-
-
Replying to @thegrugq
@thegrugq@dguido both things I watched@dinodaizovi tackle in a weekend :\2 replies 0 retweets 0 likes -
Replying to @dinodaizovi
@dinodaizovi@thegrugq@dguido my mistake :) *two* weekends, one hacker, minimal motivation != "extremely high"3 replies 0 retweets 0 likes -
Replying to @dakami
@dakami@dinodaizovi Also what@thegrugq is true: ASLR/DEP impose continuing cost. ExploitShield is “bypassed” once and done.3 replies 0 retweets 0 likes -
Replying to @dguido
@dguido@dinodaizovi@thegrugq These are all very compelling theories. What does the empirical data say though?3 replies 0 retweets 0 likes -
Replying to @dakami
@dakami@dguido@dinodaizovi what are you measuring?3 replies 0 retweets 0 likes -
Replying to @thegrugq
@thegrugq@dguido@dinodaizovi An apparent 100% success rate stopping unsignatured malware feels like it deserves some respect4 replies 0 retweets 0 likes -
Replying to @dakami
@dakami@thegrugq@dguido@dinodaizovi btw, "unsignatured"? :o1 reply 0 retweets 0 likes
@raistolo @dakami @thegrugq @dinodaizovi Exactly, they are clearly using signatures, just function calls not byte patterns.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.