Index of /files/Technology/Bibliothek/Hacking/
../
(Ebook - Computer) Hacking The Windows Registry..> 19-Mar-2014 03:25 222K
(eBook - PDF) Hugo Cornwall - The Hacker's Hand..> 19-Mar-2014 03:22 278K
(eBook pdf) Hacking into computer systems - a b..> 19-Mar-2014 03:23 615K
(ebook_-_pdf)_Hacking_IIS_Servers.pdf 19-Mar-2014 03:25 31K
64-bit rugrats.pdf 18-Mar-2014 22:57 30K
A Beginners Guide To Hacking Computer Systems.pdf 19-Mar-2014 03:14 615K
A Bypass of Cohen's Impossibility Result.pdf 18-Mar-2014 22:52 107K
A Classification of Viruses through Recursion T..> 18-Mar-2014 22:55 157K
A Comprehensive Program for Preventing and Dete..> 18-Mar-2014 22:59 1M
A Computational Model of Computer Virus Propaga..> 18-Mar-2014 22:57 14K
A Computer Virus Is A Thought Manifested.pdf 18-Mar-2014 22:57 5774
A Cooperative Immunization System for an Untrus..> 18-Mar-2014 22:53 75K
A Cost Analysis of Typical Computer Viruses and..> 18-Mar-2014 22:57 91K
A Critical Look at the Regulation of Computer V..> 18-Mar-2014 22:52 96K
A Distributed Approach against Computer Viruses..> 18-Mar-2014 22:58 509K
A Dozen Dangerous Myths About Computer Viruses.pdf 18-Mar-2014 22:59 111K
A Failure to Learn from the Past.pdf 18-Mar-2014 22:58 95K
A Fast Static Analysis Approach To Detect Explo..> 18-Mar-2014 22:55 320K
A Feature Selection and Evaluation Scheme for C..> 18-Mar-2014 22:56 231K
A Filter That Prevents the Spread of Mail-Attac..> 18-Mar-2014 22:54 139K
A Formal Definition of Computer Worms and Some ..> 18-Mar-2014 22:55 1M
A Framework for Deception.pdf 18-Mar-2014 22:59 3M
A Framework to Detect Novel Computer Viruses vi..> 18-Mar-2014 22:55 311K
A Generic Virus Detection Agent on the Internet..> 18-Mar-2014 22:58 560K
A Generic Virus Scanner in C++.pdf 18-Mar-2014 22:58 96K
A History Of Computer Viruses - Introduction.pdf 18-Mar-2014 22:58 373K
A History Of Computer Viruses - The Famous `Tri..> 18-Mar-2014 22:58 1M
A History Of Computer Viruses - Three Special V..> 18-Mar-2014 22:58 790K
A Hybrid Model to Detect Malicious Executables.pdf 18-Mar-2014 22:57 246K
A Hygiene Lesson.pdf 18-Mar-2014 22:54 212K
A Mathematical Theory for the Spread of Compute..> 18-Mar-2014 22:59 400K
A Memory Symptom-based Virus Detection Approach..> 18-Mar-2014 22:54 167K
A Method for Detecting Obfuscated Calls in Mali..> 18-Mar-2014 22:57 1M
A Methodology to Detect and Characterize Kernel..> 18-Mar-2014 22:53 266K
A Mixed Abstraction Level Simulation Model of L..> 18-Mar-2014 22:59 338K
A Model for Detecting the Existence of Unknown ..> 18-Mar-2014 22:49 164K
A Network Worm Vaccine Architecture.pdf 18-Mar-2014 22:53 71K
A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM..> 18-Mar-2014 22:58 715K
A Pact with the Devil.pdf 18-Mar-2014 22:57 106K
A Plague of Viruses Biological, Computer and Ma..> 18-Mar-2014 22:53 133K
A Potency Relation for Worms and Next-Generatio..> 18-Mar-2014 22:58 282K
A Proposed Taxonomy of Software Weapons.pdf 18-Mar-2014 22:59 657K
A Public Health Approach to Preventing Malware ..> 18-Mar-2014 22:57 708K
A Response to the March 31, 2005 Wall Street Jo..> 18-Mar-2014 22:57 12K
A Retrovirus Inspired Algorithm for Virus Detec..> 18-Mar-2014 22:59 343K
A Self-reproducing Analogue.pdf 18-Mar-2014 22:59 304K
A Semantics-Based Approach to Malware Detection..> 18-Mar-2014 22:58 344K
A Sense of 'Danger' for Windows Processes.pdf 18-Mar-2014 22:57 274K
A Sense of Self for Unix Processes.pdf 18-Mar-2014 22:59 68K
A Short Course on Computer Viruses.pdf 18-Mar-2014 22:58 715K
A Short Visit to the Bot Zoo.pdf 18-Mar-2014 22:59 742K
A Specter Is Haunting Networks - The Specter of..> 18-Mar-2014 22:52 226K
A Study of Detecting Computer Viruses in Real-I..> 18-Mar-2014 22:58 175K
A Study of Malcode-Bearing Documents.pdf 18-Mar-2014 22:59 1M
A Survey of Cryptologic Issues in Computer Viro..> 18-Mar-2014 22:57 271K
A Taxonomy of Computer Worms.pdf 18-Mar-2014 22:57 100K
A Technique for Removing an Important Class of ..> 18-Mar-2014 22:56 84K
A Theoretical Superworm.pdf 18-Mar-2014 22:58 310K
A Tour of the Worm.pdf 18-Mar-2014 22:52 70K
A Trust System Based on Multi Level Virus Detec..> 18-Mar-2014 22:53 193K
A Virtual Honeypot Framework.pdf 18-Mar-2014 22:59 451K
A Web-Based Network Worm Simulator.pdf 18-Mar-2014 22:57 145K
A Worst-Case Worm.pdf 18-Mar-2014 22:51 66K
A bit of viral protection is worth a megabyte o..> 18-Mar-2014 22:55 417K
A fault tolerance approach to computer viruses.pdf 18-Mar-2014 22:57 680K
A framework for modelling trojans and computer ..> 18-Mar-2014 22:59 228K
A general definition of malware.pdf 18-Mar-2014 22:54 407K
A method to detect metamorphic computer viruses..> 18-Mar-2014 22:58 2M
A note on Cohen's formal model for computer vir..> 18-Mar-2014 22:58 182K
A parallel String Matching Engine for use in hi..> 18-Mar-2014 22:56 375K
A pilot study on college student's attitudes to..> 18-Mar-2014 22:53 76K
A software authentication system for the preven..> 18-Mar-2014 22:55 379K
A statistical model for undecidable viral detec..> 18-Mar-2014 22:58 276K
A study of anti-virus' response to unknown thre..> 18-Mar-2014 22:52 142K
A theoretical model of differential social attr..> 18-Mar-2014 22:57 425K
A unified prediction of computer virus spread i..> 18-Mar-2014 22:52 163K
A week is a long time in computer ethics.pdf 18-Mar-2014 22:51 66K
ACPI and SMI handlers some limits to trusted co..> 18-Mar-2014 22:55 1M
AGISA Towards Automatic Generation of Infection..> 18-Mar-2014 22:58 288K
API Win32 ancestrales pour Chevaux de Troie hyp..> 18-Mar-2014 22:56 408K
ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETE..> 18-Mar-2014 22:52 72K
ARTISTA A Network for ARTifical Immune SysTems.pdf 18-Mar-2014 22:55 391K
ASM-based Modelling of Self-Replicating Program..> 18-Mar-2014 22:57 93K
AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS D..> 18-Mar-2014 22:53 82K
Abstract Detection of Computer Viruses.pdf 18-Mar-2014 22:50 163K
Abstraction-Based Intrusion Detection In Distri..> 18-Mar-2014 22:57 577K
Abstracts of Recent Articles and Literature.pdf 18-Mar-2014 22:55 98K
Accurately Detecting Source Code of Attacks Tha..> 18-Mar-2014 22:55 139K
Acquisition of Malicious Code Using Active Lear..> 18-Mar-2014 22:51 155K
Adequacy of Checksum Algorithms for Computer Vi..> 18-Mar-2014 22:58 236K
Advanced Code Evolution Techniques and Computer..> 18-Mar-2014 22:55 581K
Advanced Metamorphic Techniques in Computer Vir..> 18-Mar-2014 22:56 311K
Advanced Polymorphic Techniques.pdf 18-Mar-2014 22:58 532K
Advanced Routing Worm and Its Security Challeng..> 18-Mar-2014 22:59 228K
Advanced fuzzing in the VoIP space.pdf 18-Mar-2014 22:58 504K
Algebraic Specification of Computer Viruses and..> 18-Mar-2014 22:58 162K
An Abstract Theory of Computer Viruses.pdf 18-Mar-2014 22:56 730K
An Analysis of How Antivirus Methodologies Are ..> 18-Mar-2014 22:53 67K
An Approach to Containing Computer Viruses.pdf 18-Mar-2014 22:59 1M
An Approach towards Disassembly of Malicious Bi..> 18-Mar-2014 22:57 1M
An Architecture for Generating Semantic-Aware S..> 18-Mar-2014 22:55 263K
An Effective Architecture and Algorithm for Det..> 18-Mar-2014 22:57 607K
An Efficient Control of Virus Propagation.pdf 18-Mar-2014 22:58 189K
An Email Worm Vaccine Architecture.pdf 18-Mar-2014 22:56 215K
An Epidemic Model of Mobile Phone Virus.pdf 18-Mar-2014 22:50 49K
An Epidemiological View of Worms and Viruses.pdf 18-Mar-2014 22:55 142K
An Evaluation of Two Host Based Intrusion Preve..> 18-Mar-2014 22:58 171K
An Internet-Worm Early Warning System.pdf 18-Mar-2014 22:52 81K
An Introduction to Computer Viruses.pdf 18-Mar-2014 22:54 38K
An Introduction to Intrusion-Detection Systems.pdf 18-Mar-2014 22:55 196K
An OS Independent Heuristics-based Worm-contain..> 18-Mar-2014 22:58 159K
An Overview of Computer Viruses in a Research E..> 18-Mar-2014 22:52 72K
An Overview of Unix Rootkits.pdf 18-Mar-2014 22:59 403K
An Undetectable Computer Virus.pdf 18-Mar-2014 22:54 33K
An epidemiological model of virus spread and cl..> 18-Mar-2014 22:56 150K
Analysis and Detection of Computer Viruses and ..> 18-Mar-2014 22:58 652K
Analysis and detection of metamorphic computer ..> 18-Mar-2014 22:59 932K
Analysis of Virus Algorithms.pdf 18-Mar-2014 22:58 69K
Analysis of Web Application Worms and Viruses.pdf 18-Mar-2014 22:58 589K
Analysis of a scanning model of worm propagatio..> 18-Mar-2014 22:55 397K
Analysis of rxbot.pdf 18-Mar-2014 22:55 816K
Analyzing Worms and Network Traffic using Compr..> 18-Mar-2014 22:53 196K
Anatomy of a Semantic Virus.pdf 18-Mar-2014 22:59 306K
Ani-hilate this week.pdf 19-Mar-2014 04:31 64K
Anomalous Payload-based Network Intrusion Detec..> 19-Mar-2014 04:36 285K
Anomalous Payload-based Worm Detection and Sign..> 19-Mar-2014 04:39 279K
Anonymous and Malicious.pdf 19-Mar-2014 04:21 248K
Anti-Disassembly using Cryptographic Hash Funct..> 19-Mar-2014 04:29 162K
Anti-Forensics The Rootkit Connection.pdf 19-Mar-2014 04:23 596K
Anti-Malware Tools Intrusion Detection Systems.pdf 19-Mar-2014 04:13 893K
Anti-Spyware Coalition Definitions and Supporti..> 19-Mar-2014 04:13 274K
Anti-Virus Product Evaluation in the Real World..> 19-Mar-2014 04:33 57K
Anti-Virus in the Corporate Arena.pdf 19-Mar-2014 04:36 90K
Antivirus Software Testing for the New Milleniu..> 19-Mar-2014 04:22 53K
Antivirus update reaction times of major antivi..> 19-Mar-2014 04:34 232K
Application of Data Mining based Malicious Code..> 18-Mar-2014 22:59 111K
Application of Hardware Accelerated Extensible ..> 19-Mar-2014 04:27 377K
