Search


PDF Archive search engine
Last database update: 17 May at 11:24 - Around 76000 files indexed.


Show results per page

Results for «exploit»:


Total: 600 results - 0.02 seconds

How Facebook Exploits Human Psychology 100%

The exploitation of user data is one thing, but to intentionally exploit the human psyche is a whole other.

https://www.pdf-archive.com/2018/05/07/how-facebook-exploits-human-psychology/

07/05/2018 www.pdf-archive.com

HP Cyber Risk Report 2015 Infographic 95%

Attackers Focusing on Older Vulnerabilities 8227 days from launch of first Windows version affected by CVE-2014-4114 (“Sandworm”) vulnerability to release of the patch - April 16, 1992 to October 14, 2014 33% of all exploit samples discovered Top Exploits Discovered in 2014 in 2014 used an infection vector first detected in use in 2010, in Stuxnet CVE-2010-2568 CVE-2010-0188 CVE-2013-2422 59 22% CVE-2012-1723 33% 33% CVE-2012-0507 2% CVE-2012-0158 2% CVE-2013-2465 3% CVE-2012-4681 3% combined maximum age, in years, of the code in the high-profile Heartbleed, Shellshock, and POODLE zero-days 4% 4% 7% 9% CVE-2013-2423 7 of the top 10 exploits found overall in 2014 CVE-2009-3129 11% Others targeted vulnerabilities over 2 years old Server Misconfigurations Top Vulnerability List 2013 80% 68% 60% 60% 58% 40% 53% VS.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-infographic/

16/03/2015 www.pdf-archive.com

HP Cyber Risk Report 2015 Executive Summary 94%

Regular penetration testing and verification of configurations by internal and external entities can identify configuration errors before attackers exploit them.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-executive-summary/

16/03/2015 www.pdf-archive.com

HOODSUP 93%

https://www.pdf-archive.com/2013/07/17/hoodsup/

17/07/2013 www.pdf-archive.com

HP Cyber Risk Report 2015 92%

HPSR brings together data and research to produce a detailed picture of both sides of the security coin—the state of the vulnerabilities and threats comprising the attack surface, and, on the flip side, the ways adversaries exploit those weaknesses to compromise victims.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015/

16/03/2015 www.pdf-archive.com

Graham Sutherland-SpectreMeltdownExplainer 90%

First Two Exploits There are three ways to exploit this behaviour.

https://www.pdf-archive.com/2018/01/04/graham-sutherland-spectremeltdownexplainer/

04/01/2018 www.pdf-archive.com

Byron picket leaflet2 90%

Brazilian, Spanish, Polish, Italian, Nepalese and Albanians.” Byron Burgers are content to exploit undocumented workers when it suits them, but as soon as it becomes inconvenient, will subject them to deportation, ruining their lives.

https://www.pdf-archive.com/2016/07/29/byron-picket-leaflet2/

29/07/2016 www.pdf-archive.com

BabyFirst TV - Photo Release 88%

copyright the same, in BABYFIRSTTV’s own name or otherwise, and to use, re-use, exploit, publish and re-publish the Photograph, in whole or in part, individually or in conjunction with other materials, and to modify, crop, alter, distort, edit or retouch reproductions of the Photograph, in any and all media, whether now known or hereinafter devised.

https://www.pdf-archive.com/2015/11/25/babyfirst-tv-photo-release/

25/11/2015 www.pdf-archive.com

iasc annual report 2016 2017 data 88%

42 | Independent Anti-Slavery Commissioner:

https://www.pdf-archive.com/2018/03/13/iasc-annual-report-2016-2017-data/

13/03/2018 www.pdf-archive.com

Milone Trade Corporation Preliminary Policy Review 88%

Milone Trade aims to form a corporation that can effectively exploit the most lucrative available site while scaling for unhindered growth and maintaining resiliency against the hostile nature of New Eden.

https://www.pdf-archive.com/2015/03/08/milone-trade-corporation-preliminary-policy-review/

08/03/2015 www.pdf-archive.com

Dakash-Abilities 88%

Extra Arcanist Exploit (Arcanist) Feat Your repertoire of arcanist exploits expands.

https://www.pdf-archive.com/2017/04/21/dakash-abilities/

21/04/2017 www.pdf-archive.com

sentencing memo usa 88%

Congress has found such severe penalties necessary because child pornography is a multimillion dollar industry run by a nationwide network of individuals who openly advertis[e] their desire to exploit children and to traffic in child pornography.

https://www.pdf-archive.com/2016/09/15/sentencing-memo-usa/

15/09/2016 www.pdf-archive.com

Google patches critical media 87%

One of the critical vulnerabilities is located in mediaserver, a core part of the operating system, and can be exploited to execute arbitrary code with privileges that third­party applications are not supposed to have. Attackers can exploit the flaw remotely by tricking users into playing specifically crafted media files in their browsers or by sending them via multimedia message (MMS).

https://www.pdf-archive.com/2015/12/14/google-patches-critical-media/

14/12/2015 www.pdf-archive.com

Knowledge-Base-Management 86%

Automated Knowledge Base Management:

https://www.pdf-archive.com/2018/05/07/knowledge-base-management/

07/05/2018 www.pdf-archive.com

OperationFlickerReportsJuly2010pdf 86%

Military, that have subscribed to websites that contain child pornographic images or other material that exploit children via the internet.

https://www.pdf-archive.com/2015/03/16/operationflickerreportsjuly2010pdf/

16/03/2015 www.pdf-archive.com

BTS SIO Option SISR 86%

FORMATION-INDUSTRIES-LR.FR inscrivez-vous sur YPAREO >

https://www.pdf-archive.com/2020/01/31/bts-sio-option-sisr/

31/01/2020 www.pdf-archive.com

Common Announcement MECYO 2015 84%

Being divided never benefits us, but always benefits those who exploit and oppress us.

https://www.pdf-archive.com/2015/03/11/common-announcement-mecyo-2015/

11/03/2015 www.pdf-archive.com