I want to take the opportunity and share an interesting IT security blog with you: “Ack Ack – Go beyond the impossible!“. Four authors write very interesting blog posts, do some vulnerability research and publish tools && exploits. I especially love the article about performing DNS queries through MySQL (theory), the very funny RAM exhaustion […]

Author:

I want to take the opportunity and share an interesting IT security blog with you: “Ack Ack – Go beyond the impossible!“.

Four authors write very interesting blog posts, do some vulnerability research and publish tools && exploits. I especially love the article about performing DNS queries through MySQL (theory), the very funny RAM exhaustion when calling infinite mail client processes and the discovered overflow vulnerabilities in various mobile devices.

Normally I am not really a fan of such obvious advertisement posts, but well, this blog is really worth visiting. Guys, keep up the interesting work!

Comments on this entry (no comments)

Did you like this post? You can share your opinion with us! Simply click here.

Add Your Comment

Powered by sweet Captcha


7 × two =