Exploiting BlackICE When a Security Product has a Security Flaw

This paper was written to fulfill one part of the requirements of GCIH certification and present recently published and brand new details of a remarkable vulnerability to improve the state of practice of information security. It contains a fictional story about a computer expert who gets into evil...
By
Peter Gara
July 9, 2005

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg