Reverse engineering Archive
Way back in 2004, I spied an offer in Circuit Cellar magazine for a free evaluation kit from Aladdin Knowledge Systems (AKS), manufacturer of copy protection tokens. These are the little gadgets that you often need to plug in to your computer to prove that you ”really” own the particularly expensive application you’re trying to [...]
An anonymous researcher has published a detailed write-up on how to execute arbitrary code with high privileges on a recent Xbox 360 kernel. The vulnerability exists in the (now patched) system call handler. There’s no googleprint for firstname.lastname@example.org so I’m assuming this person created that email address just for the purpose of disclosing this vulnerability. [...]
Find It Quickly
Find what you're looking for quickly by using our keyword search. Can't find it? Try our links below.