-2014 04:21     28K
COMPUTER VIRUS RESPONSE USING AUTONOMOUS AGENT ..> 19-Mar-2014 04:22     56K
COMPUTER VIRUSES AND CIVIL LIABILITY A CONCEPTU..> 19-Mar-2014 04:21    248K
COMPUTER VIRUSES PREVENTION, DETECTION, AND TRE..> 19-Mar-2014 04:22     50K
Cabirn fever.pdf                                   19-Mar-2014 04:21     37K
Cain and Abul.pdf                                  19-Mar-2014 04:22     41K
Callgraph properties of executables.pdf            19-Mar-2014 04:25      1M
Can cryptography prevent computer viruses.pdf      19-Mar-2014 04:39     77K
Can you be held civilly liable for spreading co..> 19-Mar-2014 04:31      1M
Can you spare a seg.pdf                            19-Mar-2014 04:22     44K
Catch Me If You Can.pdf                            19-Mar-2014 04:40    891K
Catch Me, If You Can Evading Network Signatures..> 18-Mar-2014 22:59    106K
Certified Ethical Hacker (CEH) v3.0 Official Co..> 19-Mar-2014 03:31     26M
Challenges Of Modeling BotNets For Military And..> 19-Mar-2014 04:39    354K
Challenges in getting 'formal' with viruses.pdf    19-Mar-2014 04:21     34K
Chamber of horrors.pdf                             19-Mar-2014 04:23     41K
Characterization of virus replication.pdf          19-Mar-2014 04:21    599K
Cheating the ELF Subversive Dynamic Linking to ..> 19-Mar-2014 04:21    240K
Chiba witty blues.pdf                              19-Mar-2014 04:21     27K
Classification and identification of malicious ..> 19-Mar-2014 04:35      2M
Classification of Computer Viruses Using the Th..> 19-Mar-2014 04:40    226K
Classification of Packed Executables for Accura..> 19-Mar-2014 04:32    195K
Cobra Fine-grained Malware Analysis using Steal..> 19-Mar-2014 04:27    649K
Code Red Worm Propagation Modeling and Analysis..> 18-Mar-2014 22:58    173K
Code mutation techniques by means of formal gra..> 19-Mar-2014 04:21    729K
Code obfuscation and virus detection.pdf           19-Mar-2014 04:24    930K
Code obfuscation techniques for metamorphic vir..> 19-Mar-2014 04:19    761K
Code-Red a case study on the spread and victims..> 18-Mar-2014 22:57    328K
Collaborative Defense Against Zero-Day and Poly..> 19-Mar-2014 04:24    769K
Combating computer viruses.pdf                     19-Mar-2014 04:21    246K
Combinatorial Optimisation of Worm Propagation ..> 19-Mar-2014 04:30    466K
Comment on 'A Framework for Modelling Trojans a..> 19-Mar-2014 04:31     57K
Comments on a paper by Voas%2c Payne %26 Cohen%..> 19-Mar-2014 04:27    218K
Comparative analysis of various ransomware viri..> 19-Mar-2014 04:26      2M
Comparing Passive and Active Worm Defenses.pdf     19-Mar-2014 04:20    252K
Computational Aspects of Computer Viruses.pdf      19-Mar-2014 03:03      1M
Computer - Hackers Secrets - e-book.pdf            19-Mar-2014 03:30    493K
Computer Immunology(Lau).pdf                       19-Mar-2014 04:05    327K
Computer Immunology.pdf                            19-Mar-2014 04:40    450K
Computer Insecurity and Viral AttacksLiability ..> 19-Mar-2014 04:27    224K
Computer Malware What You Don't Know Can Hurt Y..> 19-Mar-2014 04:29    157K
Computer Parasitology.pdf                          19-Mar-2014 04:24     97K
Computer Security Analysis through Decompilatio..> 19-Mar-2014 04:36     79K
Computer Virus Identification and Prevention.pdf   19-Mar-2014 04:22     44K
Computer Virus Myths.pdf                           19-Mar-2014 04:32    347K
Computer Virus Operation and New Directions-199..> 19-Mar-2014 04:40    820K
Computer Virus Operation and New Directions.pdf    19-Mar-2014 04:21    583K
Computer Virus Propagation Model Based on Varia..> 19-Mar-2014 04:22    727K
Computer Virus Propagation Models.pdf              19-Mar-2014 04:27    291K
Computer Virus Strategies and Detection Methods..> 19-Mar-2014 04:36     77K
Computer Virus Survival Guide.pdf                  19-Mar-2014 04:40     25M
Computer Virus-Antivirus Coevolution.pdf           19-Mar-2014 04:26    310K
Computer Virus__.pdf                               19-Mar-2014 04:21     16K
Computer Viruses - A Form of Artificial Life.pdf   19-Mar-2014 04:27    218K
Computer Viruses - Legal Options.pdf               19-Mar-2014 04:34    233K
Computer Viruses - Theory and Experiments.pdf      19-Mar-2014 04:24      1M
Computer Viruses A Global Perspective.pdf          19-Mar-2014 04:22    234K
Computer Viruses A Management Perspective.pdf      19-Mar-2014 04:21     24K
Computer Viruses A Very Real Threat.pdf            19-Mar-2014 04:29    152K
Computer Viruses Are Nothing New Don't be asham..> 19-Mar-2014 04:21     10K
Computer Viruses By Ingrid Richter.pdf             19-Mar-2014 04:18    399K
Computer Viruses Can It Happen At IU.pdf           19-Mar-2014 04:40    231K
Computer Viruses Episode.pdf                       19-Mar-2014 04:24    101K
Computer Viruses The Disease, the Detection, an..> 19-Mar-2014 04:38    191K
Computer Viruses The Technology and Evolution o..> 19-Mar-2014 04:19    630K
Computer Viruses The Threat Today and The Expec..> 19-Mar-2014 04:14    269K
Computer Viruses and Ethics.pdf                    19-Mar-2014 04:23    981K
Computer Viruses and Malware.pdf                   19-Mar-2014 04:39     11M
Computer Viruses and Other Malicious Software A..> 19-Mar-2014 04:40      4M
Computer Viruses and Related Threats.pdf           19-Mar-2014 04:21     31K
Computer Viruses and Their Control.pdf             19-Mar-2014 04:21     19K
Computer Viruses and What to Do About Them.pdf     19-Mar-2014 04:24     97K
Computer Viruses and the Simulation Environment..> 19-Mar-2014 04:36      4M
Computer Viruses as Artificial Life.pdf            18-Mar-2014 23:06    133K
Computer Viruses as a Threat to Home Users.pdf     19-Mar-2014 04:31     76K
Computer Viruses for Dummies.pdf                   19-Mar-2014 04:40      3M
Computer Viruses on the Loose.pdf                  19-Mar-2014 04:40    349K
Computer Viruses the Inevitability of Evolution..> 19-Mar-2014 04:31    451K
Computer Viruses, Artificial Life and Evolution..> 19-Mar-2014 04:40      4M
Computer Viruses, Epidemiology and Worms.pdf       19-Mar-2014 04:40    440K
Computer Viruses, Epidemiology, and Worms.pdf      19-Mar-2014 04:34    595K
Computer Worms Past, Present, and Future.pdf       19-Mar-2014 04:20    136K
Computer abuse vandalizing the information soci..> 19-Mar-2014 04:21     36K
Computer doctor busy fighting `viruses'.pdf        18-Mar-2014 23:06    126K
Computer intrusions and attacks.pdf                19-Mar-2014 04:22     57K
Computer virus cover withdrawn.pdf                 19-Mar-2014 04:36     90K
Computer virus identification by neural network..> 19-Mar-2014 04:15    716K
Computer virus immunization.pdf                    19-Mar-2014 04:40      5M
Computer virus prevention and containment on ma..> 19-Mar-2014 04:25    763K
Computer virus prevention primer.pdf               19-Mar-2014 04:24     93K
Computer viruses (BMJ 296-013).pdf                 19-Mar-2014 04:36      2M
Computer viruses (BMJ 299-66a).pdf                 19-Mar-2014 04:32    344K
Computer viruses (BMJ 302-66e).pdf                 19-Mar-2014 04:27    302K
Computer viruses (BMJ 307-59e).pdf                 19-Mar-2014 04:27    664K
Computer viruses - a high-tech disease.pdf         19-Mar-2014 04:40     85M
Computer viruses - the current state in Italy.pdf  18-Mar-2014 22:55    225K
Computer viruses a quantitative analysis.pdf       19-Mar-2014 04:39    372K
Computer viruses and anti-virus warfare.pdf        19-Mar-2014 04:40     91M
Computer viruses and electronic mail.pdf           19-Mar-2014 04:30    204K
Computer viruses demystified,2.pdf                 19-Mar-2014 04:20    144K
Computer viruses demystified.pdf                   19-Mar-2014 04:33    995K
Computer viruses from theory to applications.pdf   19-Mar-2014 04:38      2M
Computer-Generated Life.pdf                        19-Mar-2014 04:31     74K
Computers and epidemiology.pdf                     19-Mar-2014 02:50    142K
Computers under attacks!.pdf                       19-Mar-2014 02:49     85K
Concepts and Future Trends in Computer Virology..> 19-Mar-2014 02:51    841K
Concepts for the Stealth Windows Rootkit (The C..> 19-Mar-2014 02:46    225K
Concepts of cooperation in artificial life.pdf     19-Mar-2014 02:49    353K
Conceptual Frameworks for Artificial Immune Sys..> 19-Mar-2014 02:50    284K
Conflict and the Computer Information Warfare a..> 19-Mar-2014 02:47    248K
Consensual Realities in Cyberspace.pdf             19-Mar-2014 02:51    242K
Console viruses.pdf                                18-Mar-2014 23:03    119K
Constructing Computer Virus Phylogenies.pdf        19-Mar-2014 02:51    190K
Constructing Malware Normalizers using Term Rew..> 19-Mar-2014 02:51    219K
Contagion and Repetition On the Viral Logic of ..> 19-Mar-2014 02:49    174K
Contagion on the Internet.pdf                      19-Mar-2014 02:49    118K
Contournement dune passerelle antivirus.pdf        19-Mar-2014 02:51    124K
Control Flow Graphs as Malware Signatures.pdf      18-Mar-2014 23:02    158K
Control Flow to Detect Malware.pdf                 19-Mar-2014 02:47    345K
Controlling Super-Intelligent Machines.pdf         19-Mar-2014 02:49     18K
Convergence of Virus Writers and Hackers Fact o..> 19-Mar-2014 02:51    255K
Cooperative Automated worm Response and Detecti..> 19-Mar-2014 02:50    143K
