Blocking Macros from Internet Originated Microsoft® Office Files
Microsoft®1 Office files and documents may contain a macro, an embedded program written in Visual Basic®2 for Applications (VBA). Although VBA macros have legitimate uses, macros in Microsoft Office have proven themselves to be a long-lasting and increasingly popular attack...
09 November 2016 2 page(s) pdf
Scripting for Bash Vulnerability/Shellshock
Security researchers, vendors, and other reporting organizations have commented on the GNU Bash (Bourne Again shell) vulnerability, the severity of the vulnerability, and the critical need to patch vulnerable versions of Bash. Central to their message is the need to...
28 October 2014 5 page(s) pdf
Host Protection Technology Study
This study examined the behavior and capabilities of the different technologies against various attack scenarios in order to determine their effectiveness. The various products were grouped into different technology categories (host firewall, virus scanner, etc) and installed in a controlled...
01 June 2011 2 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-4 of 4 results returned for: "keywords:"Vector""