Showing 1 - 10 of 24
Market models for software vulnerabilities have been disparaged in the past citing how these do little to lower the risk of insecure software. In this paper we argue that the market models proposed are flawed and not the concept of a market itself. A well-defined software risk derivative market...
Persistent link: https://www.econbiz.de/10009440801
In the day-to-day management of their organisation, company directors, accountants and management often overlook the importance of the documents used by the business. It is crucial to remember that the final accounts are not the only documents with a retention requirement. Further, as businesses...
Persistent link: https://www.econbiz.de/10012953319
One of the little-known aspects of bitcoin is the nature of the proof of work system. There are many people, especially those who support a UASF or PoW change that believe a distributed system should be completed as a mesh. In this, they confuse centralised systems with centrality. The truth of...
Persistent link: https://www.econbiz.de/10012953381
In this paper, we investigate the challenges associated with the competing approaches of utility theory and behavioural economics. It has been become commonplace to argue that humans act irrationally. This fallacious argument provides the foundation for paternalism. The fallacy of course is the...
Persistent link: https://www.econbiz.de/10012953382
Bitcoin scripts currently do not enable loops. Therefore, they are commonly considered to be not Turing Complete. This limits the types of algorithms the Bitcoin scripts can execute to linear or tree-like instructions.This white paper describes the invention of an Oracle module that:•...
Persistent link: https://www.econbiz.de/10012922024
This document is intended to provide an overview on Decentralized Autonomous Corporations (DAC) based on the blockchain technology. We provide definitions of (i) DAC, (ii) Secure Multiparty Computation – a secure multiparty protocol for authorizing transactions, (iii) Autonomous Agents – a...
Persistent link: https://www.econbiz.de/10012896361
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as a launch platform for your shellcode and that the various system components are. We will continue...
Persistent link: https://www.econbiz.de/10012923172
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the code exploitation process. In this article, we look at one of the primary infection steps used to compromise a Windows host, DLL injection. DLL...
Persistent link: https://www.econbiz.de/10012923174
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process. In this article, we are looking at extending our knowledge of assembly and shellcoding. This is a precursor to the...
Persistent link: https://www.econbiz.de/10012923176
This article is going to follow from previous articles as well as going into some of the fundamentals that you will need in order to understand the shellcode creation process, how to use Python as a launch platform for your shellcode and that the various system components are. This is designed...
Persistent link: https://www.econbiz.de/10012923178