Corporate Virus Protection.pdf                     18-Mar-2014 23:06     20K
Countering Kernel Rootkits with Lightweight Hoo..> 19-Mar-2014 02:49    188K
Countering Network Worms Through Automatic Patc..> 19-Mar-2014 02:51    281K
Countering NetworkWorms Through Automatic Patch..> 19-Mar-2014 02:46    150K
Covert Distributed Processing with Computer Vir..> 19-Mar-2014 02:47    179K
Cracking.Wifi.al.Completo.-.David.Puente.Castro..> 19-Mar-2014 03:24    907K
Crc Press - The Hacker'S Handbook.pdf              19-Mar-2014 03:31     18M
Creating a Secure Computer Virus Laboratory.pdf    19-Mar-2014 02:39     54K
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_ww..> 19-Mar-2014 03:25    223K
Crimea river.pdf                                   18-Mar-2014 23:06     44K
Crisis and Aftermath.pdf                           19-Mar-2014 02:51      1M
Criss-cross.pdf                                    18-Mar-2014 23:06     44K
Cryptographic Hashing for Virus Localization.pdf   18-Mar-2014 23:08    154K
Cryptography all-out attacks or how to attack c..> 19-Mar-2014 02:51      5M
Cryptography and Viruses.pdf                       19-Mar-2014 02:39     96K
Cryptovirology Extortion-Based Security Threats..> 19-Mar-2014 02:50      1M
DCA for Bot Detection.pdf                          19-Mar-2014 02:48    173K
Danger theory and collaborative filtering in MA..> 19-Mar-2014 02:50    372K
Danger! Deadly new computer viruses want to kil..> 19-Mar-2014 02:50    131K
DangerousGoogle-SearchingForSecrets.pdf            19-Mar-2014 03:31      2M
Darwin inside the machines Malware evolution an..> 19-Mar-2014 02:51      1M
Darwin, a Game of Survival of the Fittest among..> 18-Mar-2014 23:06     26K
Darwin.pdf                                         19-Mar-2014 02:36    216K
Data Mining Methods for Detection of New Malici..> 18-Mar-2014 23:08    158K
Data security from malicious attack Computer Vi..> 19-Mar-2014 02:49    106K
Database Rootkits.pdf                              19-Mar-2014 02:50    721K
Deelaed learning.pdf                               19-Mar-2014 02:40     47K
Defeating Kernel Native API Hookers by Direct S..> 19-Mar-2014 02:46    357K
Defeating Polymorphism Beyond Emulation.pdf        18-Mar-2014 23:05    459K
Defeating Polymorphism White Paper.pdf             19-Mar-2014 02:51    459K
Defending Against Internet Worms A Signature-Ba..> 18-Mar-2014 23:09    156K
Defending against Hitlist Worms using Network A..> 19-Mar-2014 02:49    163K
Defending against Viruses and Worms.pdf            19-Mar-2014 02:51      1M
Defense Against the Dark Arts.pdf                  19-Mar-2014 02:50    101K
Defense and Detection Strategies against Intern..> 19-Mar-2014 02:51      3M
Defense-In-Depth Against Computer Viruses.pdf      19-Mar-2014 02:51    141K
Des IDS et des vers... D%2b%aetection par l%27a..> 19-Mar-2014 02:39    295K
Design of a System for Real-Time Worm Detection..> 19-Mar-2014 02:49    243K
Design of a neural network for recognition and ..> 19-Mar-2014 02:51      1M
Design of an Artificial Immune System as a Nove..> 19-Mar-2014 02:50     69K
Detecting Early Worm Propagation through Packet..> 19-Mar-2014 02:45    164K
Detecting Internet Worms Using Data Mining Tech..> 19-Mar-2014 02:51    136K
Detecting Kernel-Level Rootkits Through Binary ..> 19-Mar-2014 02:50    788K
Detecting Malicious Code by Model Checking.pdf     19-Mar-2014 02:50    700K
Detecting Malicious Network Traffic Using Inver..> 19-Mar-2014 02:51    833K
Detecting Malicious Software by Monitoring Anom..> 19-Mar-2014 02:51    248K
Detecting Metamorphic Computer Viruses using Su..> 19-Mar-2014 02:47    211K
Detecting Metamorphic viruses by using Arbitrar..> 19-Mar-2014 02:50    574K
Detecting Network-based Obfuscated Code Injecti..> 19-Mar-2014 02:50    318K
Detecting Sources of Computer Viruses in Networ..> 19-Mar-2014 02:50      1M
Detecting Stealth Software with Strider GhostBu..> 19-Mar-2014 02:51    324K
Detecting Unknown Computer Viruses.pdf             19-Mar-2014 02:51      1M
Detecting Unknown Massive Mailing Viruses Using..> 19-Mar-2014 02:51    251K
Detecting Viral Propagations Using Email Behavi..> 19-Mar-2014 02:51      1M
Detecting Virus Mutations Via Dynamic Matching.pdf 19-Mar-2014 02:49    298K
Detecting Windows Server Compromises with Patch..> 19-Mar-2014 02:50    187K
Detecting Worms through Cryptographic Hashes.pdf   19-Mar-2014 02:49    308K
Detecting Worms via Mining Dynamic Program Exec..> 19-Mar-2014 02:49    231K
Detecting and Categorizing Kernel-Level Rootkit..> 19-Mar-2014 02:51      2M
Detecting metamorphic viruses using profile hid..> 19-Mar-2014 02:47    548K
Detecting self-mutating malware using control-f..> 19-Mar-2014 02:39     98K
Detecting worms through de-centralized monitori..> 19-Mar-2014 02:49    203K
Detection of Injected, Dynamically Generated, a..> 19-Mar-2014 02:34    230K
Detection of Intrusions and Malware & Vulnerabi..> 19-Mar-2014 02:51      3M
Detection of Intrusions and Malware, and Vulner..> 19-Mar-2014 02:50      4M
Detection of Intrusions and Malware, and Vulner..> 19-Mar-2014 02:51     14M
Detection of Intrusions and Malware, and Vulner..> 19-Mar-2014 02:51      4M
Detection of Intrusions and Malware, and Vulner..> 19-Mar-2014 02:51      2M
Detection of Metamorphic and Virtualization-bas..> 19-Mar-2014 02:47    222K
Detection of Metamorphic and Virtualization-bas..> 18-Mar-2014 23:06    147K
Detection of New Malicious Code Using N-grams S..> 19-Mar-2014 02:51    359K
Detection of Self-Mutating Computer Viruses.pdf    19-Mar-2014 02:50    114K
Detection of metamorphic computer viruses using..> 18-Mar-2014 23:04    211K
Developing a Trojan applets in a smart card.pdf    19-Mar-2014 02:51    640K
Development of Computer Vulnerability Scanning ..> 19-Mar-2014 02:51    270K
Development of inland lakes as hubs in an invas..> 19-Mar-2014 02:51    972K
Die Gefahr Von Debug Codes.pdf                     19-Mar-2014 02:43    169K
Digital Postmark Helps Fight Spam, Virus Attack..> 19-Mar-2014 02:48    151K
Directed-Graph Epidemiological Models of Comput..> 19-Mar-2014 02:50      2M
Disk-Level Behavioral Malware Detection.pdf        19-Mar-2014 02:51      1M
Disk-Level Behavioral Virus Detection.pdf          19-Mar-2014 02:51      5M
Distributed Computing with a Trojan Horse.pdf      19-Mar-2014 02:51    590K
Distributed Worm Simulation with a Realistic In..> 19-Mar-2014 02:51    593K
Distributive immunization of networks against v..> 19-Mar-2014 02:50    889K
Do The Media Spread Computer Viruses.pdf           18-Mar-2014 23:06     18K
Do the macarena.pdf                                19-Mar-2014 02:39     58K
Do-It-Yourself Guide to Cell Phone Malware.pdf     19-Mar-2014 02:51    188K
Doin' the eagle rock.pdf                           18-Mar-2014 22:55     45K
Dummies - Hack How To Create Keygens (1).pdf       19-Mar-2014 03:25    9832
Dynamic Binary Instrumentation-based Framework ..> 19-Mar-2014 02:50    343K
Dynamic analysis of malicious code.pdf             19-Mar-2014 02:50    212K
Dynamic detection and classi cation of computer..> 19-Mar-2014 02:50      4M
Dynamical Models for Computer Viruses Propagati..> 19-Mar-2014 02:51      4M
E-mail virus protection handbook.pdf               19-Mar-2014 02:51    492K
ELF et virologie informatique.pdf                  19-Mar-2014 02:51    257K
EPOCalypse NOW!.pdf                                19-Mar-2014 02:50    456K
Effective and Inexpensive Methods Exist for Con..> 18-Mar-2014 23:00    198K
Effectiveness of Quarantine in Worm Epidemics.pdf  19-Mar-2014 03:01    355K
Effectiveness of Rate Control in Slowing Down W..> 19-Mar-2014 02:57    262K
Efficiency of Trusted Platform Module Against C..> 19-Mar-2014 03:02    157K
Efficient Content-Based Detection of Zero-Day W..> 19-Mar-2014 02:45     98K
Efficient Static Analysis of Executables For De..> 19-Mar-2014 02:59    536K
Efficient Virus Detection Using Dynamic Instruc..> 19-Mar-2014 03:00    438K
Efficient quarantining of scanning worms optima..> 19-Mar-2014 02:57    173K
Email Virus Propagation Modeling and Analysis.pdf  19-Mar-2014 03:01    359K
Email networks and the spread of computer virus..> 19-Mar-2014 02:59    264K
End-to-end security implementation for mobile d..> 19-Mar-2014 02:51    568K
Epidemic Profiles and Defense of Scale-Free Net..> 19-Mar-2014 03:01    161K
Epidemic Spreading in Real Networks An Eigenval..> 19-Mar-2014 03:01    279K
Epidemic dynamics and endemic states in complex..> 19-Mar-2014 03:00    279K
Epidemics and immunization in scale-free networ..> 19-Mar-2014 02:41    221K
Epidemiological Modelling of Peer-to-Peer Virus..> 19-Mar-2014 02:56    828K
Epidemiological Models Applied to Viruses in Co..> 19-Mar-2014 03:01    106K
Equational reasoning obfuscated decipher routin..> 19-Mar-2014 02:43     99K
Ethereal analyseur multiples.pdf                   19-Mar-2014 03:02    499K
Ethical Issues in Computer Virus Distribution.pdf  19-Mar-2014 02:53    103K
Evaluation of Two Host-Based Intrusion Preventi..> 19-Mar-2014 02:59    171K
Evaluation of malware phylogeny modelling syste..> 19-Mar-2014 03:00    309K
Evolution, Ecology and Optimization of Digital ..> 19-Mar-2014 03:00    179K
Evolvable Malware.pdf                              19-Mar-2014 02:59    567K
Examining%e9%a0Viruses.pdf                         19-Mar-2014 02:56      1M
Execution Context in Anti-Malware Testing.pdf      19-Mar-2014 03:01    156K
