EXPLOITATION

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interpreter Exploitation

As remote exploits further dwindle and perimeter defenses become the standard, remote client-side attacks are becoming the standard vector for attackers. Modern operating systems have quelled the explosion of client-side vulnerabilities using mitigation techniques such as data execution prevention (DEP) and address space layout randomization (ASLR). This work illustrates two novel techniques to...

متن کامل

the right of mines exploitation

the mines are an important section of national heritage and public domain. in legal aspect there are several theories about the mines such as; ownership; public domain and non-proper tier things. some of the islamic jurists believe mines are anfal and others say they are non-proper tier things. although the prohibition or restriction in exploitation of mine is useful because of fairly distribut...

متن کامل

Exploitation and Disadvantage

Some accounts of exploitation, most notably the degradation-based account provided by Ruth Sample (2003) and Robert Goodin’s (1987) vulnerability-based account, argue that persons are exploited when the benefit they receive from a transaction falls below a certain threshold value. According to these accounts, the duty of the advantaged party to constrain their advantage in light of the other pa...

متن کامل

Adaptations for Exploitation

Human groups contain reproductively relevant resources that differ greatly in their ease of accessibility. The authors advance a conceptual framework for the study of 2 classes of adaptations that have been virtually unexplored: (a) adaptations for exploitation designed to expropriate the resources of others through deception, manipulation, coercion, intimidation, terrorization, and force and (...

متن کامل

Automation of post-exploitation

Pentesting is becoming an important activity even for smaller companies. One of the most important economic pressures is the cost of such tests. In order to automate pentests, tools such as Metasploit can be used. Post-exploitation activities can, however, not be automated easily. Our contribution is to extend Meterpreter-scripts so that postexploitation can be scripted. Moreover, using a multi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Economics and Philosophy

سال: 2018

ISSN: 0266-2671,1474-0028

DOI: 10.1017/s026626711800041x