Applications of Genetic Algorithms to Malware D..> 19-Mar-2014 04:30 144K
Applications of Immune System Computing.pdf 19-Mar-2014 04:23 606K
Applied parallel coordinates for logs and netwo..> 19-Mar-2014 04:33 3M
Approaches to Integrated Malware Detection and ..> 19-Mar-2014 04:31 62K
Approaching Zero - The Extraordinary Underworld..> 19-Mar-2014 04:33 2M
Architecture of a Morphological Malware Detecto..> 19-Mar-2014 04:26 787K
Are Computer Hacker Break-ins Ethical.pdf 19-Mar-2014 04:22 44K
Are Evolutionary Rule Learning Algorithms Appro..> 19-Mar-2014 04:36 90K
Are Handheld Viruses a Significant Threat.pdf 18-Mar-2014 22:59 117K
Are Metamorphic Viruses Really Invincible.pdf 19-Mar-2014 04:34 343K
Are computer viruses spread by the media.pdf 19-Mar-2014 04:21 4025
Are current antivirus programs able to detect c..> 19-Mar-2014 04:31 941K
Are the Current Computer Crime Laws Sufficient ..> 19-Mar-2014 04:40 229K
Artificial Immune System against Viral Attack.pdf 19-Mar-2014 04:10 342K
Artificial Immune Systems and the Grand Challen..> 19-Mar-2014 04:25 213K
As Japanese Bring Work Home, Virus Hitches a Ri..> 19-Mar-2014 04:30 202K
Attack of the Clones.pdf 19-Mar-2014 04:21 39K
Attack of the killer virus!.pdf 19-Mar-2014 04:36 79K
Attack of the quantum worms.pdf 19-Mar-2014 02:38 410K
Attacking Antivirus.pdf 19-Mar-2014 02:49 260K
Attacking the DNS Protocol.pdf 19-Mar-2014 03:22 322K
Attitude Adjustment Trojans and Malware on the ..> 19-Mar-2014 04:30 207K
Auerbach.Practical.Hacking.Techniques.and.Count..> 19-Mar-2014 03:31 144M
Auto-Sign an automatic signature generator for ..> 19-Mar-2014 04:37 586K
Autoimmune computer virus.pdf 19-Mar-2014 04:38 187K
Autoimmune viruses.pdf 19-Mar-2014 04:38 187K
Automated Classification and Analysis of Intern..> 18-Mar-2014 23:05 489K
Automated Defense from Rootkit Attacks.pdf 19-Mar-2014 04:19 193K
Automated Malware Invariant Generation.pdf 19-Mar-2014 04:26 176K
Automated Web Patrol with Strider HoneyMonkeys ..> 19-Mar-2014 04:18 618K
Automated Worm Fingerprinting.pdf 19-Mar-2014 04:11 547K
Automatic Comparison of Malware.pdf 19-Mar-2014 04:22 1M
Automatic Extraction of Computer Virus Signatur..> 19-Mar-2014 04:10 622K
Automatic Reverse Engineering of Malware Emulat..> 19-Mar-2014 04:36 1M
Automatic Static Unpacking of Malware Binaries.pdf 19-Mar-2014 04:20 142K
Automatic binary deobfuscation.pdf 19-Mar-2014 04:21 2M
Automatically Generating Signatures for Polymor..> 18-Mar-2014 22:58 171K
Avoiding Windows Rootkit Detection.pdf 19-Mar-2014 04:24 106K
BIRD Binary Interpretation using Runtime Disass..> 18-Mar-2014 22:59 109K
Backdoors et rootkits avanc%2b%aes %5bSLIDES%5d..> 19-Mar-2014 04:26 302K
Backdoors et rootkits avanc%2b%aes.pdf 19-Mar-2014 04:17 248K
Bad Transfer.pdf 19-Mar-2014 04:22 44K
Becoming Positive.pdf 19-Mar-2014 04:31 74K
Benefits and Considerations for a Single-Vendor..> 18-Mar-2014 22:59 123K
Beyond Layers and Peripheral Antivirus Security..> 19-Mar-2014 04:25 213K
Binary Obfuscation Using Signals.pdf 18-Mar-2014 22:58 175K
Biological Aspects of Computer Virology.pdf 18-Mar-2014 23:06 135K
Biological Models of Security for Virus Propaga..> 19-Mar-2014 04:31 65K
Biological versus Computer Viruses.pdf 19-Mar-2014 04:25 912K
Biologically Inspired Defenses Against Computer..> 19-Mar-2014 04:16 234K
Blast off!.pdf 19-Mar-2014 04:21 30K
Blended Attacks Exploits, Vulnerabilities and B..> 19-Mar-2014 04:24 1M
Blueprint for a Computer Immune System.pdf 18-Mar-2014 23:06 133K
Bot Software Spreads, Causes New Worries.pdf 19-Mar-2014 04:26 178K
Botnetsand Applications.pdf 19-Mar-2014 03:01 679K
Broadband Network Virus Detection System Based ..> 19-Mar-2014 04:26 183K
CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD..> 19-Mar-2014 04:20 251K
COMPUTE!'s computer viruses.pdf 19-Mar-2014 04:39 5M
COMPUTER VIRUS FUTURE CYBER WEAPONS.pdf 19-Mar-2014 04:21 28K
COMPUTER VIRUS RESPONSE USING AUTONOMOUS AGENT ..> 19-Mar-2014 04:22 56K
COMPUTER VIRUSES AND CIVIL LIABILITY A CONCEPTU..> 19-Mar-2014 04:21 248K
COMPUTER VIRUSES PREVENTION, DETECTION, AND TRE..> 19-Mar-2014 04:22 50K
Cabirn fever.pdf 19-Mar-2014 04:21 37K
Cain and Abul.pdf 19-Mar-2014 04:22 41K
Callgraph properties of executables.pdf 19-Mar-2014 04:25 1M
Can cryptography prevent computer viruses.pdf 19-Mar-2014 04:39 77K
Can you be held civilly liable for spreading co..> 19-Mar-2014 04:31 1M
Can you spare a seg.pdf 19-Mar-2014 04:22 44K
Catch Me If You Can.pdf 19-Mar-2014 04:40 891K
Catch Me, If You Can Evading Network Signatures..> 18-Mar-2014 22:59 106K
Certified Ethical Hacker (CEH) v3.0 Official Co..> 19-Mar-2014 03:31 26M
Challenges Of Modeling BotNets For Military And..> 19-Mar-2014 04:39 354K
Challenges in getting 'formal' with viruses.pdf 19-Mar-2014 04:21 34K
Chamber of horrors.pdf 19-Mar-2014 04:23 41K
Characterization of virus replication.pdf 19-Mar-2014 04:21 599K
Cheating the ELF Subversive Dynamic Linking to ..> 19-Mar-2014 04:21 240K
Chiba witty blues.pdf 19-Mar-2014 04:21 27K
Classification and identification of malicious ..> 19-Mar-2014 04:35 2M
Classification of Computer Viruses Using the Th..> 19-Mar-2014 04:40 226K
Classification of Packed Executables for Accura..> 19-Mar-2014 04:32 195K
Cobra Fine-grained Malware Analysis using Steal..> 19-Mar-2014 04:27 649K
Code Red Worm Propagation Modeling and Analysis..> 18-Mar-2014 22:58 173K
Code mutation techniques by means of formal gra..> 19-Mar-2014 04:21 729K
Code obfuscation and virus detection.pdf 19-Mar-2014 04:24 930K
Code obfuscation techniques for metamorphic vir..> 19-Mar-2014 04:19 761K
Code-Red a case study on the spread and victims..> 18-Mar-2014 22:57 328K
Collaborative Defense Against Zero-Day and Poly..> 19-Mar-2014 04:24 769K
Combating computer viruses.pdf 19-Mar-2014 04:21 246K
Combinatorial Optimisation of Worm Propagation ..> 19-Mar-2014 04:30 466K
Comment on 'A Framework for Modelling Trojans a..> 19-Mar-2014 04:31 57K
Comments on a paper by Voas%2c Payne %26 Cohen%..> 19-Mar-2014 04:27 218K
Comparative analysis of various ransomware viri..> 19-Mar-2014 04:26 2M
Comparing Passive and Active Worm Defenses.pdf 19-Mar-2014 04:20 252K
Computational Aspects of Computer Viruses.pdf 19-Mar-2014 03:03 1M
Computer - Hackers Secrets - e-book.pdf 19-Mar-2014 03:30 493K
Computer Immunology(Lau).pdf 19-Mar-2014 04:05 327K
Computer Immunology.pdf 19-Mar-2014 04:40 450K
Computer Insecurity and Viral AttacksLiability ..> 19-Mar-2014 04:27 224K
Computer Malware What You Don't Know Can Hurt Y..> 19-Mar-2014 04:29 157K
Computer Parasitology.pdf 19-Mar-2014 04:24 97K
Computer Security Analysis through Decompilatio..> 19-Mar-2014 04:36 79K
Computer Virus Identification and Prevention.pdf 19-Mar-2014 04:22 44K
Computer Virus Myths.pdf 19-Mar-2014 04:32 347K
Computer Virus Operation and New Directions-199..> 19-Mar-2014 04:40 820K
Computer Virus Operation and New Directions.pdf 19-Mar-2014 04:21 583K
Computer Virus Propagation Model Based on Varia..> 19-Mar-2014 04:22 727K
Computer Virus Propagation Models.pdf 19-Mar-2014 04:27 291K
Computer Virus Strategies and Detection Methods..> 19-Mar-2014 04:36 77K
Computer Virus Survival Guide.pdf 19-Mar-2014 04:40 25M
Computer Virus-Antivirus Coevolution.pdf 19-Mar-2014 04:26 310K
Computer Virus__.pdf 19-Mar-2014 04:21 16K
Computer Viruses - A Form of Artificial Life.pdf 19-Mar-2014 04:27 218K
Computer Viruses - Legal Options.pdf 19-Mar-2014 04:34 233K
Computer Viruses - Theory and Experiments.pdf 19-Mar-2014 04:24 1M
Computer Viruses A Global Perspective.pdf 19-Mar-2014 04:22 234K
Computer Viruses A Management Perspective.pdf 19-Mar-2014 04:21 24K
Computer Viruses A Very Real Threat.pdf 19-Mar-2014 04:29 152K
Computer Viruses Are Nothing New Don't be asham..> 19-Mar-2014 04:21 10K
Computer Viruses By Ingrid Richter.pdf 19-Mar-2014 04:18 399K
Computer Viruses Can It Happen At IU.pdf 19-Mar-2014 04:40 231K
Computer Viruses Episode.pdf 19-Mar-2014 04:24 101K
Computer Viruses The Disease, the Detection, an..> 19-Mar-2014 04:38 191K
Computer Viruses The Technology and Evolution o..> 19-Mar-2014 04:19 630K
Computer Viruses The Threat Today and The Expec..> 19-Mar-2014 04:14 269K
Computer Viruses and Ethics.pdf 19-Mar-2014 04:23 981K
Computer Viruses and Malware.pdf 19-Mar-2014 04:39 11M
Computer Viruses and Other Malicious Software A..> 19-Mar-2014 04:40 4M
Computer Viruses and Related Threats.pdf 19-Mar-2014 04:21 31K
Computer Viruses and Their Control.pdf 19-Mar-2014 04:21 19K
Computer Viruses and What to Do About Them.pdf 19-Mar-2014 04:24 97K
Computer Viruses and the Simulation Environment..> 19-Mar-2014 04:36 4M
Computer Viruses as Artificial Life.pdf 18-Mar-2014 23:06 133K
Computer Viruses as a Threat to Home Users.pdf 19-Mar-2014 04:31 76K
Computer Viruses for Dummies.pdf 19-Mar-2014 04:40 3M
Computer Viruses on the Loose.pdf 19-Mar-2014 04:40 349K
Computer Viruses the Inevitability of Evolution..> 19-Mar-2014 04:31 451K
Computer Viruses, Artificial Life and Evolution..> 19-Mar-2014 04:40 4M
Computer Viruses, Epidemiology and Worms.pdf 19-Mar-2014 04:40 440K
Computer Viruses, Epidemiology, and Worms.pdf 19-Mar-2014 04:34 595K
Computer Worms Past, Present, and Future.pdf 19-Mar-2014 04:20 136K
Computer abuse vandalizing the information soci..> 19-Mar-2014 04:21 36K
Computer doctor busy fighting `viruses'.pdf 18-Mar-2014 23:06 126K
Computer intrusions and attacks.pdf 19-Mar-2014 04:22 57K
Computer virus cover withdrawn.pdf 19-Mar-2014 04:36 90K
Computer virus identification by neural network..> 19-Mar-2014 04:15 716K
Computer virus immunization.pdf 19-Mar-2014 04:40 5M
