blog.boos.core-dumped.info
nonlinear blog: July 2011
http://blog.boos.core-dumped.info/2011_07_01_archive.html
Information Security and more . Tuesday, July 12, 2011. TiddlyWiki Dropbox = Personal Synchronized Wiki. The most notable way to handle all this information is using a personal Wiki. That allows the creation and editing of any number of interlinked. Via a web browser. Using a simplified markup language. Wikis are typically powered by wiki software. And are often used collaboratively. By multiple users. Examples include community websites, corporate intranets. That people around the world. Also it's an he...
github.com
boos (Roberto Martelloni) · GitHub
https://github.com/boos
Expat from Milan, Italy to Dublin, Ireland. X62;oos@core-dumped.info. Http:/ boos.core-dumped.info. Dec 20, 2010. Core Infrastructure Initiative Best Practices Badge. Some sample code snips that I used to learn more about a language. Static analysis of C/C code. 45 contributions in the last year. Summary of pull requests, issues opened, and commits. Learn how we count contributions. Boos has no activity during this period. You can't perform that action at this time. To refresh your session.
blog.boos.core-dumped.info
nonlinear blog: PAPER: Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces
http://blog.boos.core-dumped.info/2013/07/paper-behavioral-clustering-of-http.html
Information Security and more . Tuesday, July 2, 2013. PAPER: Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. I've recently read another paper. For the first week quiz of Coursera course 'Malicious Software and its Underground Economy: Two Sides to Every Story" and I'm happy to share it with you. Roberto Perdiscia, Wenke Leea , and Nick Feamstera. Subscribe to: Post Comments (Atom). View my complete profile. PAPER: Mining the Network Behavior of Bots.
blog.boos.core-dumped.info
nonlinear blog: PAPER: From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware
http://blog.boos.core-dumped.info/2013/07/from-throw-away-traffic-to-bots.html
Information Security and more . Tuesday, July 2, 2013. PAPER: From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. I've recently read that paper. For the first week quiz of Coursera course 'Malicious Software and its Underground Economy: Two Sides to Every Story" and I'm happy to share it with you. Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee and David Dagon. Subscribe to: Post Comments (Atom). View my complete profile.
blog.boos.core-dumped.info
nonlinear blog: Malicious Software and its Underground Economy: Two Sides to Every Story @ Coursera
http://blog.boos.core-dumped.info/2013/07/malicious-software-and-its-underground.html
Information Security and more . Monday, July 1, 2013. Malicious Software and its Underground Economy: Two Sides to Every Story @ Coursera. Everyone of you know what Coursera is and I'm very happy that on Cousera platform from the first of Jun is available a specific course about malwares. The course name is:. Malicious Software and its Underground Economy: Two Sides to Every Story. If you don't known what Coursera is here a little clip from the about page. Malicious software (malware) is the traditional ...
en.wikipedia.org
Bluesnarfing - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Bluesnarfing
From Wikipedia, the free encyclopedia. This article needs additional citations for verification. Please help improve this article. By adding citations to reliable sources. Unsourced material may be challenged and removed. Learn how and when to remove this template message. Is the unauthorized access of information from a wireless device through a Bluetooth. Via a brute force attack. As with all brute force attacks, the main obstacle to this approach is the sheer number of possible MAC addresses. Blue...
blog.boos.core-dumped.info
nonlinear blog: PAPER: Mining the Network Behavior of Bots
http://blog.boos.core-dumped.info/2013/07/paper-mining-network-behavior-of-bots.html
Information Security and more . Tuesday, July 2, 2013. PAPER: Mining the Network Behavior of Bots. I've recently read another paper. For the first week quiz of Coursera course 'Malicious Software and its Underground Economy: Two Sides to Every Story" and I'm happy to share it with you. Lorenzo Cavallaro, Christopher Kruegel, and Giovanni Vigna. Subscribe to: Post Comments (Atom). View my complete profile. PAPER: Behavioral Clustering of HTTP-Based Malware. PAPER: Mining the Network Behavior of Bots.
blog.boos.core-dumped.info
nonlinear blog: PAPER: Know Your Enemy: Fast-Flux Service Networks
http://blog.boos.core-dumped.info/2013/07/paper-know-your-enemy-fast-flux-service.html
Information Security and more . Monday, July 1, 2013. PAPER: Know Your Enemy: Fast-Flux Service Networks. I've recently read that paper. From The Honeynet Project. To better understand what fast-flux is and I'm happy to share it with you. An Ever Changing Enemy Primary Authors:. Last Modified: 13 July, 2007. Changing, in some cases every few minutes. These constantly changing architectures make it much more difficult to track down criminal activities and shut down their operations. Was purposely infected...
blog.boos.core-dumped.info
nonlinear blog: PAPER: Your Botnet is My Botnet: Analysis of a Botnet Takeover
http://blog.boos.core-dumped.info/2013/08/paper-your-botnet-is-my-botnet-analysis.html
Information Security and more . Wednesday, August 21, 2013. PAPER: Your Botnet is My Botnet: Analysis of a Botnet Takeover. I've recently read another paper. For the first week quiz of Coursera course 'Malicious Software and its Underground Economy: Two Sides to Every Story" and I'm happy to share it with you. Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna. Subscribe to: Post Comments (Atom).
SOCIAL ENGAGEMENT