[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] White Paper: Detecting System Intrusions
- To: Almaz <almaz@xxxxxxxxx>
- Subject: Re: [Full-disclosure] White Paper: Detecting System Intrusions
- From: Andrew Terekhov <ultraata@xxxxxxxxx>
- Date: Thu, 17 Jan 2013 12:59:11 +0400
Why is this here?
There's nothing new/interesting in datasheets.
On Wed, Jan 16, 2013 at 9:39 PM, Almaz <almaz@xxxxxxxxx> wrote:
> How to detect system intrusions? What are the techniques? Can one
> character difference in the output be an indicator of compromise? Download
> and read a white paper below if you want answers to these questions and
> more.
>
> http://www.demyo.com/downloads/white-papers/
>
> --
> Almantas Kakareka, CISSP, GSNA, GSEC, CEH
> CTO
> Demyo, Inc.
> Miami, FL, USA
> Cell: +1 201 665 6666
> Desk: +1 786 203 3948
> Email: almaz@xxxxxxxxx
> Twitter: @DemyoSec <https://twitter.com/#!/demyosec>
> Web: www.demyo.com
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
--
Regards,
Andrew Terekhov.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/