Hack, code and drink some țuică. Personal blog of Victor Dorneanu.
Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit
How We Decoded Some Nasty Multi-Level Encoded Malware
LAYER 7 DDOS ATTACKS: DETECTION & MITIGATION
Bypassing Internet Explorers Anti-Cross Site Scripting Filter
On the 1st of January, 1998, Bjarne Stroustrup gave an interview to the IEEE Computer magazine.
AnalyzePDF - Bringing the Dirt Up to the Surface
The Difference Between Encoding, Encryption, and Hashing