Experience with Viruses on UNIX Systems.pdf        19-Mar-2014 02:58      1M
Exploiting an Antivirus Interface.pdf              19-Mar-2014 02:53    187K
Extended recursion-based formalization of virus..> 19-Mar-2014 02:51    259K
FPGA Viruses.pdf                                   18-Mar-2014 23:04    166K
Fast Detection of Scanning Worm Infections.pdf     19-Mar-2014 03:00    247K
Fast virus detection by using high speed time d..> 19-Mar-2014 02:45    579K
Faster parameter detection of polymorphic viral..> 19-Mar-2014 02:45     95K
Feedback Email Worm Defense System for Enterpri..> 19-Mar-2014 02:57    143K
Fighting Computer Viruses.pdf                      19-Mar-2014 03:00    129K
Fighting EPO Viruses.pdf                           19-Mar-2014 03:00    369K
File system driver filtering against metamorphi..> 19-Mar-2014 02:56     91K
Fileprint analysis for Malware Detection.pdf       19-Mar-2014 03:00    850K
Finding Malware on Compromised Windows Machines..> 18-Mar-2014 23:05    102K
First Virus.pdf                                    19-Mar-2014 03:01    436K
Flexible Infections Computer Viruses, Human Bod..> 19-Mar-2014 02:56     91K
Flibi Evolution.pdf                                19-Mar-2014 02:38     93K
Flibi night.pdf                                    19-Mar-2014 02:39     41K
Flying below the Radar What modern malware tell..> 19-Mar-2014 03:02      2M
Flying solo.pdf                                    18-Mar-2014 23:04     55K
Formal Affordance-based Models of Computer Viru..> 19-Mar-2014 02:58    322K
Formal Definition of Self-reproductive Systems.pdf 19-Mar-2014 02:57     74K
Formal Models of Reproduction from Computer Vir..> 19-Mar-2014 03:01      3M
Formalisation and implementation aspects of K -..> 19-Mar-2014 02:39    380K
Formalization of viruses and malware through pr..> 19-Mar-2014 02:58    220K
Fragmented malware through RFID and its defense..> 19-Mar-2014 02:51    816K
Frankie say relax.pdf                              19-Mar-2014 02:47     42K
Free Anti-Virus Tips and Techniques.pdf            19-Mar-2014 03:01    940K
From AntiVirus to AntiMalware Software and Beyo..> 19-Mar-2014 02:33     90K
From the design of a generic metamorphic engine..> 19-Mar-2014 03:02    570K
Functional polymorphic engines formalisation, i..> 19-Mar-2014 03:01      1M
Functional similarities between computer worms ..> 19-Mar-2014 02:53    215K
Future Trends in Malicious Code - 2006 Report.pdf  19-Mar-2014 02:59     87K
GETTING THE WORD OUT.pdf                           19-Mar-2014 02:56    5707
Gatt got your tongue.pdf                           18-Mar-2014 23:02     56K
Generalized Anomaly Detection Model for Windows..> 19-Mar-2014 02:33    257K
Generic Detection and Classification of Polymor..> 19-Mar-2014 02:59    318K
Generic Virus Scanner in C++.pdf                   19-Mar-2014 02:51     90K
Genetic algorithm based Internet worm propagati..> 19-Mar-2014 02:36    131K
Geometry-based flash worm detection.pdf            19-Mar-2014 02:58    567K
Good Worms and Human Rights.pdf                    19-Mar-2014 02:52     45K
Got [Mac]root.pdf                                  19-Mar-2014 02:48     41K
Guide-to-Hacking-with-sub7 (1).doc                 19-Mar-2014 03:25    106K
HIPAA and Information Security Policies.pdf        19-Mar-2014 02:39     38K
Hack IT Security Through Penetration Testing.pdf   19-Mar-2014 03:31     12M
Hack Proofing - Your Network - Internet Tradecr..> 19-Mar-2014 03:31      3M
Hack Proofing Linux A Guide to Open Source Secu..> 19-Mar-2014 03:31     12M
Hack Proofing Sun Solaris 8.pdf                    19-Mar-2014 03:30      7M
Hack Proofing Your E-Commerce Site.pdf             19-Mar-2014 03:31      7M
Hack Proofing Your Identity In The Information ..> 19-Mar-2014 03:31      9M
Hack Proofing Your Network Second Edition.pdf      19-Mar-2014 03:31      9M
Hack Proofing Your Network_First Edition.pdf       19-Mar-2014 03:31      3M
Hack Proofing Your Web Applications.pdf            19-Mar-2014 03:31      9M
Hack_Attacks_Revealed_A_Complete_Reference_With..> 19-Mar-2014 03:31      6M
Hack_IT_Security_Through_Penetration_Testing.chm   19-Mar-2014 03:29      5M
Hacker Disassembling Uncovered.chm                 19-Mar-2014 03:31      5M
Hacker Linux Uncovered.chm                         19-Mar-2014 03:26      4M
Hacker Web Exploitation Uncovered.chm              19-Mar-2014 03:00    555K
Hacker'S.Delight.chm                               19-Mar-2014 03:30      2M
Hacker_s_Guide.pdf                                 19-Mar-2014 03:31      4M
Hackers Beware.pdf                                 19-Mar-2014 03:31      5M
Hackers Secrets Revealed.pdf                       19-Mar-2014 03:02    493K
Hackers Secrets.pdf                                19-Mar-2014 03:25    493K
Hackers, Heroes Of The Computer Revolution.pdf     19-Mar-2014 03:25    105K
Hackers_Secrets.pdf                                19-Mar-2014 03:28    493K
Hacking - Firewalls And Networks How To Hack In..> 19-Mar-2014 03:28      3M
Hacking - The Art of Exploitation.chm              19-Mar-2014 03:24      1M
Hacking Cisco Routers.pdf                          19-Mar-2014 03:25     19K
Hacking Exposed - Network Security Secrets & So..> 19-Mar-2014 03:31     10M
Hacking Exposed Network Security Secrets & Solu..> 19-Mar-2014 03:25      2M
Hacking For Dummies 1.pdf                          19-Mar-2014 04:05    143K
Hacking For Dummies 2.pdf                          19-Mar-2014 03:48    177K
Hacking For Dummies.pdf                            19-Mar-2014 03:48    175K
Hacking GMail.pdf                                  19-Mar-2014 04:34      5M
Hacking IIS Servers.pdf                            19-Mar-2014 04:05     31K
Hacking Windows XP.pdf                             19-Mar-2014 04:42     10M
Hacking Wireless Networks For Dummies.pdf          18-Mar-2014 22:42     11M
Hacking into computer systems - a beginners gui..> 19-Mar-2014 04:38    615K
Hacking-Hacker's Guide.pdf                         19-Mar-2014 04:42      4M
Hacking-Hackers Secrets Revealed.pdf               19-Mar-2014 04:41    493K
Hacking-Hugo Cornwall-The Hacker's Handbook .pdf   19-Mar-2014 04:39    278K
Hacking-The Hacker Crackdown.pdf                   19-Mar-2014 04:33    633K
Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf      19-Mar-2014 04:41    355K
Hacking.For.Dummies.Access.To.Other.People's.Sy..> 19-Mar-2014 04:22      1M
Hacking.Guide.V3.1.pdf                             19-Mar-2014 04:22      1M
Hackproofing Oracle Application Server.pdf         19-Mar-2014 04:42    306K
Halting viruses in scale-free networks.pdf         19-Mar-2014 02:49     54K
Halting.The.Hacker.A.Practical.Guide.To.Compute..> 19-Mar-2014 04:20    639K
Hardware Hacking Have Fun While Voiding Your Wa..> 19-Mar-2014 02:39     15M
Harmless and Useful Viruses Can Hardly Exist.pdf   19-Mar-2014 02:56    150K
Hash-AV Fast Virus Signature Scanning by Cache-..> 19-Mar-2014 02:35    142K
Heads or tails.pdf                                 19-Mar-2014 02:58     36K
Hidan and dangerous.pdf                            19-Mar-2014 02:52     47K
Hidden Rootkits in Windows.pdf                     19-Mar-2014 02:56    397K
Hide'n'Seek Anatomy of Stealth Malware.pdf         19-Mar-2014 02:35    248K
High-Fidelity Modeling of Computer Network Worm..> 19-Mar-2014 03:00    401K
High-Performance Context-Free Parser for Polymo..> 19-Mar-2014 02:49    177K
History of Viruses & Worms.pdf                     19-Mar-2014 02:41    229K
HoneyStat Local Worm Detection Using Honeypots.pdf 19-Mar-2014 02:59    266K
Honeypots against Worms 101.pdf                    19-Mar-2014 02:59    811K
Host-Based Detection of Worms through Peer-to-P..> 19-Mar-2014 03:02    352K
How To Withstand Mobile Virus Attacks.pdf          18-Mar-2014 23:09    217K
How Viruses Spread among Computers and People.pdf  19-Mar-2014 02:33    452K
How dumaru.pdf                                     19-Mar-2014 02:51    449K
How the virus Remote Shell Trojan(RST) works.pdf   19-Mar-2014 02:58     21K
How to Crack CD Protections.pdf                    19-Mar-2014 04:05     30K
How to Kill Worms and Viruses with Policy Ponti..> 19-Mar-2014 03:01    253K
How to assess the effectiveness of your anti-vi..> 19-Mar-2014 02:54    175K
Hunting For Metamorphic.pdf                        19-Mar-2014 03:01    902K
Hunting Obfuscated Malwares by Abstract Interpr..> 18-Mar-2014 23:07     48K
Hunting for Metamorphic Engines.pdf                19-Mar-2014 02:58    989K
Hunting for undetectable metamorphic viruses.pdf   19-Mar-2014 03:01      1M
I love you.pdf                                     18-Mar-2014 23:04     56K
I've named my virus - now what do I win.pdf        19-Mar-2014 02:57     65K
I.T. IN PRACTICE Computer viruses.pdf              19-Mar-2014 03:02      4M
IDS alerts correlation using grammar-based appr..> 19-Mar-2014 02:56    640K
IMAD In-Execution Malware Analysis and Detectio..> 19-Mar-2014 03:01    751K
IPA Computer Virus Survey 2000.pdf                 19-Mar-2014 02:59      1M
Identification of file infecting viruses throug..> 19-Mar-2014 03:01      1M
Identifying Malicious Code Through Reverse Engi..> 19-Mar-2014 03:01      6M
Identifying Metamorphic Malware.pdf                19-Mar-2014 02:41    163K
Immune System for Virus Detection and Eliminati..> 19-Mar-2014 03:01    740K