Computer virus prevention and containment on ma..> 19-Mar-2014 04:25 763K
Computer virus prevention primer.pdf 19-Mar-2014 04:24 93K
Computer viruses (BMJ 296-013).pdf 19-Mar-2014 04:36 2M
Computer viruses (BMJ 299-66a).pdf 19-Mar-2014 04:32 344K
Computer viruses (BMJ 302-66e).pdf 19-Mar-2014 04:27 302K
Computer viruses (BMJ 307-59e).pdf 19-Mar-2014 04:27 664K
Computer viruses - a high-tech disease.pdf 19-Mar-2014 04:40 85M
Computer viruses - the current state in Italy.pdf 18-Mar-2014 22:55 225K
Computer viruses a quantitative analysis.pdf 19-Mar-2014 04:39 372K
Computer viruses and anti-virus warfare.pdf 19-Mar-2014 04:40 91M
Computer viruses and electronic mail.pdf 19-Mar-2014 04:30 204K
Computer viruses demystified,2.pdf 19-Mar-2014 04:20 144K
Computer viruses demystified.pdf 19-Mar-2014 04:33 995K
Computer viruses from theory to applications.pdf 19-Mar-2014 04:38 2M
Computer-Generated Life.pdf 19-Mar-2014 04:31 74K
Computers and epidemiology.pdf 19-Mar-2014 02:50 142K
Computers under attacks!.pdf 19-Mar-2014 02:49 85K
Concepts and Future Trends in Computer Virology..> 19-Mar-2014 02:51 841K
Concepts for the Stealth Windows Rootkit (The C..> 19-Mar-2014 02:46 225K
Concepts of cooperation in artificial life.pdf 19-Mar-2014 02:49 353K
Conceptual Frameworks for Artificial Immune Sys..> 19-Mar-2014 02:50 284K
Conflict and the Computer Information Warfare a..> 19-Mar-2014 02:47 248K
Consensual Realities in Cyberspace.pdf 19-Mar-2014 02:51 242K
Console viruses.pdf 18-Mar-2014 23:03 119K
Constructing Computer Virus Phylogenies.pdf 19-Mar-2014 02:51 190K
Constructing Malware Normalizers using Term Rew..> 19-Mar-2014 02:51 219K
Contagion and Repetition On the Viral Logic of ..> 19-Mar-2014 02:49 174K
Contagion on the Internet.pdf 19-Mar-2014 02:49 118K
Contournement dune passerelle antivirus.pdf 19-Mar-2014 02:51 124K
Control Flow Graphs as Malware Signatures.pdf 18-Mar-2014 23:02 158K
Control Flow to Detect Malware.pdf 19-Mar-2014 02:47 345K
Controlling Super-Intelligent Machines.pdf 19-Mar-2014 02:49 18K
Convergence of Virus Writers and Hackers Fact o..> 19-Mar-2014 02:51 255K
Cooperative Automated worm Response and Detecti..> 19-Mar-2014 02:50 143K
Corporate Virus Protection.pdf 18-Mar-2014 23:06 20K
Countering Kernel Rootkits with Lightweight Hoo..> 19-Mar-2014 02:49 188K
Countering Network Worms Through Automatic Patc..> 19-Mar-2014 02:51 281K
Countering NetworkWorms Through Automatic Patch..> 19-Mar-2014 02:46 150K
Covert Distributed Processing with Computer Vir..> 19-Mar-2014 02:47 179K
Cracking.Wifi.al.Completo.-.David.Puente.Castro..> 19-Mar-2014 03:24 907K
Crc Press - The Hacker'S Handbook.pdf 19-Mar-2014 03:31 18M
Creating a Secure Computer Virus Laboratory.pdf 19-Mar-2014 02:39 54K
Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_ww..> 19-Mar-2014 03:25 223K
Crimea river.pdf 18-Mar-2014 23:06 44K
Crisis and Aftermath.pdf 19-Mar-2014 02:51 1M
Criss-cross.pdf 18-Mar-2014 23:06 44K
Cryptographic Hashing for Virus Localization.pdf 18-Mar-2014 23:08 154K
Cryptography all-out attacks or how to attack c..> 19-Mar-2014 02:51 5M
Cryptography and Viruses.pdf 19-Mar-2014 02:39 96K
Cryptovirology Extortion-Based Security Threats..> 19-Mar-2014 02:50 1M
DCA for Bot Detection.pdf 19-Mar-2014 02:48 173K
Danger theory and collaborative filtering in MA..> 19-Mar-2014 02:50 372K
Danger! Deadly new computer viruses want to kil..> 19-Mar-2014 02:50 131K
DangerousGoogle-SearchingForSecrets.pdf 19-Mar-2014 03:31 2M
Darwin inside the machines Malware evolution an..> 19-Mar-2014 02:51 1M
Darwin, a Game of Survival of the Fittest among..> 18-Mar-2014 23:06 26K
Darwin.pdf 19-Mar-2014 02:36 216K
Data Mining Methods for Detection of New Malici..> 18-Mar-2014 23:08 158K
Data security from malicious attack Computer Vi..> 19-Mar-2014 02:49 106K
Database Rootkits.pdf 19-Mar-2014 02:50 721K
Deelaed learning.pdf 19-Mar-2014 02:40 47K
Defeating Kernel Native API Hookers by Direct S..> 19-Mar-2014 02:46 357K
Defeating Polymorphism Beyond Emulation.pdf 18-Mar-2014 23:05 459K
Defeating Polymorphism White Paper.pdf 19-Mar-2014 02:51 459K
Defending Against Internet Worms A Signature-Ba..> 18-Mar-2014 23:09 156K
Defending against Hitlist Worms using Network A..> 19-Mar-2014 02:49 163K
Defending against Viruses and Worms.pdf 19-Mar-2014 02:51 1M
Defense Against the Dark Arts.pdf 19-Mar-2014 02:50 101K
Defense and Detection Strategies against Intern..> 19-Mar-2014 02:51 3M
Defense-In-Depth Against Computer Viruses.pdf 19-Mar-2014 02:51 141K
Des IDS et des vers... D%2b%aetection par l%27a..> 19-Mar-2014 02:39 295K
Design of a System for Real-Time Worm Detection..> 19-Mar-2014 02:49 243K
Design of a neural network for recognition and ..> 19-Mar-2014 02:51 1M
Design of an Artificial Immune System as a Nove..> 19-Mar-2014 02:50 69K
Detecting Early Worm Propagation through Packet..> 19-Mar-2014 02:45 164K
Detecting Internet Worms Using Data Mining Tech..> 19-Mar-2014 02:51 136K
Detecting Kernel-Level Rootkits Through Binary ..> 19-Mar-2014 02:50 788K
Detecting Malicious Code by Model Checking.pdf 19-Mar-2014 02:50 700K
Detecting Malicious Network Traffic Using Inver..> 19-Mar-2014 02:51 833K
Detecting Malicious Software by Monitoring Anom..> 19-Mar-2014 02:51 248K
Detecting Metamorphic Computer Viruses using Su..> 19-Mar-2014 02:47 211K
Detecting Metamorphic viruses by using Arbitrar..> 19-Mar-2014 02:50 574K
Detecting Network-based Obfuscated Code Injecti..> 19-Mar-2014 02:50 318K
Detecting Sources of Computer Viruses in Networ..> 19-Mar-2014 02:50 1M
Detecting Stealth Software with Strider GhostBu..> 19-Mar-2014 02:51 324K
Detecting Unknown Computer Viruses.pdf 19-Mar-2014 02:51 1M
Detecting Unknown Massive Mailing Viruses Using..> 19-Mar-2014 02:51 251K
Detecting Viral Propagations Using Email Behavi..> 19-Mar-2014 02:51 1M
Detecting Virus Mutations Via Dynamic Matching.pdf 19-Mar-2014 02:49 298K
Detecting Windows Server Compromises with Patch..> 19-Mar-2014 02:50 187K
Detecting Worms through Cryptographic Hashes.pdf 19-Mar-2014 02:49 308K
Detecting Worms via Mining Dynamic Program Exec..> 19-Mar-2014 02:49 231K
Detecting and Categorizing Kernel-Level Rootkit..> 19-Mar-2014 02:51 2M
Detecting metamorphic viruses using profile hid..> 19-Mar-2014 02:47 548K
Detecting self-mutating malware using control-f..> 19-Mar-2014 02:39 98K
Detecting worms through de-centralized monitori..> 19-Mar-2014 02:49 203K
Detection of Injected, Dynamically Generated, a..> 19-Mar-2014 02:34 230K
Detection of Intrusions and Malware & Vulnerabi..> 19-Mar-2014 02:51 3M
Detection of Intrusions and Malware, and Vulner..> 19-Mar-2014 02:50 4M
Detection of Intrusions and Malware, and Vulner..> 19-Mar-2014 02:51 14M
Detection of Intrusions and Malware, and Vulner..> 19-Mar-2014 02:51 4M
Detection of Intrusions and Malware, and Vulner..> 19-Mar-2014 02:51 2M
Detection of Metamorphic and Virtualization-bas..> 19-Mar-2014 02:47 222K
Detection of Metamorphic and Virtualization-bas..> 18-Mar-2014 23:06 147K
Detection of New Malicious Code Using N-grams S..> 19-Mar-2014 02:51 359K
Detection of Self-Mutating Computer Viruses.pdf 19-Mar-2014 02:50 114K
Detection of metamorphic computer viruses using..> 18-Mar-2014 23:04 211K
Developing a Trojan applets in a smart card.pdf 19-Mar-2014 02:51 640K
Development of Computer Vulnerability Scanning ..> 19-Mar-2014 02:51 270K
Development of inland lakes as hubs in an invas..> 19-Mar-2014 02:51 972K
Die Gefahr Von Debug Codes.pdf 19-Mar-2014 02:43 169K
Digital Postmark Helps Fight Spam, Virus Attack..> 19-Mar-2014 02:48 151K
Directed-Graph Epidemiological Models of Comput..> 19-Mar-2014 02:50 2M
Disk-Level Behavioral Malware Detection.pdf 19-Mar-2014 02:51 1M
Disk-Level Behavioral Virus Detection.pdf 19-Mar-2014 02:51 5M
Distributed Computing with a Trojan Horse.pdf 19-Mar-2014 02:51 590K
Distributed Worm Simulation with a Realistic In..> 19-Mar-2014 02:51 593K
Distributive immunization of networks against v..> 19-Mar-2014 02:50 889K
Do The Media Spread Computer Viruses.pdf 18-Mar-2014 23:06 18K
Do the macarena.pdf 19-Mar-2014 02:39 58K
Do-It-Yourself Guide to Cell Phone Malware.pdf 19-Mar-2014 02:51 188K
Doin' the eagle rock.pdf 18-Mar-2014 22:55 45K
Dummies - Hack How To Create Keygens (1).pdf 19-Mar-2014 03:25 9832
Dynamic Binary Instrumentation-based Framework ..> 19-Mar-2014 02:50 343K
Dynamic analysis of malicious code.pdf 19-Mar-2014 02:50 212K
Dynamic detection and classi cation of computer..> 19-Mar-2014 02:50 4M
Dynamical Models for Computer Viruses Propagati..> 19-Mar-2014 02:51 4M
E-mail virus protection handbook.pdf 19-Mar-2014 02:51 492K
ELF et virologie informatique.pdf 19-Mar-2014 02:51 257K
EPOCalypse NOW!.pdf 19-Mar-2014 02:50 456K
Effective and Inexpensive Methods Exist for Con..> 18-Mar-2014 23:00 198K
Effectiveness of Quarantine in Worm Epidemics.pdf 19-Mar-2014 03:01 355K
Effectiveness of Rate Control in Slowing Down W..> 19-Mar-2014 02:57 262K
Efficiency of Trusted Platform Module Against C..> 19-Mar-2014 03:02 157K
Efficient Content-Based Detection of Zero-Day W..> 19-Mar-2014 02:45 98K
Efficient Static Analysis of Executables For De..> 19-Mar-2014 02:59 536K
Efficient Virus Detection Using Dynamic Instruc..> 19-Mar-2014 03:00 438K
Efficient quarantining of scanning worms optima..> 19-Mar-2014 02:57 173K
Email Virus Propagation Modeling and Analysis.pdf 19-Mar-2014 03:01 359K
Email networks and the spread of computer virus..> 19-Mar-2014 02:59 264K
End-to-end security implementation for mobile d..> 19-Mar-2014 02:51 568K
