:: A Guide to Kernel Exploitation :: Attacking the Core With the increasing number of security countermeasures against user land exploitation, kernel level exploitation is getting more and more popular among attackers and, generically, exploit writers. Playing with the heart of the operating system can be a dangerous game: this book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (Unix-derivate, Mac OS X, Windows). Attackingthecore.com~Site InfoWhoisTrace RouteRBL Check
NETK5 - IT Services, Installations, Consulting NETK5 provides IT Services, Computer Network Installation, Data Recovery and Maintenance in China (Shanghai, Beijing, Guangzhou, Shenzhen) and Asia. We focus on quality, reliabiliy and documented processes.
NETK5 is a founding member of Combyne-IT. Netk5.com~Site InfoWhoisTrace RouteRBL Check