Immunity-Based Intrusion Detection System A Gen..> 19-Mar-2014 02:41     83K
Immunization and epidemic dynamics in complex n..> 19-Mar-2014 03:00    253K
Impact of Computer Viruses on Society.pdf          19-Mar-2014 03:02    333K
Impeding Malware Analysis Using Conditional Cod..> 19-Mar-2014 03:02      2M
Impeding worm epidemics through destination add..> 19-Mar-2014 02:57     62K
Implementation of a Computer Immune System for ..> 19-Mar-2014 02:59      1M
Implementing Anti-Virus Controls in the Corpora..> 18-Mar-2014 23:07     49K
Implementing and Detecting an ACPI BIOS Rootkit..> 19-Mar-2014 02:58    373K
Implementing and testing a virus throttle.pdf      19-Mar-2014 03:00    138K
Implica%2b%baoes da ofusca%2b%baao de c%2b%a6di..> 19-Mar-2014 03:01    282K
Implications of Peer-to-Peer Networks on Worm A..> 19-Mar-2014 03:00    558K
Imposing Order on Program Statements to Assist ..> 19-Mar-2014 02:57    304K
Improving Malware Detection by Applying Multi-I..> 19-Mar-2014 02:56    442K
Improving virus protection with an efficient se..> 19-Mar-2014 02:38    293K
In-depth analysis of the viral threats with Ope..> 19-Mar-2014 03:02      3M
Incorporating E-Commerce, Internet and Telecomm..> 19-Mar-2014 02:49     51K
Infection dynamics on scale-free networks.pdf      19-Mar-2014 02:58     57K
Infection dynamics on the Internet.pdf             19-Mar-2014 02:34    154K
Infection, imitation and a hierarchy of compute..> 18-Mar-2014 23:03    162K
Information Assurance and the Information Socie..> 19-Mar-2014 02:35     69K
Information warfare and security.pdf               19-Mar-2014 02:57     77K
Inoculating SSH Against Address-Harvesting Worm..> 19-Mar-2014 02:54    380K
Inoculation strategies for victims of viruses a..> 18-Mar-2014 23:08    195K
Inside the Slammer Worm.pdf                        19-Mar-2014 03:00    415K
Internet - Virusnet.pdf                            19-Mar-2014 02:58    569K
Internet Instability and Disturbance Goal or Me..> 19-Mar-2014 03:00      2M
Internet Quarantine Requirements for Containing..> 19-Mar-2014 02:39    153K
Internet Worm and Virus Protection in Dynamical..> 19-Mar-2014 02:56    568K
Internet computer virus protection policy.pdf      19-Mar-2014 02:56    136K
Introducing Stealth Malware Taxonomy.pdf           19-Mar-2014 03:01    344K
Introduction to Network Self-defense technical ..> 19-Mar-2014 02:47    222K
Intrusion Detection for Viruses and Worms.pdf      19-Mar-2014 02:56     92K
IpMorph fingerprinting spoofing unification.pdf    19-Mar-2014 03:01      1M
Iranian Journal Examines Electronic Warfare.pdf    19-Mar-2014 02:58     12K
Is Your Cat Infected with a Computer Virus.pdf     19-Mar-2014 02:51    194K
Is creating virus software protected as a first..> 19-Mar-2014 02:58     12K
Is virus writing really that bad.pdf               19-Mar-2014 02:55    445K
It's a bird, it's a plane, it's Fooperman.pdf      19-Mar-2014 02:49     50K
It's zell(d)ome the one you expect.pdf             19-Mar-2014 02:58     30K
JAB, une backdoor pour reseau Win32 inconnu - P..> 19-Mar-2014 02:59    255K
JAB, une backdoor pour reseau Win32 inconnu.pdf    19-Mar-2014 02:57     75K
John Wiley & Sons - Hacking For Dummies.pdf        19-Mar-2014 04:42      9M
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004..> 19-Mar-2014 04:42     10M
Killer Apps.pdf                                    19-Mar-2014 02:59     10K
Know Your Enemy Containing Conficker.pdf           19-Mar-2014 02:55    700K
Kolmogorov Complexity Estimates For Detection O..> 19-Mar-2014 02:53    446K
La %2522mobilit%2b%ae%2522 du code malveillant.pdf 18-Mar-2014 23:08    233K
Language, a virus.pdf                              19-Mar-2014 02:54     44K
Le malware en 2005 Unix, Linux et autres plates..> 19-Mar-2014 03:00     86K
Leaps and Bounds.pdf                               19-Mar-2014 02:49     51K
Learning to Detect Malicious Executables in the..> 19-Mar-2014 02:54    211K
Learning to Detect and Classify Malicious Execu..> 19-Mar-2014 02:54    202K
Legal Options To Computer Viruses.pdf              19-Mar-2014 03:00    242K
Les virus informatiques%253A th%2b%aeorie%2c pr..> 19-Mar-2014 03:02     20M
Let free(dom) Ring!.pdf                            19-Mar-2014 02:58     76K
Let them eat brioche.pdf                           19-Mar-2014 02:58     23K
Limits of Static Analysis for Malware Detection..> 19-Mar-2014 02:59    185K
Linux Improvised Userland Scheduler Virus.pdf      19-Mar-2014 03:00    112K
Loathing Lupper in Linux.pdf                       19-Mar-2014 02:59    389K
Look at that escargot.pdf                          19-Mar-2014 02:39     38K
Looking a Bagift-Horse in the Mouth.pdf            19-Mar-2014 02:47     43K
MCF a malicious code filter.pdf                    19-Mar-2014 02:58      2M
MRSI A Fast Pattern Matching Algorithm for Anti..> 19-Mar-2014 02:57    293K
Macro virus identification problems.pdf            19-Mar-2014 03:02      2M
Magisterium Abraxas.pdf                            19-Mar-2014 02:50    152K
Making a hash of things.pdf                        19-Mar-2014 03:42     39K
Malicious Codes in Depth.pdf                       19-Mar-2014 03:36    298K
Malicious Cryptography - Exposing Cryptovirolog..> 19-Mar-2014 03:43     29M
Malicious Cryptography Cryptovirology and Klept..> 19-Mar-2014 03:42     42K
Malicious Cryptography Kleptographic Aspects.pdf   19-Mar-2014 02:53    168K
Malicious Data and Computer Security.pdf           19-Mar-2014 03:02     64K
Malicious Software in Mobile Devices.pdf           19-Mar-2014 03:39    395K
Malicious Software.pdf                             19-Mar-2014 03:24    360K
Malicious Threats to Personal Digital Assistant..> 19-Mar-2014 03:34     79K
Malicious crypto - (Ab)use cryptology.pdf          19-Mar-2014 03:40      4M
Malicious crypto.pdf                               19-Mar-2014 03:42      4M
Malicious origami in PDF.pdf                       19-Mar-2014 03:06      2M
Malware Analyst's Cookbook and DVD.pdf             19-Mar-2014 03:43      9M
Malware Detection Based on Suspicious Behavior ..> 19-Mar-2014 03:01    492K
Malware Detection Using Adaptive Data Compressi..> 19-Mar-2014 03:34    257K
Malware Detection using Attribute-Automata to p..> 19-Mar-2014 03:36    631K
Malware Detection using Statistical Analysis of..> 19-Mar-2014 03:42    304K
Malware Detection.pdf                              19-Mar-2014 03:43     18M
Malware Forensics Investigating and Analyzing M..> 19-Mar-2014 03:42     25M
Malware Normalization.pdf                          19-Mar-2014 03:43    312K
Malware Phylogeny Generation using Permutations..> 19-Mar-2014 03:36    217K
Malware Research at SMU.pdf                        19-Mar-2014 03:02    289K
Malware Von Viren, Wuermern, Hackern und Trojan..> 19-Mar-2014 03:43     22M
Malware analysis for windows administrators.pdf    19-Mar-2014 03:36     73K
Malware behaviour analysis.pdf                     19-Mar-2014 03:43    899K
Malware comes of age The arrival of the true co..> 19-Mar-2014 02:54    244K
Malware in Popular Networks.pdf                    19-Mar-2014 03:23    133K
Malware pattern scanning schemes secure against..> 19-Mar-2014 02:58    385K
Malware, Viruses and Log Visualisation.pdf         19-Mar-2014 03:42    476K
Malware.pdf                                        19-Mar-2014 03:14     47K
MalwareA Future Framework for Device, Network a..> 19-Mar-2014 03:15    275K
Managing Computer Viruses in a Groupware Enviro..> 19-Mar-2014 02:58    124K
Manual_vulnerabilidades.pdf                        19-Mar-2014 04:42      2M
Marginal Networks The Virus between Complexity ..> 19-Mar-2014 03:34    252K
Mathematical Model of Computer Viruses.pdf         19-Mar-2014 02:54     90K
Mathematical Viruses.pdf                           19-Mar-2014 02:55    111K
Mathematical models on computer viruses.pdf        19-Mar-2014 03:05    353K
McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking..> 19-Mar-2014 04:42      6M
McGraw.Hacking.Exposed.Cisco.Networks.chm          19-Mar-2014 04:42     10M
McGraw.Hill.HackNotes.Network.Security.Portable..> 19-Mar-2014 04:42      4M
McGraw.Hill.HackNotes.Web.Security.Portable.Ref..> 19-Mar-2014 04:42      3M
McGraw.Hill.HackNotes.Windows.Security.Portable..> 19-Mar-2014 04:42      5M
Measurement and Analysis of Worm Propagation on..> 19-Mar-2014 03:42      1M
Measuring and Modeling Computer Virus Prevalenc..> 19-Mar-2014 03:06      1M
Measuring virtual machine detection in malware ..> 19-Mar-2014 03:40    764K
Mechanics of Self-reproduction.pdf                 19-Mar-2014 03:36      2M
MetaAware Identifying Metamorphic Malware.pdf      19-Mar-2014 03:25    163K
Metamorphic Virus Analysis and Detection.pdf       19-Mar-2014 03:21      1M
Metamorphism, Formal Grammars and Undecidable C..> 19-Mar-2014 03:35    369K
Metaphors And Meta-Experiences In Technology Si..> 19-Mar-2014 03:40    380K
Metaphors and Modern Threats Biological, Comput..> 19-Mar-2014 03:27    962K
Mimimorphism A New Approach to Binary Code Obfu..> 19-Mar-2014 02:54    387K
Mind Hacks - Tips & Tricks for Using Your Brain..> 19-Mar-2014 04:42      3M
Mind Wars Attack of the Memes.pdf                  19-Mar-2014 03:24    120K
Misleading Modern Malware.pdf                      19-Mar-2014 03:42    370K
Mobile Code Threats, Fact or Fiction.pdf           19-Mar-2014 03:34     83K
Mobile Malware Attacks and Defense.pdf             19-Mar-2014 03:43      7M
