I'm wondering just how many security experts clicked on that link, downloaded a PDF from some unknown source and opened it...
With kind regards, Zmicier J. 2013/1/17 Andrew Terekhov <[email protected]> > Why is this here? > There's nothing new/interesting in datasheets. > > On Wed, Jan 16, 2013 at 9:39 PM, Almaz <[email protected]> wrote: > >> How to detect system intrusions? What are the techniques? Can one >> character difference in the output be an indicator of compromise? Download >> and read a white paper below if you want answers to these questions and >> more. >> >> http://www.demyo.com/downloads/white-papers/ >> >> -- >> Almantas Kakareka, CISSP, GSNA, GSEC, CEH >> CTO >> Demyo, Inc. >> Miami, FL, USA >> Cell: +1 201 665 6666 >> Desk: +1 786 203 3948 >> Email: [email protected] >> Twitter: @DemyoSec <https://twitter.com/#!/demyosec> >> Web: www.demyo.com >> >> _______________________________________________ >> Full-Disclosure - We believe in it. >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html >> Hosted and sponsored by Secunia - http://secunia.com/ >> > > > > -- > Regards, > Andrew Terekhov. > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
