Information Flow: The Secret to Studio Structure
(design3.com)
November 2011 Archive
14071.
14072.
Visualizing Interesting Log Events Using Splunk’s Google Maps Application
(danielmiessler.com)
14073.
CAPTCHA Hax with TesserCap
(blog.opensecurityresearch.com)
14074.
Ballmer shoots down Microsoft breakup advice
(theregister.co.uk)
14075.
The Curious Case Of Unpatchable Vulnerabilities
(darkreading.com)
14076.
Phaxio: Getting Your Own Copy of a Fax!
(blog.phaxio.com)
14077.
Apple OS X Sandbox Predefined Profiles Bypass
(coresecurity.com)
14078.
14079.
Facebook Attachment Vulnerability Revisited
(blog.opensecurityresearch.com)
14080.
14081.
2011 Apache CouchDB Community Survey
(surveymonkey.com)
14082.
Pro Flight Simulator Review
(proflightsimulatorshop.blogspot.com)
14083.
An Interview With Greg Burney Of #DrawMyFollowers
(blog.attentionusa.com)
14084.
Chinese Hacking BBS (Google Translate)
(translate.google.ru)
14085.
Duqu: New method of injection
(blog.w4kfu.com)
14086.
A General Model for Hiding Control Flow
(cosic.esat.kuleuven.be)
14087.
Derbycon 2011 Videos
(irongeek.com)
14088.
Bakken formation
(en.wikipedia.org)
14089.
Joomla 1.5.25/1.7.3 Released (Security Update)
(blog.sucuri.net)
14090.
Android Malware Analysis
(resources.infosecinstitute.com)
14091.
Eight Ways to be Your Own Worst Enemy for Funding
(caycon.com)
14092.
The Apple System Log – Part 1
(crucialsecurityblog.harris.com)
14093.
Supergiant Games talks about the production of Bastion
(tideart.com)
14094.
Parsing NTFS INDX Files with Python
(williballenthin.com)
14095.
Five Steps to Incident Management in a Virtualized Environment
(resources.infosecinstitute.com)
14096.
Windows Memory Acquisition with DumpIt
(blog.zeltser.com)
14097.
Breakthrough could improve battery capacity and charge time by 10
(techcrunch.com)
14098.
Sniffing Passwords Over a Wifi Connection
(hackavision.com)
14100.
Addicted Gamers May Have Physiological Differences In The Brain
(techcrunch.com)