Model for network behaviour under viral attack.pdf 19-Mar-2014 03:40      1M
Model-Based Analysis of Two Fighting Worms.pdf     19-Mar-2014 03:41    320K
Modeling Botnet Propagation Using Time Zones.pdf   19-Mar-2014 03:43    528K
Modeling Computer Viruses.pdf                      19-Mar-2014 03:38    595K
Modeling Epidemic Spreading in Mobile Environme..> 19-Mar-2014 03:23    573K
Modeling Malware Spreading Dynamics.pdf            19-Mar-2014 03:21    790K
Modeling Virus Propagation in Peer-to-Peer Netw..> 19-Mar-2014 03:23    129K
Modeling computer virus prevalence with a susce..> 19-Mar-2014 03:27    433K
Modeling the Effects of Timing Parameters on Vi..> 19-Mar-2014 03:26    678K
Modeling the Spread and Prevention of Malicious..> 19-Mar-2014 03:40      2M
Modeling the Spread of Active Worms.pdf            19-Mar-2014 03:43    632K
Modelling Development of Epidemics with Dynamic..> 19-Mar-2014 03:23    233K
Models of Active Worm Defenses.pdf                 19-Mar-2014 03:39    210K
Modern Methods of Detecting and Eradicating Kno..> 19-Mar-2014 03:23    130K
Modern operating systems.pdf                       19-Mar-2014 03:27    425K
Modular worms.pdf                                  19-Mar-2014 03:01    108K
Monitoring and Early Warning for Internet Worms..> 19-Mar-2014 03:40    195K
Morality and Technology, or Is it Wrong to Crea..> 19-Mar-2014 03:41      1M
Morphological Detection of Malware.pdf             19-Mar-2014 03:19    787K
Mostly harmless.pdf                                19-Mar-2014 03:42     46K
Multi-Stage Delivery of Malware.pdf                19-Mar-2014 03:42      2M
Multiscale Modeling and Simulation of Worm Effe..> 19-Mar-2014 03:24    115K
N-gram analysis for computer virus detection.pdf   19-Mar-2014 03:36    217K
N-gram-based Detection of New Malicious Code.pdf   19-Mar-2014 02:54     84K
Nematodes - Beneficial Worms.pdf                   19-Mar-2014 02:55    114K
Network Virus Propagation Model Based on Effect..> 19-Mar-2014 03:24    448K
Network Worms.pdf                                  19-Mar-2014 03:36    149K
Networks, Control, and Life-Forms.pdf              19-Mar-2014 02:57    174K
New data mining technique to enhance IDS alarms..> 19-Mar-2014 03:02    672K
New malware distribution methods threaten signa..> 19-Mar-2014 02:57    248K
New method of fighting computer viruses announc..> 19-Mar-2014 03:25    115K
New thoughts in ring3 NT rootkit.pdf               19-Mar-2014 03:42    260K
New threats of Java viruses.pdf                    19-Mar-2014 03:36    183K
Next-Generation Viruses Present New Challenges.pdf 19-Mar-2014 03:34     83K
Nimda Worm Shows You Can't Always Patch Fast En..> 19-Mar-2014 03:42     24K
No.Starch.Press.Hacking.The.Art.Of.Exploitation..> 19-Mar-2014 04:32      1M
Non-signature based virus detection.pdf            19-Mar-2014 03:42    992K
Normalizing Metamorphic Malware Using Term Rewr..> 19-Mar-2014 03:26    161K
Not Teaching Viruses and Worms Is Harmful.pdf      19-Mar-2014 03:42     40K
Not worthy.pdf                                     19-Mar-2014 03:42     38K
Notes on the Worms programs.pdf                    19-Mar-2014 03:30      1M
O'Reilly - Online Investing Hacks.chm              19-Mar-2014 04:42      5M
O'Reilly.-.Network.Security.Hacks.chm              19-Mar-2014 04:30      2M
O'Reilly.Windows.Server.Hack.chm                   19-Mar-2014 04:42      2M
OReilly  Google Hacks, 1st Edition2003.pdf         19-Mar-2014 04:42      3M
OReilly - Google Hacks.pdf                         19-Mar-2014 04:42      3M
OReilly,.IRC.Hacks.(2004).DDU.chm                  19-Mar-2014 04:42      3M
OReilly.SQL.Hacks.Nov.2006.chm                     19-Mar-2014 04:23      2M
OSB.Ethical.Hacking.and.Countermeasures.EC.Coun..> 19-Mar-2014 04:42     14M
O_Reilly_-_Windows_XP_Hacks.chm                    19-Mar-2014 04:42      5M
Obfuscated dechiper routine analysis using theo..> 19-Mar-2014 03:42     31K
Old Win32 Code for a Modern Super-stealth Troja..> 19-Mar-2014 03:39    352K
On Callgraphs and Generative Mechanisms.pdf        19-Mar-2014 03:42      2M
On Computer Viral Infection and the Effect of I..> 19-Mar-2014 03:39    180K
On Deriving Unknown Vulnerabilities from Zero-D..> 19-Mar-2014 03:17    191K
On Effectiveness of Defense Systems against Act..> 19-Mar-2014 03:42      1M
On Instant Messaging Worms, Analysis and Counte..> 19-Mar-2014 03:42    313K
On JavaScript Malware and related threats.pdf      19-Mar-2014 03:22    436K
On abstract computer virology from a recursion ..> 19-Mar-2014 02:57    178K
On abstract computer virology from a recursion-..> 19-Mar-2014 03:41    204K
On behavioral detection.pdf                        19-Mar-2014 03:24    119K
On self-reproducing computer programs.pdf          19-Mar-2014 03:42      6M
On the Effectiveness of Address-Space Randomiza..> 19-Mar-2014 03:37    147K
On the Infeasibility of Modeling Polymorphic Sh..> 19-Mar-2014 03:36    335K
On the Performance of Internet Worm Scanning St..> 19-Mar-2014 02:56    249K
On the Semantics of Self-Unpacking Malware Code..> 19-Mar-2014 03:24    164K
On the Spread of Viruses on the Internet.pdf       19-Mar-2014 03:40    218K
On the Time Complexity of Computer Viruses.pdf     19-Mar-2014 02:54    206K
On the definition and classification of cybercr..> 19-Mar-2014 03:24    117K
On the functional validity of the worm-killing ..> 19-Mar-2014 03:24    116K
On the possibility of practically obfuscating p..> 19-Mar-2014 03:40    373K
On the trade-off between speed and resiliency o..> 19-Mar-2014 03:03    487K
One-hit models for virus inactivation studies.pdf  19-Mar-2014 03:02     92K
Opcodes as Predictor for Malware.pdf               19-Mar-2014 03:03    660K
Open Problems in Computer Virus Research.pdf       19-Mar-2014 03:42     42K
Open problems in computer virology.pdf             19-Mar-2014 02:43    167K
Oreilly, Paypal Hacks (2004) Ddu.chm               19-Mar-2014 04:28      2M
Owning Antivirus.pdf                               19-Mar-2014 03:37    145K
PC Games - How to Crack CD Protection.pdf          19-Mar-2014 04:05     30K
PC Magazine Fighting Spyware Viruses and Malwar..> 19-Mar-2014 03:42     10M
PE-Miner Mining Structural Information to Detec..> 19-Mar-2014 03:38    464K
PROPAGATION MODELING AND ANALYSIS OF VIRUSES IN..> 19-Mar-2014 03:42    263K
Painting the Internet A Different Kind of Warho..> 19-Mar-2014 02:54     84K
Pairwise alignment of metamorphic computer viru..> 19-Mar-2014 03:00    294K
Panic computing The viral metaphor and computer..> 19-Mar-2014 03:37    876K
Paradise lost.pdf                                  19-Mar-2014 03:14     56K
Parallel analysis of polymorphic viral code usi..> 19-Mar-2014 02:55    113K
Parallels Between Biological and Computer Epide..> 19-Mar-2014 03:43    260K
Password Cracking A Game of Wits.pdf               19-Mar-2014 03:41    477K
Peer-to-Peer Botnets Analysis and Detection.pdf    19-Mar-2014 03:36      2M
Poison Ivy Farmers Virus Collections.pdf           19-Mar-2014 03:34     80K
Polygraph Automatically Generating Signatures f..> 19-Mar-2014 02:57    171K
Polymorphic Worm Detection Using Structural Inf..> 19-Mar-2014 03:36    250K
Polymorphic and Metamorphic Malware Detection.pdf  19-Mar-2014 03:42      1M
Polymorphic virus detection technology.pdf         19-Mar-2014 03:21    579K
Polymorphing Software by Randomizing Data Struc..> 19-Mar-2014 03:39    324K
Possible Vicarious Liability for Computer Users..> 19-Mar-2014 03:34     74K
Potential Threats to WAP Enabled Devices.pdf       19-Mar-2014 02:58    129K
Powerful virus hits computers.pdf                  19-Mar-2014 03:01    100K
Practical Detection of Metamorphic Computer Vir..> 19-Mar-2014 03:42      1M
Practical overview of a Xen covert channel.pdf     19-Mar-2014 03:43      1M
Predators Good Will Mobile Codes Combat against..> 19-Mar-2014 03:38    514K
Prepared testimony and statement for the record..> 19-Mar-2014 03:43      2M
Prescription Medicine.pdf                          19-Mar-2014 03:14     52K
Principles of a Computer Immune System.pdf         19-Mar-2014 03:14     58K
Procedures To Reduce The Computer Virus Threat.pdf 19-Mar-2014 03:22    976K
Profile hidden Markov models and metamorphic vi..> 19-Mar-2014 03:18    865K
Profiles in cyber courage.pdf                      19-Mar-2014 03:39    331K
Prophet and loss.pdf                               19-Mar-2014 03:02     72K
Prophylaxis for virus propagation and general c..> 19-Mar-2014 03:39    617K
Prosecuting Computer Virus Authors The Need for..> 19-Mar-2014 02:58    122K
Protection of computer systems from computer vi..> 19-Mar-2014 03:42     43K
Quantitative risk assessment of computer virus ..> 19-Mar-2014 03:30    961K
Quantum Malware.pdf                                19-Mar-2014 03:15    273K
Queuing theory based models for studying intrus..> 19-Mar-2014 03:36    277K
RFID Security Issues in Military Supply Chains.pdf 19-Mar-2014 03:34    250K
Raised hacklez.pdf                                 19-Mar-2014 03:14     50K
Real world anti-virus product reviews and evalu..> 19-Mar-2014 03:14     59K
Real-Time Virus Detection System Using iNetmon ..> 19-Mar-2014 03:42     21K
Rebels for the System Virus writers, general in..> 19-Mar-2014 02:41    202K
Recent Worms A Survey and Trends.pdf               19-Mar-2014 03:18    268K
Reductions of the general virus detection probl..> 19-Mar-2014 03:14     57K
Reflections on Trusting Trust.pdf                  19-Mar-2014 03:37    220K
Reliable Identification of Bounded-length Virus..> 19-Mar-2014 03:02     70K
Reply to Comment on  Framework for Modelling Tr..> 19-Mar-2014 03:42     39K
Reply to Comment on Framework for Modelling Tro..> 19-Mar-2014 03:14     59K
Reports of computer viruses on the increase.pdf    19-Mar-2014 02:54     88K
Research in Computer Viruses and Worms.pdf         19-Mar-2014 03:36    349K
Resolution based metamorphic computer virus det..> 19-Mar-2014 03:34     79K
Response to the Proposal for a Virus database.pdf  19-Mar-2014 03:00    296K
Revealing Packed Malware.pdf                       19-Mar-2014 03:04    153K
Reverse Code Engineering An In-Depth Analysis o..> 19-Mar-2014 03:43      1M
Reverse Engineering Malware.pdf                    19-Mar-2014 03:42    351K
Rogue Computer Programs.pdf                        19-Mar-2014 03:43      4M
Rootkit Hunting vs. Compromise Detection.pdf       19-Mar-2014 03:31    340K
Rootkits - Detection and prevention.pdf            19-Mar-2014 03:39    930K
Rootkits - The new wave of invisible malware is..> 19-Mar-2014 03:42     30K
Rootkits Analysis and Detection.pdf                19-Mar-2014 03:36    190K
Rotalum A Tool for Automatic Reverse Engineerin..> 19-Mar-2014 03:43      1M
Routing Worm A Fast, Selective Attack Worm base..> 19-Mar-2014 03:36    149K
Running head REVERSE ENGINEERING MALWARE.pdf       19-Mar-2014 03:34     81K
SBMDS an interpretable string based malware det..> 19-Mar-2014 03:43    533K
SPARSE A Hybrid System to Detect Malcode-Bearin..> 19-Mar-2014 03:42      1M
SQL Hacks.chm                                      19-Mar-2014 04:36      2M
SQLInjectionWhitePaper.pdf                         19-Mar-2014 04:19    797K
Sandbox Technology Inside AV Scanners.pdf          19-Mar-2014 03:23    241K
Scalable, Behavior-Based Malware Clustering.pdf    19-Mar-2014 03:16    462K
Scary Networks Viruses as Discursive Practice.pdf  19-Mar-2014 03:23    145K
Securing Instant Messaging.pdf                     19-Mar-2014 02:54    207K
Security and Hacking - Anti-Hacker Tool Kit Sec..> 19-Mar-2014 04:42     29M
Selbstreproduktion bei programmen.pdf              19-Mar-2014 03:43     38M
Self- information systems why not.pdf              19-Mar-2014 02:58    120K
Self-Nonself Discrimination in a Computer.pdf      19-Mar-2014 03:41    205K
Self-Replicating Turing Machines and Computer V..> 19-Mar-2014 03:14     48K
Self-reproducing machines.pdf                      19-Mar-2014 03:06    315K
Semantics-Aware Malware Detection.pdf              19-Mar-2014 03:37    231K
Seminar Report on Study of Viruses and Worms.pdf   19-Mar-2014 03:04    152K
Server-based Virus-protection On UnixLinux.pdf     19-Mar-2014 03:35    684K
Shadow Walker - Raising The Bar For Rootkit Det..> 19-Mar-2014 03:42    557K
Shield -- A First Line Worm Defense.pdf            19-Mar-2014 03:37    362K
Shield Vulnerability-Driven Network Filters for..> 19-Mar-2014 03:40    195K
Should We Teach Virus Writing.pdf                  19-Mar-2014 02:58      1M
Signature Generation and Detection of Malware F..> 19-Mar-2014 03:36    287K
Simulating Bandwidth-Limited Worms, One Graph t..> 19-Mar-2014 03:02     72K
Simulating and optimising worm propagation algo..> 19-Mar-2014 03:14    268K
Simulating malware with MAlSim.pdf                 19-Mar-2014 03:37      1M
SinFP, unification of active and passive operat..> 19-Mar-2014 03:35    364K
SirCamstantial Evidence.pdf                        19-Mar-2014 03:36    148K
Slack Space Sculpting the computer monsters -- ..> 19-Mar-2014 03:17    193K
Slackspace.pdf                                     19-Mar-2014 03:42     22K
Slamdunk.pdf                                       19-Mar-2014 03:42     43K
Sleep-Inducing.pdf                                 19-Mar-2014 03:43     21K
Small treatise about e-manipulation for honest ..> 19-Mar-2014 03:43    915K
SmartSiren Virus Detection and Alert for Smartp..> 19-Mar-2014 03:26    509K
Sobig, sobigger, sobiggest.pdf                     19-Mar-2014 03:25    447K
Software Diversity as a Defense Against Viral P..> 19-Mar-2014 03:17    190K
Software Transformations to Improve Malware Det..> 19-Mar-2014 03:39    307K
Software Vaccine Technique and Its Application ..> 19-Mar-2014 03:24    165K
Some Further Theoretical Results about Computer..> 19-Mar-2014 03:29      2M
Some human dimensions of computer virus creatio..> 19-Mar-2014 02:56    156K
Something smells fishy.pdf                         19-Mar-2014 03:42     39K
Source Code Analysis of Worms.pdf                  19-Mar-2014 03:02    290K
Specification and evaluation of polymorphic she..> 19-Mar-2014 03:01    786K
Spyware & Rootkits.pdf                             19-Mar-2014 03:02     71K
Spyware A Little Knowledge is a Wonderful Thing..> 19-Mar-2014 02:54     89K
Spyware and Rootkits - The Future Convergence.pdf  19-Mar-2014 03:01     94K
Stack Shape Analysis to Detect Obfuscated calls..> 19-Mar-2014 03:36    182K
Static Analysis of Binary Code to Isolate Malic..> 19-Mar-2014 03:02     68K
Static Analysis of Executables to Detect Malici..> 19-Mar-2014 03:32    303K
Static Detection of Malicious Code in Executabl..> 19-Mar-2014 03:19    792K
Static detection and identification of X86 mali..> 19-Mar-2014 03:42    688K
Statistical Signatures for Fast Filtering of In..> 19-Mar-2014 03:37    148K
Stay Safe Online Campaign's AntiVirus Presentat..> 19-Mar-2014 02:41    200K
Stochastic Features of Computer Viruses.pdf        19-Mar-2014 03:01     96K
Stoned Bootkit.pdf                                 19-Mar-2014 03:43      1M
Striking Similarities.pdf                          19-Mar-2014 03:14     47K
Strong Cryptography Armoured Computer Viruses F..> 19-Mar-2014 02:41    196K
Structuring ethical curricula in the informatio..> 19-Mar-2014 03:01    107K
SubVirt Implementing malware with virtual machi..> 19-Mar-2014 03:41    205K
Supercompilation for Equivalence Testing in Met..> 19-Mar-2014 03:03    209K
Supervisory control of malicious executables.pdf   19-Mar-2014 03:41    463K
Superworms and Cryptovirology a Deadly Combinat..> 19-Mar-2014 03:04    153K
Suppressing the spread of email malcode using s..> 19-Mar-2014 03:36    151K
Survey on Malware Detection Methods.pdf            19-Mar-2014 02:56    159K
SweetBait Zero-Hour Worm Detection and Containm..> 19-Mar-2014 04:26    210K
Syngress - Hacking a Terror Network. The Silent..> 19-Mar-2014 04:42      9M
Syngress -- Hack Proofing Your Wireless Network..> 19-Mar-2014 04:42      7M
Syngress Hack Proofing Your Identity in the Inf..> 19-Mar-2014 04:42      9M
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook..> 19-Mar-2014 04:42      5M
Syngress.Hack.the.Stack.Oct.2006.pdf               19-Mar-2014 04:42      7M
System Dynamic Model for Computer Virus Prevala..> 19-Mar-2014 04:23    570K
System and method for detecting malicious execu..> 19-Mar-2014 04:25    163K
TAU cure for computer viruses.pdf                  19-Mar-2014 04:08    119K
THE MALICIOUS LOGIC BATTLE UNDERSTANDING THE EN..> 19-Mar-2014 04:18     47K
TIBS.pdf                                           19-Mar-2014 04:30    516K
TTAnalyze A Tool for Analyzing Malware.pdf         19-Mar-2014 04:09    371K
Taiwan's first ever political computer virus.pdf   19-Mar-2014 04:28    281K
Taking a Lesson from Stealthy Rootkits.pdf         19-Mar-2014 04:27    217K
Taking the redpill Artificial Evolution in nati..> 19-Mar-2014 04:20    370K
Taming Lakatos' Monster - Computer Virus Epidem..> 19-Mar-2014 04:28     39K
Taxonomy and Effectiveness of Worm Defense Stra..> 19-Mar-2014 04:27    488K
Techniques virales avanc%2b%aees.pdf               19-Mar-2014 04:29     18M
Technological Turf Wars A Case Study of the Com..> 19-Mar-2014 04:24      2M
Technologically Enabled Crime Shifting Paradigm..> 19-Mar-2014 04:24      1M
Testing Malware Detectors.pdf                      19-Mar-2014 04:27    339K
Testing Time for Antivirus Software.pdf            19-Mar-2014 04:28      1M
Testing and evaluating virus detectors for hand..> 19-Mar-2014 04:25    227K
Testing the SETIHacker Hypothesis.pdf              19-Mar-2014 04:21    673K
The ABC of computer security.pdf                   19-Mar-2014 04:11    105K
The Application of Epidemiology to Computer Vir..> 19-Mar-2014 04:14    589K
The Art of Computer Virus Research and Defense.pdf 19-Mar-2014 04:28     10M
The Art of File Format Fuzzing.pdf                 19-Mar-2014 04:16      1M
The Asexual Virus Computer Viruses in Feminist ..> 19-Mar-2014 04:08    117K
The Basic Building Blocks of Malware.pdf           19-Mar-2014 04:10    267K
The Bite of the Computer Virus.pdf                 19-Mar-2014 04:27    3908
The Blaster Worm - The View from 10,000 feet.pdf   19-Mar-2014 04:24    830K
The Brains Behind the Operation.pdf                19-Mar-2014 04:27     21K
The Bulgarian Computer Virus Factory.pdf           19-Mar-2014 04:27    9778
The Bulgarian and Soviet Virus Factories.pdf       19-Mar-2014 04:17    213K
The Case for Beneficial Computer Viruses and Wo..> 19-Mar-2014 04:18     43K
The Case for Using Layered Defenses to Stop Wor..> 19-Mar-2014 04:23    174K
The Challenge of Being Prepared for Tomorrows M..> 19-Mar-2014 04:18     42K
The Code Red Worm.pdf                              19-Mar-2014 04:03    148K
The Code of Life A look at emerging Artificial ..> 19-Mar-2014 04:21    154K
The Computer Virus -- From There to Here.pdf       19-Mar-2014 04:22    211K
The Computer Virus Culture.pdf                     19-Mar-2014 04:28     77K
The Cornell Commission On Morris and the Worm.pdf  19-Mar-2014 04:13    404K
The Costly Implications of Consulting in a Viru..> 19-Mar-2014 04:23    458K
The Danger Theory and Its Application to Artifi..> 19-Mar-2014 04:26    210K
The Dangers of Computer Viruses Implications fo..> 19-Mar-2014 04:30      9M
The Design Space of Metamorphic Malware.pdf        19-Mar-2014 04:17    102K
The Ecology of Malware.pdf                         19-Mar-2014 04:14    150K
The Effect of DNS Delays on Worm Propagation in..> 19-Mar-2014 04:05    175K
The Emergence of the Posthuman Consumer and the..> 19-Mar-2014 04:30      1M
The Engine of the Underground The Elite-Kiddie ..> 19-Mar-2014 04:24    159K
The Evolution of Viruses and Worms.pdf             19-Mar-2014 04:22    133K
The Evolution of the Computer Virus.pdf            19-Mar-2014 04:02     62K
The Evolving Virus Threat.pdf                      19-Mar-2014 04:18     46K
The Father Christmas worm.pdf                      19-Mar-2014 04:26    570K
The Future of Bot Worms.pdf                        19-Mar-2014 04:29     61K
The Future of Internet Worms.pdf                   19-Mar-2014 04:19    190K
The Future of Malware.pdf                          19-Mar-2014 04:25     81K
The Giant Black Book of Computer Viruses (2nd e..> 19-Mar-2014 04:26      2M
The Giant Black Book of Computer Viruses.pdf       19-Mar-2014 04:30      6M
The Impact of Computer Viruses on Society.pdf      19-Mar-2014 04:24    333K
The Impact of Countermeasure Propagation on the..> 19-Mar-2014 04:21    581K
The Impact of Countermeasure Spreading on the P..> 19-Mar-2014 04:24    124K
The Internet Motion Sensor A Distributed Blackh..> 19-Mar-2014 04:27    646K
The Internet Worm Crisis and Aftermath.pdf         19-Mar-2014 04:27      1M
The Internet Worm Incident.pdf                     19-Mar-2014 04:17    100K
The Internet Worm Program An Analysis.pdf          19-Mar-2014 04:30      2M
The Java mobile risk.pdf                           19-Mar-2014 04:23    127K
The Latest Malware Threats Against Your PC.pdf     19-Mar-2014 04:30    511K
The Legislative Response to the Evolution of Co..> 19-Mar-2014 04:21    215K
The Little Black Book Of Computer Virus.pdf        19-Mar-2014 04:26      1M
The Little Black Book of Computer Viruses.pdf      19-Mar-2014 04:27      1M
The More Things Change....pdf                      19-Mar-2014 04:28     73K
The Norman Book on Computer Viruses.pdf            19-Mar-2014 04:29    388K
The Pathology of Computer Viruses.pdf              19-Mar-2014 04:25      1M
The Race Against Malicious Software.pdf            19-Mar-2014 04:16     50K
The Real Cost of a Virus Outbreak.pdf              19-Mar-2014 04:02     62K
The Rise of AutoRunBased Malware.pdf               19-Mar-2014 04:30      2M
The Risk of Debug Codes in Batch what are debug..> 19-Mar-2014 04:22    184K
The Role of Internet Service Providers in Botne..> 19-Mar-2014 04:26      1M
The SASSER Event History and Implications.pdf      19-Mar-2014 04:28    653K
The Shockwave Rider.pdf                            19-Mar-2014 04:28      1M
The Social Psychology of Computer Viruses and W..> 19-Mar-2014 04:03    148K
The Use of Heuristics in Identifying Self-Propa..> 19-Mar-2014 04:28      2M
The Virtual Artaud Computer Virus as Performanc..> 19-Mar-2014 04:18    321K
The Virus Hunter.pdf                               19-Mar-2014 04:12    111K
The Virus Underground.pdf                          19-Mar-2014 03:03     90K
The Virus is Worse than the Cure.pdf               19-Mar-2014 04:15    120K
The WiT virus A virus built on the ViT ELF viru..> 19-Mar-2014 04:07    419K
The Worm Programs - Early Experience with a Dis..> 19-Mar-2014 04:29    870K
The Worm Programs--Early Experience with a Dist..> 19-Mar-2014 04:27    925K
The Zombie Roundup Understanding, Detecting, an..> 19-Mar-2014 04:20    212K
The biology of digital organisms.pdf               19-Mar-2014 04:18     42K
The cause and effects of computer viruses.pdf      19-Mar-2014 04:27     31K
The dynamics of computer virus infection.pdf       19-Mar-2014 04:26    205K
The future of virus detection.pdf                  19-Mar-2014 04:26    113K
The geneology of malware.pdf                       19-Mar-2014 04:27    785K
The impact of Microsoft Windows infection vecto..> 19-Mar-2014 04:14    593K
The malware naming chaos.pdf                       19-Mar-2014 04:29     59K
The metamorphosis of malware writers.pdf           19-Mar-2014 04:02     83K
The missing LNK.pdf                                19-Mar-2014 04:16     47K
The motivation behind computer viruses.pdf         19-Mar-2014 04:26     97K
The road less truvelled.pdf                        19-Mar-2014 04:28     39K
The solution in the naming chaos.pdf               19-Mar-2014 04:27    135K
The worm that turned A social use of computer v..> 19-Mar-2014 04:24      3M
The wormpipe strikes back.pdf                      19-Mar-2014 04:26     64K
TheV-Files A dictionary of file threats.pdf        19-Mar-2014 04:27    135K
The_20Little_20Black_20Book_20of_20Computer_20V..> 19-Mar-2014 04:25      1M
There Are No Safe Virus Tests.pdf                  19-Mar-2014 04:26    209K
There Is No Ideal Virus Scanner.pdf                19-Mar-2014 04:23    183K
Those ubiquitous viruses.pdf                       19-Mar-2014 04:18     43K
Thoughts about Cross-View based Rootkit Detecti..> 19-Mar-2014 04:17     99K
Threat Intelligence Gathering, Malware Collecti..> 19-Mar-2014 04:27    810K
Threats to Digitization Computer Virus.pdf         19-Mar-2014 04:02     89K
Throttling Viruses Restricting propagation to d..> 19-Mar-2014 04:04    122K
Time machine.pdf                                   19-Mar-2014 04:27     32K
Timing Rootkits.pdf                                19-Mar-2014 04:29     60K
To catch Efish.pdf                                 19-Mar-2014 04:29     60K
Tools for Finding and Removing Rootkits.pdf        19-Mar-2014 04:25    418K
Toward an abstract computer virology.pdf           19-Mar-2014 04:12    189K
Towards Automated Defense from Rootkit Attacks.pdf 19-Mar-2014 04:15    164K
Towards Stealthy Malware Detection.pdf             19-Mar-2014 04:27    861K
Towards Systematic Evaluation of the Evadabilit..> 19-Mar-2014 04:24    314K
Towards an undetectable computer virus.pdf         19-Mar-2014 04:29      1M
Trap E-mail Address for Combating E-mail Viruse..> 19-Mar-2014 04:05     70K
Trapping Viruses.pdf                               19-Mar-2014 04:26     68K
Treating scalability and modelling human counte..> 19-Mar-2014 04:28    290K
Trends in Viruses and Worms.pdf                    19-Mar-2014 04:14    165K
Trends of Spyware, Viruses and Exploits.pdf        19-Mar-2014 04:28     78K
Trojan White Paper.pdf                             19-Mar-2014 04:24      2M
Trojans Worms and Spyware A Computer Security P..> 19-Mar-2014 04:29      1M
Tumours and polips.pdf                             19-Mar-2014 04:26     67K
Turing Machines and Undecidability with Special..> 19-Mar-2014 04:29    284K
Twinkle, twinkle little star.pdf                   19-Mar-2014 04:29     60K
Two Bills Equal Forewarning.pdf                    19-Mar-2014 04:24    323K
USC-OIA Special Virus Report.pdf                   19-Mar-2014 04:26    643K
Ukrainian-Russian Hackers the Stealth Group and..> 19-Mar-2014 04:16    256K
Un combate con el Kerado.pdf                       19-Mar-2014 04:28     41K
Understanding Computer Viruses.pdf                 19-Mar-2014 04:20    779K
Understanding Virus Behavior in 32-bit Operatin..> 19-Mar-2014 04:26     65K
Understanding and Managing Polymorphic Viruses.pdf 19-Mar-2014 04:12     94K
Unexpected Resutls [sic].pdf                       19-Mar-2014 04:28     39K
Universal Procedures to Protect Against Compute..> 19-Mar-2014 04:27    6318
Unknown Computer Virus Detection Inspired by Im..> 19-Mar-2014 04:19    430K
Unknown Malcode Detection and the Imbalance Pro..> 19-Mar-2014 04:30      1M
Unknown Malcode Detection via Text Categorizati..> 19-Mar-2014 04:23    171K
Unknown Malicious Code Detection # Practical Is..> 19-Mar-2014 04:25    162K
Unpredictable Legacies Viral Games in the Netwo..> 19-Mar-2014 04:30    200K
Use of an Attenuated Computer Virus as a Mechan..> 19-Mar-2014 04:14    320K
User-mode memory scanning on 32-bit & 64-bit wi..> 19-Mar-2014 04:21    262K
Using Code Normalization for Fighting Self-Muta..> 19-Mar-2014 04:06    121K
Using Engine Signature to Detect Metamorphic Ma..> 19-Mar-2014 04:07    266K
Using Entropy Analysis to Find Encrypted and Pa..> 19-Mar-2014 04:10    467K
Using Formal Grammar and Genetic Operators to E..> 19-Mar-2014 04:30    388K
Using Malware to Improve Software Quality and S..> 19-Mar-2014 04:07    160K
Using Markov Chains to Filter Machine-morphed V..> 19-Mar-2014 04:26     96K
Using Plant Epidemiological Methods To Track Co..> 19-Mar-2014 04:29      2M
Using Predators to Combat Worms and Viruses A S..> 19-Mar-2014 04:23    572K
Using Qualia and Hierarchical Models in Malware..> 19-Mar-2014 04:29    141K
Using Spatio-Temporal Information in API Calls ..> 19-Mar-2014 04:30    513K
Using Support Vector Machine to Detect Unknown ..> 19-Mar-2014 04:03    359K
Using Verification Technology to Specify and De..> 19-Mar-2014 04:25     81K
Using Virtualisation to Protect Against Zero-Da..> 19-Mar-2014 04:30      1M
Using biological models to improve innovation s..> 19-Mar-2014 04:30    201K
Using the KBTA method for inferring computer an..> 19-Mar-2014 04:27      2M
Utilizing Entropy to Identify Undetected Malwar..> 19-Mar-2014 04:14    491K
VIRUS, Very Important Resource Under Siege.pdf     19-Mar-2014 04:28     38K
VT Integrity Services for Networking.pdf           19-Mar-2014 04:13    608K
VX Reversing I, the basics.pdf                     19-Mar-2014 04:26    113K
VX Reversing II, Sasser.B.pdf                      19-Mar-2014 04:27     92K
Viral Attacks On UNIX System Security.pdf          19-Mar-2014 04:27    669K
Viral Bodies, Virtual Practices.pdf                19-Mar-2014 04:26    632K
Viral Evolution.pdf                                19-Mar-2014 04:23    128K
Viral Style Technology, Culture, and the Politi..> 19-Mar-2014 04:27     36K
Viral polymorphism.pdf                             19-Mar-2014 04:07    161K
Virentechniken Analyse und Metamorphismus.pdf      19-Mar-2014 04:02     64K
Virii Generators Understanding the Threat.pdf      19-Mar-2014 04:23    282K
Virology 101.pdf                                   19-Mar-2014 04:27     21K
Virology_101(Usenix).pdf                           19-Mar-2014 04:29    359K
Virus Detection System - VDS.pdf                   19-Mar-2014 04:06    575K
Virus Inoculation on Social Graphs The Friendsh..> 19-Mar-2014 04:26    217K
Virus Prevention Without Signatures.pdf            19-Mar-2014 04:25    531K
Virus Prevention, Cure and Hoaxes.pdf              19-Mar-2014 04:26    114K
Virus Protection.pdf                               19-Mar-2014 04:25     80K
Virus Scanners for Multiple OSes.pdf               19-Mar-2014 04:27    348K
Virus Spread in Networks.pdf                       19-Mar-2014 04:12    436K
Virus Techniques.pdf                               19-Mar-2014 04:29    402K
Virus Trends 2003-2004.pdf                         19-Mar-2014 04:27    9566
Virus Tutorial.pdf                                 19-Mar-2014 04:27      3M
Virus Verification and Removal Tools and Techni..> 19-Mar-2014 04:16    147K
Virus Writers 360.pdf                              19-Mar-2014 04:21    369K
Virus Writers The End of The Innocence.pdf         19-Mar-2014 04:13    109K
Virus als Metapher.pdf                             19-Mar-2014 04:30      2M
Virus attack - how computer networks could heal..> 19-Mar-2014 04:26     97K
Virus authors faster to the kill.pdf               19-Mar-2014 04:29    142K
Virus detection using datamining techniques.pdf    19-Mar-2014 04:29    297K
Virus ex machina res ipsa loquitur.pdf             19-Mar-2014 04:19    568K
VirusMeter  Preventing Your Cellphone from Spie..> 19-Mar-2014 04:23    463K
Viruses & spam fuel new laws.pdf                   19-Mar-2014 04:05    156K
Viruses 101.pdf                                    19-Mar-2014 04:27     92K
Viruses Are Beginning to Get to Me!.pdf            19-Mar-2014 04:26    116K
Viruses Are Not Speech.pdf                         19-Mar-2014 04:28     79K
Viruses Bottleneck Prosecution.pdf                 19-Mar-2014 04:12    349K
Viruses Revealed Understanding and Counter Mali..> 19-Mar-2014 04:30     50M
Viruses That Intricate Yarn.pdf                    19-Mar-2014 04:27     93K
Viruses a concern for all of us.pdf                19-Mar-2014 04:30     59K
Viruses and Computer Security.pdf                  19-Mar-2014 04:18    185K
Viruses and Criminal Law.pdf                       19-Mar-2014 04:21    729K
Viruses and Lotus Notes- Have the Virus Writers..> 19-Mar-2014 04:27    204K
Viruses and Worms The Best Defense is Awareness..> 19-Mar-2014 04:29    277K
Viruses and Worms The Inside Story.pdf             19-Mar-2014 04:20    414K
Viruses and Worms--What Can You Do.pdf             19-Mar-2014 04:24      1M
Viruses and Worms.pdf                              19-Mar-2014 04:25    311K
Viruses and the Law.pdf                            19-Mar-2014 04:21    155K
Viruses in France The French Connection - II.pdf   19-Mar-2014 04:06    121K
Viruses using .NET Framework.pdf                   19-Mar-2014 04:28     40K
Viruses, Worms, Zombies, and other Beasties.pdf    19-Mar-2014 04:30      1M
Viruses, Worms, and Trojan Horses Serious Crime..> 19-Mar-2014 04:14    142K
Visualizing Windows Executable Viruses Using Se..> 19-Mar-2014 04:26    531K
Vulnerabilities as monsters the cultural founda..> 19-Mar-2014 04:26     67K
Vx-trading.pdf                                     19-Mar-2014 04:29     71K
WORM AND VIRUS DEFENSE HOW CAN WE PROTECT THE N..> 19-Mar-2014 04:30      6M
Warnings of a Dark Future The Emergence of Mach..> 19-Mar-2014 04:27     93K
Web Sites Hawk Instructions On Making Computer ..> 19-Mar-2014 04:27    8691
What is Wild.pdf                                   19-Mar-2014 04:02     83K
What's in a Name.pdf                               19-Mar-2014 04:16     59K
What's the difference between a Virus, Worm, an..> 19-Mar-2014 04:27     22K
When Computer Viruses Strike.pdf                   19-Mar-2014 04:23    130K
When Java Was One Threats From Hostile Byte Cod..> 19-Mar-2014 04:29     38K
When Malware Meets Rootkits.pdf                    19-Mar-2014 04:30    493K
Where have the worms and viruses gone - new tre..> 19-Mar-2014 03:03     91K
White-box attack context cryptovirology.pdf        19-Mar-2014 04:12    301K
Why Anti-Virus Software Cannot Stop the Spread ..> 19-Mar-2014 03:48    129K
Wiley.The.Database.Hackers.Handbook.Defending.D..> 19-Mar-2014 04:36      1M
Win XP Hacks oreilly 2003.chm                      19-Mar-2014 04:30      5M
WinXP SP1 Hack.pdf                                 19-Mar-2014 04:05    8796
Windows Rootkit Overview.pdf                       19-Mar-2014 04:27     95K
Windows Rootkits.pdf                               19-Mar-2014 04:16    146K
Windows Server Hacks.chm                           19-Mar-2014 04:40      2M
Winning the battles, losing the war Rethinking ..> 19-Mar-2014 04:27    139K
With Microscope and Tweezers An Analysis of the..> 19-Mar-2014 04:23    193K
With Microscope and Tweezers The Worm from MITS..> 19-Mar-2014 04:27      1M
Worm Analysis through Computer Simulation.pdf      19-Mar-2014 04:15    318K
Worm Anatomy and Model.pdf                         19-Mar-2014 04:21    267K
Worm Defense System for Enterprise Networks.pdf    19-Mar-2014 04:30    143K
Worm Detection Using Local Networks.pdf            19-Mar-2014 04:20    372K
Worm Epidemics in High-Speed Networks.pdf          19-Mar-2014 04:29    145K
Worm Epidemiology.pdf                              19-Mar-2014 04:30    352K
Worm Hotspots Explaining Non-Uniformity in Worm..> 19-Mar-2014 04:20    383K
Worm Meets Beehive.pdf                             19-Mar-2014 04:17    298K
Worm Propagation Modeling and Analysis under Dy..> 19-Mar-2014 04:08    253K
Worm wars.pdf                                      19-Mar-2014 04:10    447K
Worms of the future.pdf                            19-Mar-2014 04:18    192K
Writing disassembler.pdf                           19-Mar-2014 04:27     27K
Xbox-hack - AIM-2002-008.pdf                       19-Mar-2014 04:32    515K
Yahoo.Hacks.Oct.2005.chm                           19-Mar-2014 04:41      7M
You've got M()a(D)i(L+K)l.pdf                      19-Mar-2014 04:28     41K
Young Nussbaum Monin PSPB 2007.pdf                 19-Mar-2014 04:23    194K
Zero-hour, Real-time Computer Virus Defense thr..> 19-Mar-2014 04:05     70K
Zeroing in on Metamorphic Computer Viruses.pdf     19-Mar-2014 04:30    402K
Zmist Opportunities.pdf                            19-Mar-2014 04:15    119K
amazon-hacks.chm                                   19-Mar-2014 03:26      3M
bsd-hacks.pdf                                      19-Mar-2014 03:31      2M
cracking-sql-passwords.pdf                         19-Mar-2014 03:27    160K
creation dun Web Worm.pdf                          19-Mar-2014 04:05    155K
database hacker handbook.chm                       19-Mar-2014 03:22      1M
eBooks.OReilly.-.Wireless.Hacks.100.Industrial...> 19-Mar-2014 03:30      4M
ebay-hacks-100-industrial-strength-tips-and-too..> 19-Mar-2014 03:31      4M
ethical hacking, student guide.pdf                 19-Mar-2014 03:31      7M
excel-hacks.chm                                    19-Mar-2014 03:31      3M
google-hacks.pdf                                   19-Mar-2014 03:31      3M
hacker ethic.pdf                                   19-Mar-2014 03:31     13M
hacking the windows registry .pdf                  19-Mar-2014 03:48    222K
linux-server-hacks.pdf                             19-Mar-2014 04:42     33M
little_black_book_oc_computer_viruses.pdf          19-Mar-2014 04:32      1M
mac-os-hacks.chm                                   19-Mar-2014 04:42      9M
network-security-hacks.chm                         19-Mar-2014 04:42      2M
online-investing-hacks.chm                         19-Mar-2014 04:40      5M
polyunpack.pdf                                     19-Mar-2014 04:18    372K
spidering-hacks.chm                                19-Mar-2014 04:27      1M
tivo-hacks.100-industrial-strength-tips-and-too..> 19-Mar-2014 04:42      9M
u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf  19-Mar-2014 04:42     10M