0

http://blog.ksplice.com

We think that it's important for developers and system administrators to be more knowledgeable about the attacks that black hats regularly use to take control of systems, and so, today, we're going to start from where we left off and go all the way to a working exploit for a NULL pointer dereference in a toy kernel module.

Full story »
beckham's picture
Created by beckham 12 years 6 weeks ago
Category: High End   Tags:

Best karma users