Nice work by Thinkst Applied Research, he is making an interactive timeline of the history of memory corruption vulnerabilities and exploit techniques. You can submit events using this form
Tuesday, June 1, 2010
Memory Corruption and Hacker Folklore
Posted by them at 1:07 PM 0 comments
Subscribe to:
Posts (Atom)