Epidemic Profiles and Defense of Scale-Free Net..> 19-Mar-2014 03:01 161K
Epidemic Spreading in Real Networks An Eigenval..> 19-Mar-2014 03:01 279K
Epidemic dynamics and endemic states in complex..> 19-Mar-2014 03:00 279K
Epidemics and immunization in scale-free networ..> 19-Mar-2014 02:41 221K
Epidemiological Modelling of Peer-to-Peer Virus..> 19-Mar-2014 02:56 828K
Epidemiological Models Applied to Viruses in Co..> 19-Mar-2014 03:01 106K
Equational reasoning obfuscated decipher routin..> 19-Mar-2014 02:43 99K
Ethereal analyseur multiples.pdf 19-Mar-2014 03:02 499K
Ethical Issues in Computer Virus Distribution.pdf 19-Mar-2014 02:53 103K
Evaluation of Two Host-Based Intrusion Preventi..> 19-Mar-2014 02:59 171K
Evaluation of malware phylogeny modelling syste..> 19-Mar-2014 03:00 309K
Evolution, Ecology and Optimization of Digital ..> 19-Mar-2014 03:00 179K
Evolvable Malware.pdf 19-Mar-2014 02:59 567K
Examining%e9%a0Viruses.pdf 19-Mar-2014 02:56 1M
Execution Context in Anti-Malware Testing.pdf 19-Mar-2014 03:01 156K
Experience with Viruses on UNIX Systems.pdf 19-Mar-2014 02:58 1M
Exploiting an Antivirus Interface.pdf 19-Mar-2014 02:53 187K
Extended recursion-based formalization of virus..> 19-Mar-2014 02:51 259K
FPGA Viruses.pdf 18-Mar-2014 23:04 166K
Fast Detection of Scanning Worm Infections.pdf 19-Mar-2014 03:00 247K
Fast virus detection by using high speed time d..> 19-Mar-2014 02:45 579K
Faster parameter detection of polymorphic viral..> 19-Mar-2014 02:45 95K
Feedback Email Worm Defense System for Enterpri..> 19-Mar-2014 02:57 143K
Fighting Computer Viruses.pdf 19-Mar-2014 03:00 129K
Fighting EPO Viruses.pdf 19-Mar-2014 03:00 369K
File system driver filtering against metamorphi..> 19-Mar-2014 02:56 91K
Fileprint analysis for Malware Detection.pdf 19-Mar-2014 03:00 850K
Finding Malware on Compromised Windows Machines..> 18-Mar-2014 23:05 102K
First Virus.pdf 19-Mar-2014 03:01 436K
Flexible Infections Computer Viruses, Human Bod..> 19-Mar-2014 02:56 91K
Flibi Evolution.pdf 19-Mar-2014 02:38 93K
Flibi night.pdf 19-Mar-2014 02:39 41K
Flying below the Radar What modern malware tell..> 19-Mar-2014 03:02 2M
Flying solo.pdf 18-Mar-2014 23:04 55K
Formal Affordance-based Models of Computer Viru..> 19-Mar-2014 02:58 322K
Formal Definition of Self-reproductive Systems.pdf 19-Mar-2014 02:57 74K
Formal Models of Reproduction from Computer Vir..> 19-Mar-2014 03:01 3M
Formalisation and implementation aspects of K -..> 19-Mar-2014 02:39 380K
Formalization of viruses and malware through pr..> 19-Mar-2014 02:58 220K
Fragmented malware through RFID and its defense..> 19-Mar-2014 02:51 816K
Frankie say relax.pdf 19-Mar-2014 02:47 42K
Free Anti-Virus Tips and Techniques.pdf 19-Mar-2014 03:01 940K
From AntiVirus to AntiMalware Software and Beyo..> 19-Mar-2014 02:33 90K
From the design of a generic metamorphic engine..> 19-Mar-2014 03:02 570K
Functional polymorphic engines formalisation, i..> 19-Mar-2014 03:01 1M
Functional similarities between computer worms ..> 19-Mar-2014 02:53 215K
Future Trends in Malicious Code - 2006 Report.pdf 19-Mar-2014 02:59 87K
GETTING THE WORD OUT.pdf 19-Mar-2014 02:56 5707
Gatt got your tongue.pdf 18-Mar-2014 23:02 56K
Generalized Anomaly Detection Model for Windows..> 19-Mar-2014 02:33 257K
Generic Detection and Classification of Polymor..> 19-Mar-2014 02:59 318K
Generic Virus Scanner in C++.pdf 19-Mar-2014 02:51 90K
Genetic algorithm based Internet worm propagati..> 19-Mar-2014 02:36 131K
Geometry-based flash worm detection.pdf 19-Mar-2014 02:58 567K
Good Worms and Human Rights.pdf 19-Mar-2014 02:52 45K
Got [Mac]root.pdf 19-Mar-2014 02:48 41K
Guide-to-Hacking-with-sub7 (1).doc 19-Mar-2014 03:25 106K
HIPAA and Information Security Policies.pdf 19-Mar-2014 02:39 38K
Hack IT Security Through Penetration Testing.pdf 19-Mar-2014 03:31 12M
Hack Proofing - Your Network - Internet Tradecr..> 19-Mar-2014 03:31 3M
Hack Proofing Linux A Guide to Open Source Secu..> 19-Mar-2014 03:31 12M
Hack Proofing Sun Solaris 8.pdf 19-Mar-2014 03:30 7M
Hack Proofing Your E-Commerce Site.pdf 19-Mar-2014 03:31 7M
Hack Proofing Your Identity In The Information ..> 19-Mar-2014 03:31 9M
Hack Proofing Your Network Second Edition.pdf 19-Mar-2014 03:31 9M
Hack Proofing Your Network_First Edition.pdf 19-Mar-2014 03:31 3M
Hack Proofing Your Web Applications.pdf 19-Mar-2014 03:31 9M
Hack_Attacks_Revealed_A_Complete_Reference_With..> 19-Mar-2014 03:31 6M
Hack_IT_Security_Through_Penetration_Testing.chm 19-Mar-2014 03:29 5M
Hacker Disassembling Uncovered.chm 19-Mar-2014 03:31 5M
Hacker Linux Uncovered.chm 19-Mar-2014 03:26 4M
Hacker Web Exploitation Uncovered.chm 19-Mar-2014 03:00 555K
Hacker'S.Delight.chm 19-Mar-2014 03:30 2M
Hacker_s_Guide.pdf 19-Mar-2014 03:31 4M
Hackers Beware.pdf 19-Mar-2014 03:31 5M
Hackers Secrets Revealed.pdf 19-Mar-2014 03:02 493K
Hackers Secrets.pdf 19-Mar-2014 03:25 493K
Hackers, Heroes Of The Computer Revolution.pdf 19-Mar-2014 03:25 105K
Hackers_Secrets.pdf 19-Mar-2014 03:28 493K
Hacking - Firewalls And Networks How To Hack In..> 19-Mar-2014 03:28 3M
Hacking - The Art of Exploitation.chm 19-Mar-2014 03:24 1M
Hacking Cisco Routers.pdf 19-Mar-2014 03:25 19K
Hacking Exposed - Network Security Secrets & So..> 19-Mar-2014 03:31 10M
Hacking Exposed Network Security Secrets & Solu..> 19-Mar-2014 03:25 2M
Hacking For Dummies 1.pdf 19-Mar-2014 04:05 143K
Hacking For Dummies 2.pdf 19-Mar-2014 03:48 177K
Hacking For Dummies.pdf 19-Mar-2014 03:48 175K
Hacking GMail.pdf 19-Mar-2014 04:34 5M
Hacking IIS Servers.pdf 19-Mar-2014 04:05 31K
Hacking Windows XP.pdf 19-Mar-2014 04:42 10M
Hacking Wireless Networks For Dummies.pdf 18-Mar-2014 22:42 11M
Hacking into computer systems - a beginners gui..> 19-Mar-2014 04:38 615K
Hacking-Hacker's Guide.pdf 19-Mar-2014 04:42 4M
Hacking-Hackers Secrets Revealed.pdf 19-Mar-2014 04:41 493K
Hacking-Hugo Cornwall-The Hacker's Handbook .pdf 19-Mar-2014 04:39 278K
Hacking-The Hacker Crackdown.pdf 19-Mar-2014 04:33 633K
Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf 19-Mar-2014 04:41 355K
Hacking.For.Dummies.Access.To.Other.People's.Sy..> 19-Mar-2014 04:22 1M
Hacking.Guide.V3.1.pdf 19-Mar-2014 04:22 1M
Hackproofing Oracle Application Server.pdf 19-Mar-2014 04:42 306K
Halting viruses in scale-free networks.pdf 19-Mar-2014 02:49 54K
Halting.The.Hacker.A.Practical.Guide.To.Compute..> 19-Mar-2014 04:20 639K
Hardware Hacking Have Fun While Voiding Your Wa..> 19-Mar-2014 02:39 15M
Harmless and Useful Viruses Can Hardly Exist.pdf 19-Mar-2014 02:56 150K
Hash-AV Fast Virus Signature Scanning by Cache-..> 19-Mar-2014 02:35 142K
Heads or tails.pdf 19-Mar-2014 02:58 36K
Hidan and dangerous.pdf 19-Mar-2014 02:52 47K
Hidden Rootkits in Windows.pdf 19-Mar-2014 02:56 397K
Hide'n'Seek Anatomy of Stealth Malware.pdf 19-Mar-2014 02:35 248K
High-Fidelity Modeling of Computer Network Worm..> 19-Mar-2014 03:00 401K
High-Performance Context-Free Parser for Polymo..> 19-Mar-2014 02:49 177K
History of Viruses & Worms.pdf 19-Mar-2014 02:41 229K
HoneyStat Local Worm Detection Using Honeypots.pdf 19-Mar-2014 02:59 266K
Honeypots against Worms 101.pdf 19-Mar-2014 02:59 811K
Host-Based Detection of Worms through Peer-to-P..> 19-Mar-2014 03:02 352K
How To Withstand Mobile Virus Attacks.pdf 18-Mar-2014 23:09 217K
How Viruses Spread among Computers and People.pdf 19-Mar-2014 02:33 452K
How dumaru.pdf 19-Mar-2014 02:51 449K
How the virus Remote Shell Trojan(RST) works.pdf 19-Mar-2014 02:58 21K
How to Crack CD Protections.pdf 19-Mar-2014 04:05 30K
How to Kill Worms and Viruses with Policy Ponti..> 19-Mar-2014 03:01 253K
How to assess the effectiveness of your anti-vi..> 19-Mar-2014 02:54 175K
Hunting For Metamorphic.pdf 19-Mar-2014 03:01 902K
Hunting Obfuscated Malwares by Abstract Interpr..> 18-Mar-2014 23:07 48K
Hunting for Metamorphic Engines.pdf 19-Mar-2014 02:58 989K
Hunting for undetectable metamorphic viruses.pdf 19-Mar-2014 03:01 1M
I love you.pdf 18-Mar-2014 23:04 56K
I've named my virus - now what do I win.pdf 19-Mar-2014 02:57 65K
I.T. IN PRACTICE Computer viruses.pdf 19-Mar-2014 03:02 4M
IDS alerts correlation using grammar-based appr..> 19-Mar-2014 02:56 640K
IMAD In-Execution Malware Analysis and Detectio..> 19-Mar-2014 03:01 751K
IPA Computer Virus Survey 2000.pdf 19-Mar-2014 02:59 1M
Identification of file infecting viruses throug..> 19-Mar-2014 03:01 1M
Identifying Malicious Code Through Reverse Engi..> 19-Mar-2014 03:01 6M
Identifying Metamorphic Malware.pdf 19-Mar-2014 02:41 163K
Immune System for Virus Detection and Eliminati..> 19-Mar-2014 03:01 740K
Immunity-Based Intrusion Detection System A Gen..> 19-Mar-2014 02:41 83K
Immunization and epidemic dynamics in complex n..> 19-Mar-2014 03:00 253K
Impact of Computer Viruses on Society.pdf 19-Mar-2014 03:02 333K
Impeding Malware Analysis Using Conditional Cod..> 19-Mar-2014 03:02 2M
Impeding worm epidemics through destination add..> 19-Mar-2014 02:57 62K
Implementation of a Computer Immune System for ..> 19-Mar-2014 02:59 1M
Implementing Anti-Virus Controls in the Corpora..> 18-Mar-2014 23:07 49K
Implementing and Detecting an ACPI BIOS Rootkit..> 19-Mar-2014 02:58 373K
Implementing and testing a virus throttle.pdf 19-Mar-2014 03:00 138K
Implica%2b%baoes da ofusca%2b%baao de c%2b%a6di..> 19-Mar-2014 03:01 282K
Implications of Peer-to-Peer Networks on Worm A..> 19-Mar-2014 03:00 558K
Imposing Order on Program Statements to Assist ..> 19-Mar-2014 02:57 304K
Improving Malware Detection by Applying Multi-I..> 19-Mar-2014 02:56 442K
Improving virus protection with an efficient se..> 19-Mar-2014 02:38 293K
In-depth analysis of the viral threats with Ope..> 19-Mar-2014 03:02 3M
Incorporating E-Commerce, Internet and Telecomm..> 19-Mar-2014 02:49 51K
Infection dynamics on scale-free networks.pdf 19-Mar-2014 02:58 57K
Infection dynamics on the Internet.pdf 19-Mar-2014 02:34 154K
Infection, imitation and a hierarchy of compute..> 18-Mar-2014 23:03 162K
Information Assurance and the Information Socie..> 19-Mar-2014 02:35 69K
Information warfare and security.pdf 19-Mar-2014 02:57 77K
Inoculating SSH Against Address-Harvesting Worm..> 19-Mar-2014 02:54 380K
Inoculation strategies for victims of viruses a..> 18-Mar-2014 23:08 195K
Inside the Slammer Worm.pdf 19-Mar-2014 03:00 415K
Internet - Virusnet.pdf 19-Mar-2014 02:58 569K
Internet Instability and Disturbance Goal or Me..> 19-Mar-2014 03:00 2M
Internet Quarantine Requirements for Containing..> 19-Mar-2014 02:39 153K
Internet Worm and Virus Protection in Dynamical..> 19-Mar-2014 02:56 568K
Internet computer virus protection policy.pdf 19-Mar-2014 02:56 136K
Introducing Stealth Malware Taxonomy.pdf 19-Mar-2014 03:01 344K
Introduction to Network Self-defense technical ..> 19-Mar-2014 02:47 222K
Intrusion Detection for Viruses and Worms.pdf 19-Mar-2014 02:56 92K
IpMorph fingerprinting spoofing unification.pdf 19-Mar-2014 03:01 1M
Iranian Journal Examines Electronic Warfare.pdf 19-Mar-2014 02:58 12K
Is Your Cat Infected with a Computer Virus.pdf 19-Mar-2014 02:51 194K
Is creating virus software protected as a first..> 19-Mar-2014 02:58 12K
Is virus writing really that bad.pdf 19-Mar-2014 02:55 445K
It's a bird, it's a plane, it's Fooperman.pdf 19-Mar-2014 02:49 50K
It's zell(d)ome the one you expect.pdf 19-Mar-2014 02:58 30K
JAB, une backdoor pour reseau Win32 inconnu - P..> 19-Mar-2014 02:59 255K
JAB, une backdoor pour reseau Win32 inconnu.pdf 19-Mar-2014 02:57 75K
John Wiley & Sons - Hacking For Dummies.pdf 19-Mar-2014 04:42 9M
John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004..> 19-Mar-2014 04:42 10M
Killer Apps.pdf 19-Mar-2014 02:59 10K
Know Your Enemy Containing Conficker.pdf 19-Mar-2014 02:55 700K
Kolmogorov Complexity Estimates For Detection O..> 19-Mar-2014 02:53 446K
La %2522mobilit%2b%ae%2522 du code malveillant.pdf 18-Mar-2014 23:08 233K
Language, a virus.pdf 19-Mar-2014 02:54 44K
Le malware en 2005 Unix, Linux et autres plates..> 19-Mar-2014 03:00 86K
Leaps and Bounds.pdf 19-Mar-2014 02:49 51K
Learning to Detect Malicious Executables in the..> 19-Mar-2014 02:54 211K
Learning to Detect and Classify Malicious Execu..> 19-Mar-2014 02:54 202K
Legal Options To Computer Viruses.pdf 19-Mar-2014 03:00 242K
Les virus informatiques%253A th%2b%aeorie%2c pr..> 19-Mar-2014 03:02 20M
Let free(dom) Ring!.pdf 19-Mar-2014 02:58 76K
Let them eat brioche.pdf 19-Mar-2014 02:58 23K
Limits of Static Analysis for Malware Detection..> 19-Mar-2014 02:59 185K
Linux Improvised Userland Scheduler Virus.pdf 19-Mar-2014 03:00 112K
Loathing Lupper in Linux.pdf 19-Mar-2014 02:59 389K
Look at that escargot.pdf 19-Mar-2014 02:39 38K
Looking a Bagift-Horse in the Mouth.pdf 19-Mar-2014 02:47 43K
MCF a malicious code filter.pdf 19-Mar-2014 02:58 2M
MRSI A Fast Pattern Matching Algorithm for Anti..> 19-Mar-2014 02:57 293K
Macro virus identification problems.pdf 19-Mar-2014 03:02 2M
Magisterium Abraxas.pdf 19-Mar-2014 02:50 152K
Making a hash of things.pdf 19-Mar-2014 03:42 39K
Malicious Codes in Depth.pdf 19-Mar-2014 03:36 298K
Malicious Cryptography - Exposing Cryptovirolog..> 19-Mar-2014 03:43 29M
Malicious Cryptography Cryptovirology and Klept..> 19-Mar-2014 03:42 42K
Malicious Cryptography Kleptographic Aspects.pdf 19-Mar-2014 02:53 168K
Malicious Data and Computer Security.pdf 19-Mar-2014 03:02 64K
Malicious Software in Mobile Devices.pdf 19-Mar-2014 03:39 395K
Malicious Software.pdf 19-Mar-2014 03:24 360K
Malicious Threats to Personal Digital Assistant..> 19-Mar-2014 03:34 79K
Malicious crypto - (Ab)use cryptology.pdf 19-Mar-2014 03:40 4M
Malicious crypto.pdf 19-Mar-2014 03:42 4M
Malicious origami in PDF.pdf 19-Mar-2014 03:06 2M
Malware Analyst's Cookbook and DVD.pdf 19-Mar-2014 03:43 9M
Malware Detection Based on Suspicious Behavior ..> 19-Mar-2014 03:01 492K
Malware Detection Using Adaptive Data Compressi..> 19-Mar-2014 03:34 257K
Malware Detection using Attribute-Automata to p..> 19-Mar-2014 03:36 631K
Malware Detection using Statistical Analysis of..> 19-Mar-2014 03:42 304K
Malware Detection.pdf 19-Mar-2014 03:43 18M
Malware Forensics Investigating and Analyzing M..> 19-Mar-2014 03:42 25M
Malware Normalization.pdf 19-Mar-2014 03:43 312K
Malware Phylogeny Generation using Permutations..> 19-Mar-2014 03:36 217K
Malware Research at SMU.pdf 19-Mar-2014 03:02 289K
Malware Von Viren, Wuermern, Hackern und Trojan..> 19-Mar-2014 03:43 22M
Malware analysis for windows administrators.pdf 19-Mar-2014 03:36 73K
Malware behaviour analysis.pdf 19-Mar-2014 03:43 899K
Malware comes of age The arrival of the true co..> 19-Mar-2014 02:54 244K
Malware in Popular Networks.pdf 19-Mar-2014 03:23 133K
Malware pattern scanning schemes secure against..> 19-Mar-2014 02:58 385K
Malware, Viruses and Log Visualisation.pdf 19-Mar-2014 03:42 476K
Malware.pdf 19-Mar-2014 03:14 47K
MalwareA Future Framework for Device, Network a..> 19-Mar-2014 03:15 275K
Managing Computer Viruses in a Groupware Enviro..> 19-Mar-2014 02:58 124K
Manual_vulnerabilidades.pdf 19-Mar-2014 04:42 2M
Marginal Networks The Virus between Complexity ..> 19-Mar-2014 03:34 252K
Mathematical Model of Computer Viruses.pdf 19-Mar-2014 02:54 90K
Mathematical Viruses.pdf 19-Mar-2014 02:55 111K
Mathematical models on computer viruses.pdf 19-Mar-2014 03:05 353K
McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking..> 19-Mar-2014 04:42 6M
McGraw.Hacking.Exposed.Cisco.Networks.chm 19-Mar-2014 04:42 10M
McGraw.Hill.HackNotes.Network.Security.Portable..> 19-Mar-2014 04:42 4M
McGraw.Hill.HackNotes.Web.Security.Portable.Ref..> 19-Mar-2014 04:42 3M
McGraw.Hill.HackNotes.Windows.Security.Portable..> 19-Mar-2014 04:42 5M
Measurement and Analysis of Worm Propagation on..> 19-Mar-2014 03:42 1M
Measuring and Modeling Computer Virus Prevalenc..> 19-Mar-2014 03:06 1M
Measuring virtual machine detection in malware ..> 19-Mar-2014 03:40 764K
Mechanics of Self-reproduction.pdf 19-Mar-2014 03:36 2M
MetaAware Identifying Metamorphic Malware.pdf 19-Mar-2014 03:25 163K
Metamorphic Virus Analysis and Detection.pdf 19-Mar-2014 03:21 1M
Metamorphism, Formal Grammars and Undecidable C..> 19-Mar-2014 03:35 369K
Metaphors And Meta-Experiences In Technology Si..> 19-Mar-2014 03:40 380K
Metaphors and Modern Threats Biological, Comput..> 19-Mar-2014 03:27 962K
Mimimorphism A New Approach to Binary Code Obfu..> 19-Mar-2014 02:54 387K
Mind Hacks - Tips & Tricks for Using Your Brain..> 19-Mar-2014 04:42 3M
Mind Wars Attack of the Memes.pdf 19-Mar-2014 03:24 120K
Misleading Modern Malware.pdf 19-Mar-2014 03:42 370K
Mobile Code Threats, Fact or Fiction.pdf 19-Mar-2014 03:34 83K
Mobile Malware Attacks and Defense.pdf 19-Mar-2014 03:43 7M
Model for network behaviour under viral attack.pdf 19-Mar-2014 03:40 1M
Model-Based Analysis of Two Fighting Worms.pdf 19-Mar-2014 03:41 320K
Modeling Botnet Propagation Using Time Zones.pdf 19-Mar-2014 03:43 528K
Modeling Computer Viruses.pdf 19-Mar-2014 03:38 595K
Modeling Epidemic Spreading in Mobile Environme..> 19-Mar-2014 03:23 573K
Modeling Malware Spreading Dynamics.pdf 19-Mar-2014 03:21 790K
Modeling Virus Propagation in Peer-to-Peer Netw..> 19-Mar-2014 03:23 129K
Modeling computer virus prevalence with a susce..> 19-Mar-2014 03:27 433K
Modeling the Effects of Timing Parameters on Vi..> 19-Mar-2014 03:26 678K
Modeling the Spread and Prevention of Malicious..> 19-Mar-2014 03:40 2M
Modeling the Spread of Active Worms.pdf 19-Mar-2014 03:43 632K
Modelling Development of Epidemics with Dynamic..> 19-Mar-2014 03:23 233K
Models of Active Worm Defenses.pdf 19-Mar-2014 03:39 210K
Modern Methods of Detecting and Eradicating Kno..> 19-Mar-2014 03:23 130K
Modern operating systems.pdf 19-Mar-2014 03:27 425K
Modular worms.pdf 19-Mar-2014 03:01 108K
Monitoring and Early Warning for Internet Worms..> 19-Mar-2014 03:40 195K
Morality and Technology, or Is it Wrong to Crea..> 19-Mar-2014 03:41 1M
Morphological Detection of Malware.pdf 19-Mar-2014 03:19 787K
Mostly harmless.pdf 19-Mar-2014 03:42 46K
Multi-Stage Delivery of Malware.pdf 19-Mar-2014 03:42 2M
Multiscale Modeling and Simulation of Worm Effe..> 19-Mar-2014 03:24 115K
N-gram analysis for computer virus detection.pdf 19-Mar-2014 03:36 217K
N-gram-based Detection of New Malicious Code.pdf 19-Mar-2014 02:54 84K
Nematodes - Beneficial Worms.pdf 19-Mar-2014 02:55 114K
Network Virus Propagation Model Based on Effect..> 19-Mar-2014 03:24 448K
Network Worms.pdf 19-Mar-2014 03:36 149K
Networks, Control, and Life-Forms.pdf 19-Mar-2014 02:57 174K
New data mining technique to enhance IDS alarms..> 19-Mar-2014 03:02 672K
New malware distribution methods threaten signa..> 19-Mar-2014 02:57 248K
New method of fighting computer viruses announc..> 19-Mar-2014 03:25 115K
New thoughts in ring3 NT rootkit.pdf 19-Mar-2014 03:42 260K
New threats of Java viruses.pdf 19-Mar-2014 03:36 183K
Next-Generation Viruses Present New Challenges.pdf 19-Mar-2014 03:34 83K
Nimda Worm Shows You Can't Always Patch Fast En..> 19-Mar-2014 03:42 24K
No.Starch.Press.Hacking.The.Art.Of.Exploitation..> 19-Mar-2014 04:32 1M
Non-signature based virus detection.pdf 19-Mar-2014 03:42 992K
