Tuesday, June 1, 2010

Memory Corruption and Hacker Folklore


Nice work by Thinkst Applied Research, he is making an interactive timeline of the history of memory corruption vulnerabilities and exploit techniques. You can submit events using this form

No comments: