skip to main
|
skip to sidebar
Security Monkey
Search
Home
About
Subscribe
Contact
Log In
Wednesday, January 19, 2011
Application whitelisting paper
Really good paper on the effectiveness of application whitelisting and the practical implications and limitations of it.
Paper here
0 comments:
Post a Comment
Newer Post
Older Post
Home
Search This Blog
Blog Archive
►
2012
(2)
►
February
(1)
►
January
(1)
▼
2011
(11)
►
June
(2)
►
April
(4)
►
February
(1)
▼
January
(4)
Egypt severs Internet connection
Bypassing Applicatio/DLL whitelisting in SRP and A...
Application whitelisting paper
Wipe a disk using dd
►
2010
(79)
►
December
(4)
►
November
(2)
►
October
(11)
►
September
(9)
►
August
(1)
►
June
(2)
►
May
(6)
►
April
(11)
►
March
(7)
►
February
(19)
►
January
(7)
►
2009
(62)
►
December
(2)
►
November
(4)
►
October
(7)
►
September
(6)
►
August
(2)
►
July
(6)
►
June
(3)
►
May
(11)
►
April
(4)
►
March
(2)
►
February
(8)
►
January
(7)
►
2008
(99)
►
December
(23)
►
November
(5)
►
October
(2)
►
September
(8)
►
August
(9)
►
July
(4)
►
June
(17)
►
May
(25)
►
March
(6)
Labels
dns_monitoring
(1)
education
(2)
firewall
(1)
forensic
(6)
geo location
(1)
howto
(1)
incident response
(8)
internet
(3)
IP
(1)
iptables
(1)
joke
(1)
linux
(1)
netwitness
(1)
network
(2)
passwords
(1)
privacy
(2)
procedure
(3)
process
(3)
router
(1)
safety
(4)
security
(4)
standards
(3)
timeline
(2)
usb
(1)
vulnerability
(2)
Powered by
Blogger
.
0 comments:
Post a Comment