Normalizing Metamorphic Malware Using Term Rewr..> 19-Mar-2014 03:26 161K
Not Teaching Viruses and Worms Is Harmful.pdf 19-Mar-2014 03:42 40K
Not worthy.pdf 19-Mar-2014 03:42 38K
Notes on the Worms programs.pdf 19-Mar-2014 03:30 1M
O'Reilly - Online Investing Hacks.chm 19-Mar-2014 04:42 5M
O'Reilly.-.Network.Security.Hacks.chm 19-Mar-2014 04:30 2M
O'Reilly.Windows.Server.Hack.chm 19-Mar-2014 04:42 2M
OReilly Google Hacks, 1st Edition2003.pdf 19-Mar-2014 04:42 3M
OReilly - Google Hacks.pdf 19-Mar-2014 04:42 3M
OReilly,.IRC.Hacks.(2004).DDU.chm 19-Mar-2014 04:42 3M
OReilly.SQL.Hacks.Nov.2006.chm 19-Mar-2014 04:23 2M
OSB.Ethical.Hacking.and.Countermeasures.EC.Coun..> 19-Mar-2014 04:42 14M
O_Reilly_-_Windows_XP_Hacks.chm 19-Mar-2014 04:42 5M
Obfuscated dechiper routine analysis using theo..> 19-Mar-2014 03:42 31K
Old Win32 Code for a Modern Super-stealth Troja..> 19-Mar-2014 03:39 352K
On Callgraphs and Generative Mechanisms.pdf 19-Mar-2014 03:42 2M
On Computer Viral Infection and the Effect of I..> 19-Mar-2014 03:39 180K
On Deriving Unknown Vulnerabilities from Zero-D..> 19-Mar-2014 03:17 191K
On Effectiveness of Defense Systems against Act..> 19-Mar-2014 03:42 1M
On Instant Messaging Worms, Analysis and Counte..> 19-Mar-2014 03:42 313K
On JavaScript Malware and related threats.pdf 19-Mar-2014 03:22 436K
On abstract computer virology from a recursion ..> 19-Mar-2014 02:57 178K
On abstract computer virology from a recursion-..> 19-Mar-2014 03:41 204K
On behavioral detection.pdf 19-Mar-2014 03:24 119K
On self-reproducing computer programs.pdf 19-Mar-2014 03:42 6M
On the Effectiveness of Address-Space Randomiza..> 19-Mar-2014 03:37 147K
On the Infeasibility of Modeling Polymorphic Sh..> 19-Mar-2014 03:36 335K
On the Performance of Internet Worm Scanning St..> 19-Mar-2014 02:56 249K
On the Semantics of Self-Unpacking Malware Code..> 19-Mar-2014 03:24 164K
On the Spread of Viruses on the Internet.pdf 19-Mar-2014 03:40 218K
On the Time Complexity of Computer Viruses.pdf 19-Mar-2014 02:54 206K
On the definition and classification of cybercr..> 19-Mar-2014 03:24 117K
On the functional validity of the worm-killing ..> 19-Mar-2014 03:24 116K
On the possibility of practically obfuscating p..> 19-Mar-2014 03:40 373K
On the trade-off between speed and resiliency o..> 19-Mar-2014 03:03 487K
One-hit models for virus inactivation studies.pdf 19-Mar-2014 03:02 92K
Opcodes as Predictor for Malware.pdf 19-Mar-2014 03:03 660K
Open Problems in Computer Virus Research.pdf 19-Mar-2014 03:42 42K
Open problems in computer virology.pdf 19-Mar-2014 02:43 167K
Oreilly, Paypal Hacks (2004) Ddu.chm 19-Mar-2014 04:28 2M
Owning Antivirus.pdf 19-Mar-2014 03:37 145K
PC Games - How to Crack CD Protection.pdf 19-Mar-2014 04:05 30K
PC Magazine Fighting Spyware Viruses and Malwar..> 19-Mar-2014 03:42 10M
PE-Miner Mining Structural Information to Detec..> 19-Mar-2014 03:38 464K
PROPAGATION MODELING AND ANALYSIS OF VIRUSES IN..> 19-Mar-2014 03:42 263K
Painting the Internet A Different Kind of Warho..> 19-Mar-2014 02:54 84K
Pairwise alignment of metamorphic computer viru..> 19-Mar-2014 03:00 294K
Panic computing The viral metaphor and computer..> 19-Mar-2014 03:37 876K
Paradise lost.pdf 19-Mar-2014 03:14 56K
Parallel analysis of polymorphic viral code usi..> 19-Mar-2014 02:55 113K
Parallels Between Biological and Computer Epide..> 19-Mar-2014 03:43 260K
Password Cracking A Game of Wits.pdf 19-Mar-2014 03:41 477K
Peer-to-Peer Botnets Analysis and Detection.pdf 19-Mar-2014 03:36 2M
Poison Ivy Farmers Virus Collections.pdf 19-Mar-2014 03:34 80K
Polygraph Automatically Generating Signatures f..> 19-Mar-2014 02:57 171K
Polymorphic Worm Detection Using Structural Inf..> 19-Mar-2014 03:36 250K
Polymorphic and Metamorphic Malware Detection.pdf 19-Mar-2014 03:42 1M
Polymorphic virus detection technology.pdf 19-Mar-2014 03:21 579K
Polymorphing Software by Randomizing Data Struc..> 19-Mar-2014 03:39 324K
Possible Vicarious Liability for Computer Users..> 19-Mar-2014 03:34 74K
Potential Threats to WAP Enabled Devices.pdf 19-Mar-2014 02:58 129K
Powerful virus hits computers.pdf 19-Mar-2014 03:01 100K
Practical Detection of Metamorphic Computer Vir..> 19-Mar-2014 03:42 1M
Practical overview of a Xen covert channel.pdf 19-Mar-2014 03:43 1M
Predators Good Will Mobile Codes Combat against..> 19-Mar-2014 03:38 514K
Prepared testimony and statement for the record..> 19-Mar-2014 03:43 2M
Prescription Medicine.pdf 19-Mar-2014 03:14 52K
Principles of a Computer Immune System.pdf 19-Mar-2014 03:14 58K
Procedures To Reduce The Computer Virus Threat.pdf 19-Mar-2014 03:22 976K
Profile hidden Markov models and metamorphic vi..> 19-Mar-2014 03:18 865K
Profiles in cyber courage.pdf 19-Mar-2014 03:39 331K
Prophet and loss.pdf 19-Mar-2014 03:02 72K
Prophylaxis for virus propagation and general c..> 19-Mar-2014 03:39 617K
Prosecuting Computer Virus Authors The Need for..> 19-Mar-2014 02:58 122K
Protection of computer systems from computer vi..> 19-Mar-2014 03:42 43K
Quantitative risk assessment of computer virus ..> 19-Mar-2014 03:30 961K
Quantum Malware.pdf 19-Mar-2014 03:15 273K
Queuing theory based models for studying intrus..> 19-Mar-2014 03:36 277K
RFID Security Issues in Military Supply Chains.pdf 19-Mar-2014 03:34 250K
Raised hacklez.pdf 19-Mar-2014 03:14 50K
Real world anti-virus product reviews and evalu..> 19-Mar-2014 03:14 59K
Real-Time Virus Detection System Using iNetmon ..> 19-Mar-2014 03:42 21K
Rebels for the System Virus writers, general in..> 19-Mar-2014 02:41 202K
Recent Worms A Survey and Trends.pdf 19-Mar-2014 03:18 268K
Reductions of the general virus detection probl..> 19-Mar-2014 03:14 57K
Reflections on Trusting Trust.pdf 19-Mar-2014 03:37 220K
Reliable Identification of Bounded-length Virus..> 19-Mar-2014 03:02 70K
Reply to Comment on Framework for Modelling Tr..> 19-Mar-2014 03:42 39K
Reply to Comment on Framework for Modelling Tro..> 19-Mar-2014 03:14 59K
Reports of computer viruses on the increase.pdf 19-Mar-2014 02:54 88K
Research in Computer Viruses and Worms.pdf 19-Mar-2014 03:36 349K
Resolution based metamorphic computer virus det..> 19-Mar-2014 03:34 79K
Response to the Proposal for a Virus database.pdf 19-Mar-2014 03:00 296K
Revealing Packed Malware.pdf 19-Mar-2014 03:04 153K
Reverse Code Engineering An In-Depth Analysis o..> 19-Mar-2014 03:43 1M
Reverse Engineering Malware.pdf 19-Mar-2014 03:42 351K
Rogue Computer Programs.pdf 19-Mar-2014 03:43 4M
Rootkit Hunting vs. Compromise Detection.pdf 19-Mar-2014 03:31 340K
Rootkits - Detection and prevention.pdf 19-Mar-2014 03:39 930K
Rootkits - The new wave of invisible malware is..> 19-Mar-2014 03:42 30K
Rootkits Analysis and Detection.pdf 19-Mar-2014 03:36 190K
Rotalum A Tool for Automatic Reverse Engineerin..> 19-Mar-2014 03:43 1M
Routing Worm A Fast, Selective Attack Worm base..> 19-Mar-2014 03:36 149K
Running head REVERSE ENGINEERING MALWARE.pdf 19-Mar-2014 03:34 81K
SBMDS an interpretable string based malware det..> 19-Mar-2014 03:43 533K
SPARSE A Hybrid System to Detect Malcode-Bearin..> 19-Mar-2014 03:42 1M
SQL Hacks.chm 19-Mar-2014 04:36 2M
SQLInjectionWhitePaper.pdf 19-Mar-2014 04:19 797K
Sandbox Technology Inside AV Scanners.pdf 19-Mar-2014 03:23 241K
Scalable, Behavior-Based Malware Clustering.pdf 19-Mar-2014 03:16 462K
Scary Networks Viruses as Discursive Practice.pdf 19-Mar-2014 03:23 145K
Securing Instant Messaging.pdf 19-Mar-2014 02:54 207K
Security and Hacking - Anti-Hacker Tool Kit Sec..> 19-Mar-2014 04:42 29M
Selbstreproduktion bei programmen.pdf 19-Mar-2014 03:43 38M
Self- information systems why not.pdf 19-Mar-2014 02:58 120K
Self-Nonself Discrimination in a Computer.pdf 19-Mar-2014 03:41 205K
Self-Replicating Turing Machines and Computer V..> 19-Mar-2014 03:14 48K
Self-reproducing machines.pdf 19-Mar-2014 03:06 315K
Semantics-Aware Malware Detection.pdf 19-Mar-2014 03:37 231K
Seminar Report on Study of Viruses and Worms.pdf 19-Mar-2014 03:04 152K
Server-based Virus-protection On UnixLinux.pdf 19-Mar-2014 03:35 684K
Shadow Walker - Raising The Bar For Rootkit Det..> 19-Mar-2014 03:42 557K
Shield -- A First Line Worm Defense.pdf 19-Mar-2014 03:37 362K
Shield Vulnerability-Driven Network Filters for..> 19-Mar-2014 03:40 195K
Should We Teach Virus Writing.pdf 19-Mar-2014 02:58 1M
Signature Generation and Detection of Malware F..> 19-Mar-2014 03:36 287K
Simulating Bandwidth-Limited Worms, One Graph t..> 19-Mar-2014 03:02 72K
Simulating and optimising worm propagation algo..> 19-Mar-2014 03:14 268K
Simulating malware with MAlSim.pdf 19-Mar-2014 03:37 1M
SinFP, unification of active and passive operat..> 19-Mar-2014 03:35 364K
SirCamstantial Evidence.pdf 19-Mar-2014 03:36 148K
Slack Space Sculpting the computer monsters -- ..> 19-Mar-2014 03:17 193K
Slackspace.pdf 19-Mar-2014 03:42 22K
Slamdunk.pdf 19-Mar-2014 03:42 43K
Sleep-Inducing.pdf 19-Mar-2014 03:43 21K
Small treatise about e-manipulation for honest ..> 19-Mar-2014 03:43 915K
SmartSiren Virus Detection and Alert for Smartp..> 19-Mar-2014 03:26 509K
Sobig, sobigger, sobiggest.pdf 19-Mar-2014 03:25 447K
Software Diversity as a Defense Against Viral P..> 19-Mar-2014 03:17 190K
Software Transformations to Improve Malware Det..> 19-Mar-2014 03:39 307K
Software Vaccine Technique and Its Application ..> 19-Mar-2014 03:24 165K
Some Further Theoretical Results about Computer..> 19-Mar-2014 03:29 2M
Some human dimensions of computer virus creatio..> 19-Mar-2014 02:56 156K
Something smells fishy.pdf 19-Mar-2014 03:42 39K
Source Code Analysis of Worms.pdf 19-Mar-2014 03:02 290K
