Nice work by Thinkst Applied Research, he is making an interactive timeline of the history of memory corruption vulnerabilities and exploit techniques. You can submit events using this form
Tuesday, June 1, 2010
Memory Corruption and Hacker Folklore
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment