Essays about: "Security Scanning Tools"
Showing result 11 - 13 of 13 essays containing the words Security Scanning Tools.
-
11. A Survey of Automated Tools for Probing Vulnerable Web Applications
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The development of web applications have increased exceedingly in the last few years. Without the concern of security development, these web applications are exposed to a great amount of cyber threats. READ MORE
-
12. Debug register rootkits : A study of malicious use of the IA-32 debug registers
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : The debug register rootkit is a special type of rootkit that has existed for over a decade, and is told to be undetectable by any scanning tools. It exploits the debug registers in Intel’s IA-32 processor architecture. READ MORE
-
13. Debug register rootkits : A study of malicious use of the IA-32 debug registers
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : The debug register rootkit is a special type of rootkit that has existed for over a decade, and is told to be undetectable by any scanning tools. It exploits the debug registers in Intel’s IA-32 processor architecture. READ MORE