Specification and evaluation of polymorphic she..> 19-Mar-2014 03:01 786K
Spyware & Rootkits.pdf 19-Mar-2014 03:02 71K
Spyware A Little Knowledge is a Wonderful Thing..> 19-Mar-2014 02:54 89K
Spyware and Rootkits - The Future Convergence.pdf 19-Mar-2014 03:01 94K
Stack Shape Analysis to Detect Obfuscated calls..> 19-Mar-2014 03:36 182K
Static Analysis of Binary Code to Isolate Malic..> 19-Mar-2014 03:02 68K
Static Analysis of Executables to Detect Malici..> 19-Mar-2014 03:32 303K
Static Detection of Malicious Code in Executabl..> 19-Mar-2014 03:19 792K
Static detection and identification of X86 mali..> 19-Mar-2014 03:42 688K
Statistical Signatures for Fast Filtering of In..> 19-Mar-2014 03:37 148K
Stay Safe Online Campaign's AntiVirus Presentat..> 19-Mar-2014 02:41 200K
Stochastic Features of Computer Viruses.pdf 19-Mar-2014 03:01 96K
Stoned Bootkit.pdf 19-Mar-2014 03:43 1M
Striking Similarities.pdf 19-Mar-2014 03:14 47K
Strong Cryptography Armoured Computer Viruses F..> 19-Mar-2014 02:41 196K
Structuring ethical curricula in the informatio..> 19-Mar-2014 03:01 107K
SubVirt Implementing malware with virtual machi..> 19-Mar-2014 03:41 205K
Supercompilation for Equivalence Testing in Met..> 19-Mar-2014 03:03 209K
Supervisory control of malicious executables.pdf 19-Mar-2014 03:41 463K
Superworms and Cryptovirology a Deadly Combinat..> 19-Mar-2014 03:04 153K
Suppressing the spread of email malcode using s..> 19-Mar-2014 03:36 151K
Survey on Malware Detection Methods.pdf 19-Mar-2014 02:56 159K
SweetBait Zero-Hour Worm Detection and Containm..> 19-Mar-2014 04:26 210K
Syngress - Hacking a Terror Network. The Silent..> 19-Mar-2014 04:42 9M
Syngress -- Hack Proofing Your Wireless Network..> 19-Mar-2014 04:42 7M
Syngress Hack Proofing Your Identity in the Inf..> 19-Mar-2014 04:42 9M
Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook..> 19-Mar-2014 04:42 5M
Syngress.Hack.the.Stack.Oct.2006.pdf 19-Mar-2014 04:42 7M
System Dynamic Model for Computer Virus Prevala..> 19-Mar-2014 04:23 570K
System and method for detecting malicious execu..> 19-Mar-2014 04:25 163K
TAU cure for computer viruses.pdf 19-Mar-2014 04:08 119K
THE MALICIOUS LOGIC BATTLE UNDERSTANDING THE EN..> 19-Mar-2014 04:18 47K
TIBS.pdf 19-Mar-2014 04:30 516K
TTAnalyze A Tool for Analyzing Malware.pdf 19-Mar-2014 04:09 371K
Taiwan's first ever political computer virus.pdf 19-Mar-2014 04:28 281K
Taking a Lesson from Stealthy Rootkits.pdf 19-Mar-2014 04:27 217K
Taking the redpill Artificial Evolution in nati..> 19-Mar-2014 04:20 370K
Taming Lakatos' Monster - Computer Virus Epidem..> 19-Mar-2014 04:28 39K
Taxonomy and Effectiveness of Worm Defense Stra..> 19-Mar-2014 04:27 488K
Techniques virales avanc%2b%aees.pdf 19-Mar-2014 04:29 18M
Technological Turf Wars A Case Study of the Com..> 19-Mar-2014 04:24 2M
Technologically Enabled Crime Shifting Paradigm..> 19-Mar-2014 04:24 1M
Testing Malware Detectors.pdf 19-Mar-2014 04:27 339K
Testing Time for Antivirus Software.pdf 19-Mar-2014 04:28 1M
Testing and evaluating virus detectors for hand..> 19-Mar-2014 04:25 227K
Testing the SETIHacker Hypothesis.pdf 19-Mar-2014 04:21 673K
The ABC of computer security.pdf 19-Mar-2014 04:11 105K
The Application of Epidemiology to Computer Vir..> 19-Mar-2014 04:14 589K
The Art of Computer Virus Research and Defense.pdf 19-Mar-2014 04:28 10M
The Art of File Format Fuzzing.pdf 19-Mar-2014 04:16 1M
The Asexual Virus Computer Viruses in Feminist ..> 19-Mar-2014 04:08 117K
The Basic Building Blocks of Malware.pdf 19-Mar-2014 04:10 267K
The Bite of the Computer Virus.pdf 19-Mar-2014 04:27 3908
The Blaster Worm - The View from 10,000 feet.pdf 19-Mar-2014 04:24 830K
The Brains Behind the Operation.pdf 19-Mar-2014 04:27 21K
The Bulgarian Computer Virus Factory.pdf 19-Mar-2014 04:27 9778
The Bulgarian and Soviet Virus Factories.pdf 19-Mar-2014 04:17 213K
The Case for Beneficial Computer Viruses and Wo..> 19-Mar-2014 04:18 43K
The Case for Using Layered Defenses to Stop Wor..> 19-Mar-2014 04:23 174K
The Challenge of Being Prepared for Tomorrows M..> 19-Mar-2014 04:18 42K
The Code Red Worm.pdf 19-Mar-2014 04:03 148K
The Code of Life A look at emerging Artificial ..> 19-Mar-2014 04:21 154K
The Computer Virus -- From There to Here.pdf 19-Mar-2014 04:22 211K
The Computer Virus Culture.pdf 19-Mar-2014 04:28 77K
The Cornell Commission On Morris and the Worm.pdf 19-Mar-2014 04:13 404K
The Costly Implications of Consulting in a Viru..> 19-Mar-2014 04:23 458K
The Danger Theory and Its Application to Artifi..> 19-Mar-2014 04:26 210K
The Dangers of Computer Viruses Implications fo..> 19-Mar-2014 04:30 9M
The Design Space of Metamorphic Malware.pdf 19-Mar-2014 04:17 102K
The Ecology of Malware.pdf 19-Mar-2014 04:14 150K
The Effect of DNS Delays on Worm Propagation in..> 19-Mar-2014 04:05 175K
The Emergence of the Posthuman Consumer and the..> 19-Mar-2014 04:30 1M
The Engine of the Underground The Elite-Kiddie ..> 19-Mar-2014 04:24 159K
The Evolution of Viruses and Worms.pdf 19-Mar-2014 04:22 133K
The Evolution of the Computer Virus.pdf 19-Mar-2014 04:02 62K
The Evolving Virus Threat.pdf 19-Mar-2014 04:18 46K
The Father Christmas worm.pdf 19-Mar-2014 04:26 570K
The Future of Bot Worms.pdf 19-Mar-2014 04:29 61K
The Future of Internet Worms.pdf 19-Mar-2014 04:19 190K
The Future of Malware.pdf 19-Mar-2014 04:25 81K
The Giant Black Book of Computer Viruses (2nd e..> 19-Mar-2014 04:26 2M
The Giant Black Book of Computer Viruses.pdf 19-Mar-2014 04:30 6M
The Impact of Computer Viruses on Society.pdf 19-Mar-2014 04:24 333K
The Impact of Countermeasure Propagation on the..> 19-Mar-2014 04:21 581K
The Impact of Countermeasure Spreading on the P..> 19-Mar-2014 04:24 124K
The Internet Motion Sensor A Distributed Blackh..> 19-Mar-2014 04:27 646K
The Internet Worm Crisis and Aftermath.pdf 19-Mar-2014 04:27 1M
The Internet Worm Incident.pdf 19-Mar-2014 04:17 100K
The Internet Worm Program An Analysis.pdf 19-Mar-2014 04:30 2M
The Java mobile risk.pdf 19-Mar-2014 04:23 127K
The Latest Malware Threats Against Your PC.pdf 19-Mar-2014 04:30 511K
The Legislative Response to the Evolution of Co..> 19-Mar-2014 04:21 215K
The Little Black Book Of Computer Virus.pdf 19-Mar-2014 04:26 1M
The Little Black Book of Computer Viruses.pdf 19-Mar-2014 04:27 1M
The More Things Change....pdf 19-Mar-2014 04:28 73K
The Norman Book on Computer Viruses.pdf 19-Mar-2014 04:29 388K
The Pathology of Computer Viruses.pdf 19-Mar-2014 04:25 1M
The Race Against Malicious Software.pdf 19-Mar-2014 04:16 50K
The Real Cost of a Virus Outbreak.pdf 19-Mar-2014 04:02 62K
The Rise of AutoRunBased Malware.pdf 19-Mar-2014 04:30 2M
The Risk of Debug Codes in Batch what are debug..> 19-Mar-2014 04:22 184K
The Role of Internet Service Providers in Botne..> 19-Mar-2014 04:26 1M
The SASSER Event History and Implications.pdf 19-Mar-2014 04:28 653K
The Shockwave Rider.pdf 19-Mar-2014 04:28 1M
The Social Psychology of Computer Viruses and W..> 19-Mar-2014 04:03 148K
The Use of Heuristics in Identifying Self-Propa..> 19-Mar-2014 04:28 2M
The Virtual Artaud Computer Virus as Performanc..> 19-Mar-2014 04:18 321K
The Virus Hunter.pdf 19-Mar-2014 04:12 111K
The Virus Underground.pdf 19-Mar-2014 03:03 90K
The Virus is Worse than the Cure.pdf 19-Mar-2014 04:15 120K
The WiT virus A virus built on the ViT ELF viru..> 19-Mar-2014 04:07 419K
The Worm Programs - Early Experience with a Dis..> 19-Mar-2014 04:29 870K
The Worm Programs--Early Experience with a Dist..> 19-Mar-2014 04:27 925K
The Zombie Roundup Understanding, Detecting, an..> 19-Mar-2014 04:20 212K
The biology of digital organisms.pdf 19-Mar-2014 04:18 42K
The cause and effects of computer viruses.pdf 19-Mar-2014 04:27 31K
The dynamics of computer virus infection.pdf 19-Mar-2014 04:26 205K
The future of virus detection.pdf 19-Mar-2014 04:26 113K
The geneology of malware.pdf 19-Mar-2014 04:27 785K
The impact of Microsoft Windows infection vecto..> 19-Mar-2014 04:14 593K
The malware naming chaos.pdf 19-Mar-2014 04:29 59K
The metamorphosis of malware writers.pdf 19-Mar-2014 04:02 83K
The missing LNK.pdf 19-Mar-2014 04:16 47K
The motivation behind computer viruses.pdf 19-Mar-2014 04:26 97K
The road less truvelled.pdf 19-Mar-2014 04:28 39K
The solution in the naming chaos.pdf 19-Mar-2014 04:27 135K
The worm that turned A social use of computer v..> 19-Mar-2014 04:24 3M
The wormpipe strikes back.pdf 19-Mar-2014 04:26 64K
TheV-Files A dictionary of file threats.pdf 19-Mar-2014 04:27 135K
The_20Little_20Black_20Book_20of_20Computer_20V..> 19-Mar-2014 04:25 1M
There Are No Safe Virus Tests.pdf 19-Mar-2014 04:26 209K
There Is No Ideal Virus Scanner.pdf 19-Mar-2014 04:23 183K
Those ubiquitous viruses.pdf 19-Mar-2014 04:18 43K
Thoughts about Cross-View based Rootkit Detecti..> 19-Mar-2014 04:17 99K
Threat Intelligence Gathering, Malware Collecti..> 19-Mar-2014 04:27 810K
Threats to Digitization Computer Virus.pdf 19-Mar-2014 04:02 89K
Throttling Viruses Restricting propagation to d..> 19-Mar-2014 04:04 122K
Time machine.pdf 19-Mar-2014 04:27 32K
Timing Rootkits.pdf 19-Mar-2014 04:29 60K
To catch Efish.pdf 19-Mar-2014 04:29 60K
Tools for Finding and Removing Rootkits.pdf 19-Mar-2014 04:25 418K
Toward an abstract computer virology.pdf 19-Mar-2014 04:12 189K
Towards Automated Defense from Rootkit Attacks.pdf 19-Mar-2014 04:15 164K
Towards Stealthy Malware Detection.pdf 19-Mar-2014 04:27 861K
Towards Systematic Evaluation of the Evadabilit..> 19-Mar-2014 04:24 314K
Towards an undetectable computer virus.pdf 19-Mar-2014 04:29 1M
Trap E-mail Address for Combating E-mail Viruse..> 19-Mar-2014 04:05 70K
Trapping Viruses.pdf 19-Mar-2014 04:26 68K
Treating scalability and modelling human counte..> 19-Mar-2014 04:28 290K
Trends in Viruses and Worms.pdf 19-Mar-2014 04:14 165K
Trends of Spyware, Viruses and Exploits.pdf 19-Mar-2014 04:28 78K
Trojan White Paper.pdf 19-Mar-2014 04:24 2M
Trojans Worms and Spyware A Computer Security P..> 19-Mar-2014 04:29 1M
Tumours and polips.pdf 19-Mar-2014 04:26 67K
Turing Machines and Undecidability with Special..> 19-Mar-2014 04:29 284K
Twinkle, twinkle little star.pdf 19-Mar-2014 04:29 60K
Two Bills Equal Forewarning.pdf 19-Mar-2014 04:24 323K
USC-OIA Special Virus Report.pdf 19-Mar-2014 04:26 643K
Ukrainian-Russian Hackers the Stealth Group and..> 19-Mar-2014 04:16 256K
Un combate con el Kerado.pdf 19-Mar-2014 04:28 41K
Understanding Computer Viruses.pdf 19-Mar-2014 04:20 779K
Understanding Virus Behavior in 32-bit Operatin..> 19-Mar-2014 04:26 65K
Understanding and Managing Polymorphic Viruses.pdf 19-Mar-2014 04:12 94K
Unexpected Resutls [sic].pdf 19-Mar-2014 04:28 39K
Universal Procedures to Protect Against Compute..> 19-Mar-2014 04:27 6318
Unknown Computer Virus Detection Inspired by Im..> 19-Mar-2014 04:19 430K
Unknown Malcode Detection and the Imbalance Pro..> 19-Mar-2014 04:30 1M
Unknown Malcode Detection via Text Categorizati..> 19-Mar-2014 04:23 171K
Unknown Malicious Code Detection # Practical Is..> 19-Mar-2014 04:25 162K
Unpredictable Legacies Viral Games in the Netwo..> 19-Mar-2014 04:30 200K
Use of an Attenuated Computer Virus as a Mechan..> 19-Mar-2014 04:14 320K
User-mode memory scanning on 32-bit & 64-bit wi..> 19-Mar-2014 04:21 262K
Using Code Normalization for Fighting Self-Muta..> 19-Mar-2014 04:06 121K
Using Engine Signature to Detect Metamorphic Ma..> 19-Mar-2014 04:07 266K
Using Entropy Analysis to Find Encrypted and Pa..> 19-Mar-2014 04:10 467K
Using Formal Grammar and Genetic Operators to E..> 19-Mar-2014 04:30 388K
Using Malware to Improve Software Quality and S..> 19-Mar-2014 04:07 160K
Using Markov Chains to Filter Machine-morphed V..> 19-Mar-2014 04:26 96K
Using Plant Epidemiological Methods To Track Co..> 19-Mar-2014 04:29 2M
Using Predators to Combat Worms and Viruses A S..> 19-Mar-2014 04:23 572K
Using Qualia and Hierarchical Models in Malware..> 19-Mar-2014 04:29 141K
Using Spatio-Temporal Information in API Calls ..> 19-Mar-2014 04:30 513K
Using Support Vector Machine to Detect Unknown ..> 19-Mar-2014 04:03 359K
Using Verification Technology to Specify and De..> 19-Mar-2014 04:25 81K
Using Virtualisation to Protect Against Zero-Da..> 19-Mar-2014 04:30 1M
Using biological models to improve innovation s..> 19-Mar-2014 04:30 201K
Using the KBTA method for inferring computer an..> 19-Mar-2014 04:27 2M
Utilizing Entropy to Identify Undetected Malwar..> 19-Mar-2014 04:14 491K
VIRUS, Very Important Resource Under Siege.pdf 19-Mar-2014 04:28 38K
VT Integrity Services for Networking.pdf 19-Mar-2014 04:13 608K
VX Reversing I, the basics.pdf 19-Mar-2014 04:26 113K
VX Reversing II, Sasser.B.pdf 19-Mar-2014 04:27 92K
Viral Attacks On UNIX System Security.pdf 19-Mar-2014 04:27 669K
Viral Bodies, Virtual Practices.pdf 19-Mar-2014 04:26 632K
Viral Evolution.pdf 19-Mar-2014 04:23 128K
Viral Style Technology, Culture, and the Politi..> 19-Mar-2014 04:27 36K
Viral polymorphism.pdf 19-Mar-2014 04:07 161K
Virentechniken Analyse und Metamorphismus.pdf 19-Mar-2014 04:02 64K
Virii Generators Understanding the Threat.pdf 19-Mar-2014 04:23 282K
Virology 101.pdf 19-Mar-2014 04:27 21K
Virology_101(Usenix).pdf 19-Mar-2014 04:29 359K
Virus Detection System - VDS.pdf 19-Mar-2014 04:06 575K
Virus Inoculation on Social Graphs The Friendsh..> 19-Mar-2014 04:26 217K
Virus Prevention Without Signatures.pdf 19-Mar-2014 04:25 531K
Virus Prevention, Cure and Hoaxes.pdf 19-Mar-2014 04:26 114K
Virus Protection.pdf 19-Mar-2014 04:25 80K
Virus Scanners for Multiple OSes.pdf 19-Mar-2014 04:27 348K
Virus Spread in Networks.pdf 19-Mar-2014 04:12 436K
Virus Techniques.pdf 19-Mar-2014 04:29 402K
Virus Trends 2003-2004.pdf 19-Mar-2014 04:27 9566
Virus Tutorial.pdf 19-Mar-2014 04:27 3M
Virus Verification and Removal Tools and Techni..> 19-Mar-2014 04:16 147K
Virus Writers 360.pdf 19-Mar-2014 04:21 369K
Virus Writers The End of The Innocence.pdf 19-Mar-2014 04:13 109K
Virus als Metapher.pdf 19-Mar-2014 04:30 2M
Virus attack - how computer networks could heal..> 19-Mar-2014 04:26 97K
Virus authors faster to the kill.pdf 19-Mar-2014 04:29 142K
Virus detection using datamining techniques.pdf 19-Mar-2014 04:29 297K
Virus ex machina res ipsa loquitur.pdf 19-Mar-2014 04:19 568K
VirusMeter Preventing Your Cellphone from Spie..> 19-Mar-2014 04:23 463K
Viruses & spam fuel new laws.pdf 19-Mar-2014 04:05 156K
Viruses 101.pdf 19-Mar-2014 04:27 92K
Viruses Are Beginning to Get to Me!.pdf 19-Mar-2014 04:26 116K
Viruses Are Not Speech.pdf 19-Mar-2014 04:28 79K
Viruses Bottleneck Prosecution.pdf 19-Mar-2014 04:12 349K
Viruses Revealed Understanding and Counter Mali..> 19-Mar-2014 04:30 50M
Viruses That Intricate Yarn.pdf 19-Mar-2014 04:27 93K
Viruses a concern for all of us.pdf 19-Mar-2014 04:30 59K
Viruses and Computer Security.pdf 19-Mar-2014 04:18 185K
Viruses and Criminal Law.pdf 19-Mar-2014 04:21 729K
Viruses and Lotus Notes- Have the Virus Writers..> 19-Mar-2014 04:27 204K
Viruses and Worms The Best Defense is Awareness..> 19-Mar-2014 04:29 277K
Viruses and Worms The Inside Story.pdf 19-Mar-2014 04:20 414K
Viruses and Worms--What Can You Do.pdf 19-Mar-2014 04:24 1M
Viruses and Worms.pdf 19-Mar-2014 04:25 311K
Viruses and the Law.pdf 19-Mar-2014 04:21 155K
Viruses in France The French Connection - II.pdf 19-Mar-2014 04:06 121K
Viruses using .NET Framework.pdf 19-Mar-2014 04:28 40K
Viruses, Worms, Zombies, and other Beasties.pdf 19-Mar-2014 04:30 1M
Viruses, Worms, and Trojan Horses Serious Crime..> 19-Mar-2014 04:14 142K
Visualizing Windows Executable Viruses Using Se..> 19-Mar-2014 04:26 531K
Vulnerabilities as monsters the cultural founda..> 19-Mar-2014 04:26 67K
Vx-trading.pdf 19-Mar-2014 04:29 71K
WORM AND VIRUS DEFENSE HOW CAN WE PROTECT THE N..> 19-Mar-2014 04:30 6M
Warnings of a Dark Future The Emergence of Mach..> 19-Mar-2014 04:27 93K
Web Sites Hawk Instructions On Making Computer ..> 19-Mar-2014 04:27 8691
What is Wild.pdf 19-Mar-2014 04:02 83K
What's in a Name.pdf 19-Mar-2014 04:16 59K
What's the difference between a Virus, Worm, an..> 19-Mar-2014 04:27 22K
When Computer Viruses Strike.pdf 19-Mar-2014 04:23 130K
When Java Was One Threats From Hostile Byte Cod..> 19-Mar-2014 04:29 38K
When Malware Meets Rootkits.pdf 19-Mar-2014 04:30 493K
Where have the worms and viruses gone - new tre..> 19-Mar-2014 03:03 91K
White-box attack context cryptovirology.pdf 19-Mar-2014 04:12 301K
Why Anti-Virus Software Cannot Stop the Spread ..> 19-Mar-2014 03:48 129K
Wiley.The.Database.Hackers.Handbook.Defending.D..> 19-Mar-2014 04:36 1M
Win XP Hacks oreilly 2003.chm 19-Mar-2014 04:30 5M
WinXP SP1 Hack.pdf 19-Mar-2014 04:05 8796
Windows Rootkit Overview.pdf 19-Mar-2014 04:27 95K
Windows Rootkits.pdf 19-Mar-2014 04:16 146K
Windows Server Hacks.chm 19-Mar-2014 04:40 2M
Winning the battles, losing the war Rethinking ..> 19-Mar-2014 04:27 139K
With Microscope and Tweezers An Analysis of the..> 19-Mar-2014 04:23 193K
With Microscope and Tweezers The Worm from MITS..> 19-Mar-2014 04:27 1M
Worm Analysis through Computer Simulation.pdf 19-Mar-2014 04:15 318K
Worm Anatomy and Model.pdf 19-Mar-2014 04:21 267K
Worm Defense System for Enterprise Networks.pdf 19-Mar-2014 04:30 143K
Worm Detection Using Local Networks.pdf 19-Mar-2014 04:20 372K
Worm Epidemics in High-Speed Networks.pdf 19-Mar-2014 04:29 145K
Worm Epidemiology.pdf 19-Mar-2014 04:30 352K
Worm Hotspots Explaining Non-Uniformity in Worm..> 19-Mar-2014 04:20 383K
Worm Meets Beehive.pdf 19-Mar-2014 04:17 298K
Worm Propagation Modeling and Analysis under Dy..> 19-Mar-2014 04:08 253K
Worm wars.pdf 19-Mar-2014 04:10 447K
Worms of the future.pdf 19-Mar-2014 04:18 192K
Writing disassembler.pdf 19-Mar-2014 04:27 27K
Xbox-hack - AIM-2002-008.pdf 19-Mar-2014 04:32 515K
Yahoo.Hacks.Oct.2005.chm 19-Mar-2014 04:41 7M
You've got M()a(D)i(L+K)l.pdf 19-Mar-2014 04:28 41K
Young Nussbaum Monin PSPB 2007.pdf 19-Mar-2014 04:23 194K
Zero-hour, Real-time Computer Virus Defense thr..> 19-Mar-2014 04:05 70K
Zeroing in on Metamorphic Computer Viruses.pdf 19-Mar-2014 04:30 402K
Zmist Opportunities.pdf 19-Mar-2014 04:15 119K
amazon-hacks.chm 19-Mar-2014 03:26 3M
bsd-hacks.pdf 19-Mar-2014 03:31 2M
cracking-sql-passwords.pdf 19-Mar-2014 03:27 160K
creation dun Web Worm.pdf 19-Mar-2014 04:05 155K
database hacker handbook.chm 19-Mar-2014 03:22 1M
eBooks.OReilly.-.Wireless.Hacks.100.Industrial...> 19-Mar-2014 03:30 4M
ebay-hacks-100-industrial-strength-tips-and-too..> 19-Mar-2014 03:31 4M
ethical hacking, student guide.pdf 19-Mar-2014 03:31 7M
excel-hacks.chm 19-Mar-2014 03:31 3M
google-hacks.pdf 19-Mar-2014 03:31 3M
hacker ethic.pdf 19-Mar-2014 03:31 13M
hacking the windows registry .pdf 19-Mar-2014 03:48 222K
linux-server-hacks.pdf 19-Mar-2014 04:42 33M
little_black_book_oc_computer_viruses.pdf 19-Mar-2014 04:32 1M
mac-os-hacks.chm 19-Mar-2014 04:42 9M
network-security-hacks.chm 19-Mar-2014 04:42 2M
online-investing-hacks.chm 19-Mar-2014 04:40 5M
polyunpack.pdf 19-Mar-2014 04:18 372K
spidering-hacks.chm 19-Mar-2014 04:27 1M
tivo-hacks.100-industrial-strength-tips-and-too..> 19-Mar-2014 04:42 9M
u23_Wiley - Hacking GPS - 2005 - (By Laxxuss).pdf 19-Mar-2014 04:42 10M