Search


PDF Archive search engine
Last database update: 25 January at 01:18 - Around 76000 files indexed.


Show results per page

Results for «vulnerable»:


Total: 500 results - 0.051 seconds

SSLServerTest 99%

P-384 (secp384r1) (384 bits) Good configuration POODLE OVER TLS The server is not vulnerable to POODLE over TLS.

https://www.pdf-archive.com/2018/04/22/sslservertest/

22/04/2018 www.pdf-archive.com

Ali Poster 99%

All transportation networks are vulnerable to disruptions, to some extent, with temporary or permanent effects.

https://www.pdf-archive.com/2018/04/26/ali-poster/

26/04/2018 www.pdf-archive.com

HP Cyber Risk Report 2015 Executive Summary 98%

However, these mitigations are not enough when they are built on inherently vulnerable legacy code.

https://www.pdf-archive.com/2015/03/16/hp-cyber-risk-report-2015-executive-summary/

16/03/2015 www.pdf-archive.com

Web Application Penetration Test 96%

DESCRIPTION I​ ​was​ ​successful​ ​at​ ​performing​ ​an​ ​attack​ ​on​ ​the​ ​application​ ​using​ ​a​ ​common​ ​password​ ​wordlist​ ​to perform​ ​a​ ​dictionary​ ​attack​ ​illustrating​ ​that​ ​the​ ​application​ ​was​ ​vulnerable​ ​to​ ​broken authentication.​ ​Generally​ ​an​ ​application​ ​that​ ​permits​ ​the​ ​use​ ​of​ ​brute-force​ ​and/or​ ​dictionary attacks,​ ​as​ ​well​ ​as​ ​permits​ ​the​ ​creation​ ​of​ ​weak​ ​or​ ​ineffective​ ​passwords​ ​is​ ​highly​ ​vulnerable​ ​to broken​ ​authentication.​ ​This​ ​application​ ​additionally​ ​has​ ​an​ ​ineffective​ ​platform​ ​for​ ​password recovery,​ ​which​ ​also​ ​exposes​ ​it​ ​to​ ​some​ ​level​ ​of​ ​risk​ ​regarding​ ​this​ ​vulnerability.

https://www.pdf-archive.com/2017/11/29/web-application-penetration-test/

29/11/2017 www.pdf-archive.com

Questions2 94%

Colombi’s lecture on climate change, why are Indigenous peoples “particularly exposed and sensitive to climate change impacts due to their resource-based livelihoods and the location of their homes in vulnerable environments”?

https://www.pdf-archive.com/2016/04/28/questions2/

28/04/2016 www.pdf-archive.com

poloniex 94%

POLONIEX Security review What is Poloniex?

https://www.pdf-archive.com/2016/10/15/poloniex/

15/10/2016 www.pdf-archive.com

Remote-File-Inclusion-Tutorial 94%

The first step is to find vulnerable site, you can easily find them using Google dorks.If you don't have any idea, you might want to read about advanced password hacking using Google dorks or to use automated tool to apply Google dorks using Google.

https://www.pdf-archive.com/2011/03/27/remote-file-inclusion-tutorial/

27/03/2011 www.pdf-archive.com

Remote-File-Inclusion-Tutorial 94%

The first step is to find vulnerable site, you can easily find them using Google dorks.If you don't have any idea, you might want to read about advanced password hacking using Google dorks or to use automated tool to apply Google dorks using Google.

https://www.pdf-archive.com/2011/03/26/remote-file-inclusion-tutorial/

26/03/2011 www.pdf-archive.com

nps71-070714-03 92%

HV transformers are also the most vulnerable to intentional damage from malicious acts.

https://www.pdf-archive.com/2015/02/22/nps71-070714-03/

22/02/2015 www.pdf-archive.com

ConfidentialityAndCancellationPolicy 90%

Abuse of Children and Vulnerable Adults If a client states or suggests that he or she is abusing a child (or vulnerable adult) or has recently abused a child (or vulnerable adult), or a child (or vulnerable adult) is in danger of abuse, the mental health professional is required to report this information to the appropriate social service and/or legal authorities.

https://www.pdf-archive.com/2016/03/23/confidentialityandcancellationpolicy/

23/03/2016 www.pdf-archive.com

poetry portfolio 88%

Vulnerable Hearing your soft voice again Made more vulnerable by your stuffy nose (I’ve always loved vulnerability in people) Stirs up things inside me I thought I’d buried These desires are immediate and sharp and selfish They swim around on the tip of my tongue like electricity And flash on my eyelids like frames of an old movie reel of my life I shoot them down with my higher thinking capabilities To have you again would be as easy as crushing a dry autumn leaf between my fingers But I wonder if some things are best left wilted by the summer heat.

https://www.pdf-archive.com/2012/10/25/poetry-portfolio/

25/10/2012 www.pdf-archive.com

KTMB REPORT 88%

16/3/2017 KTMB PENETRATION REPORT PENTESTER:

https://www.pdf-archive.com/2017/06/03/ktmb-report/

03/06/2017 www.pdf-archive.com

Identities-Report 88%

L ike an “identity mosaic”, people select and combine identity elements for transactions during the course of everyday life 36 VULNERABILITIES Everyone is vulnerable when identifying themselves—and ID systems can sometimes just shift, or even introduce new, vulnerabilities 37 Essay V1:

https://www.pdf-archive.com/2017/12/17/identities-report/

17/12/2017 www.pdf-archive.com

ijrte02020709 86%

E-businesses are vulnerable for theft in the same way regular businesses are.

https://www.pdf-archive.com/2011/08/13/ijrte02020709/

12/08/2011 www.pdf-archive.com

Tutorial Blind SQL Injection by SkillmaX 86%

Ahora probaremos si la web es vulnerable, por que le agregaremos un valor FALSE La web se quedaría así:

https://www.pdf-archive.com/2013/08/16/tutorial-blind-sql-injection-by-skillmax/

16/08/2013 www.pdf-archive.com

JDIT-2014-1118-009 85%

Although more work is needed to develop standard methods of quantitation and image mapping, 18F-PET-CT imaging may be useful to identify vulnerable atheroma.

https://www.pdf-archive.com/2017/05/30/jdit-2014-1118-009/

29/05/2017 www.pdf-archive.com

WWI strategy2015i 84%

UN-Water Welcome 2 Helping vulnerable communities 4 Driving water stewardship 8 Improving governance and aid 12 Advancing knowledge and communication 16 Delivering the strategy and developing our organisation 20 Massive mismanagement and growing human needs for water are causing freshwater ecosystems to collapse, making freshwater species the most threatened on Earth.

https://www.pdf-archive.com/2016/02/24/wwi-strategy2015i/

24/02/2016 www.pdf-archive.com

IFS-Ed - WB6 Proposal - FCO - 171018 84%

The unemployed population – particularly youth – vulnerable to the influence of and the corruption by hardline nationalist groups and to the preaching of radical Islam and jihadism Population The understanding and tolerance of the population to corruption, particularly considering impact on the unemployed.

https://www.pdf-archive.com/2019/02/07/ifs-ed---wb6-proposal---fco---171018/

07/02/2019 www.pdf-archive.com

Queering Disaster Emergency Management - M.A. Cianfarani 84%

Focusing on capacities reveals that marginalized people are not only vulnerable victims during disaster, but that they have the ability to lead and mobilize for their own needs and those of the larger community (Balgos, Gaillard, &

https://www.pdf-archive.com/2016/06/21/queering-disaster-emergency-management-m-a-cianfarani/

20/06/2016 www.pdf-archive.com