1.
Bibliografía
Manuel Blum "Coin flipping by telephone a protocol for solving impossible problems", ACM SIGACT News archive, Volume 15 , Issue 1 Winter-Spring 1983. ...
2.
gera's InsecureProgramming page
Insecure Programming by example. Here you can find a collection of exercises that will help you teach yourself the art of insecure programs exploitation. ...
3.
riq's chess page with tactical exercises
I'm learning chess, and I like it very much! Here are some chess tactical exercises based on the tournaments I'm playing/I've played ...
4.
gera's InsecureProgramming page
Insecure Programming by example. Here you can find a collection of exercises that will help you teach yourself the art of insecure programs exploitation. ...
5.
WifiZoo
Sep 6, 2007 ... -gathers bssid->clients information and outputs it in a file .... AP is displayed on a same screen; and if you click on each AP's BSSID, ...
6.
gera's InsecureProgramming page
Insecure Programming by example. Here you can find a collection of exercises that will help you teach yourself the art of insecure programs exploitation. ...
7.
Core SECURITY TECHNOLOGIES Community
root@community.corest.com:~$ ls -l /home -rwxr-xr-x 1 gera core 4096 Jul 30 13:17 gera -rwxr-xr-x 1 hochoa core 4096 Jul 30 13:17 hochoa -rwxr-xr-x 1 raddy ...
8.
Core SECURITY TECHNOLOGIES Community
root@community.corest.com:~$ ls -l /home -rwxr-xr-x 1 gera core 4096 Jul 30 13:17 gera -rwxr-xr-x 1 hochoa core 4096 Jul 30 13:17 hochoa -rwxr-xr-x 1 raddy ...
9.
riq's chess page with tactical exercises
2005-04-20 - pre-pre-superior-tactics-3-4.pdf: Exercises based on the ... 2005-06-27 - superior-tactics.pdf: Exercises based on the Superior tournament. ...
10.
gera's InsecureProgramming page
Insecure Programming by example. Here you can find a collection of exercises that will help you teach yourself the art of insecure programs exploitation. ...