Trojans: what they are, different kinds of trojans (RATs, keyloggers, password trojans etc') for Unix and Windows, how to look out for trojans and defeat them etc'. Everything you always wanted to know about trojans but were afraid to ask (in fear of appearing to be lame).
35cd278dc8708c046f0ccb7340296c5676e446468e162fa3226e24714507ea84
eLOL (electronic laugh out loud) is a windows daily joke program. It will listen to simple commands from anyone on a tcp port.
c5238b500873db434a696cebf1329b92d50199c70d662404dd6e9bece2587d7f
Xshipwars remote overflow - Xshipwars 1.24 and below are vulnerable.
570e24a8dbcd431683104d021788b7b6200baf92b06d7840b3ed5ec4190fb39b
Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure. Real security is never that simple, and that is especially true with PKI.
2926ad11fff203d81cb0566ec64e3e3a591e8b4c1615f063f61f1551104e045a
Pro-lite is a database for the OmniRemote palm pilot program which allows you to reprogram Pro-Lite brands of LED signs.
1b6b30e4b8f7f6ad7d9045b28be15a381647f5343e50745cdf661dc543572754