Jerry
  Virtualization technique for the Security of Web & Application
 
 
 
 Xpl017Elz
  New Ways to Attack Applications of OS Under Exechield
 
 
 
 George Neville-Neil
  Network Protocol Security Testing with the Packet Construction
 
 
 
 Han Chang kyu 
  Way & Process to Analyze Polymorphic Virus
 
 
 
 Grugq
  VoIPhreaking
 
 
 
 Loafers
  Ways to Protect from Runtime Format String Attacks through ..
 
 
 
 SunBing
  How to Implement a Virtual Machine Based Rootkit
 
 
 
 Ryan
  ActiveX Control and Web Application Security
 
 
 
 Lukas Grunwald
  Attacking RFID Systems