All Articles

Ordered by Date Published : Year: "2020" Month: "11" Day: "09"
Page: 1 (of 0)

Total Articles in this collection: 6

Navigation Help at the bottom of the page
Article: WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques - published over 3 years ago.
Content: Microsoft is known for their backwards compatibility. When they rolled out the 64-bit variant of Windows years ago they needed to provide compatibility with existing 32-bit applications. In order to provide seamless execution regardless of application bitness, the WoW (Windows on Windows) system was coined. This layer, which will be referred to as ...
http://www.fireeye.com/blog/threat-research/2020/11/wow64-subsystem-internals-and-hooking-techniques.html   
Published: 2020 11 09 19:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: WOW64!Hooks: WOW64 Subsystem Internals and Hooking Techniques - published over 3 years ago.
Content: Microsoft is known for their backwards compatibility. When they rolled out the 64-bit variant of Windows years ago they needed to provide compatibility with existing 32-bit applications. In order to provide seamless execution regardless of application bitness, the WoW (Windows on Windows) system was coined. This layer, which will be referred to as ...
http://www.fireeye.com/blog/threat-research/2020/11/wow64-subsystem-internals-and-hooking-techniques.html   
Published: 2020 11 09 19:00:00
Received: 2021 06 06 09:05:11
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: US Cyber Command-sponsored cyber exercise will focus on critical infrastructure - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93876-us-cyber-command-sponsored-cyber-exercise-will-focus-on-critical-infrastructure   
Published: 2020 11 09 16:25:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Article: US Cyber Command-sponsored cyber exercise will focus on critical infrastructure - published over 3 years ago.
Content:
https://www.securitymagazine.com/articles/93876-us-cyber-command-sponsored-cyber-exercise-will-focus-on-critical-infrastructure   
Published: 2020 11 09 16:25:00
Received: 2021 04 25 02:14:06
Feed: Security Magazine – Guidance
Source: Security Magazine
Category: Guidance
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: New Book! The Best of TaoSecurity Blog, Volume 3 - published over 3 years ago.
Content:  Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It's in the Kindle Store, and if you have an Unlimited account, it's free. I also published a print edition, which is 485 pages. Book DescriptionThe book features the followi...
https://taosecurity.blogspot.com/2020/11/new-book-best-of-taosecurity-blog.html   
Published: 2020 11 09 13:30:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 3 - published over 3 years ago.
Content:  Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It's in the Kindle Store, and if you have an Unlimited account, it's free. I also published a print edition, which is 485 pages. Book DescriptionThe book features the followi...
https://taosecurity.blogspot.com/2020/11/new-book-best-of-taosecurity-blog.html   
Published: 2020 11 09 13:30:00
Received: 2024 03 14 12:46:07
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: CNI system design: Secure Remote Access - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cni-system-design-secure-remote-access   
Published: 2020 11 09 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Article: CNI system design: Secure Remote Access - published over 3 years ago.
Content:
https://www.ncsc.gov.uk/blog-post/cni-system-design-secure-remote-access   
Published: 2020 11 09 00:00:00
Received: 2021 04 18 14:04:44
Feed: NCSC – All Feeds
Source: National Cyber Security Centre (NCSC)
Category: All
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained

All Articles

Ordered by Date Published : Year: "2020" Month: "11" Day: "09"
Page: 1 (of 0)

Total Articles in this collection: 6


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor