Video Screencast Help

Greg Ahmad

Member Profile

Status: -
Member for: 7 years 18 weeks
Contribution Stats
0
Solutions
0
Forum Threads
0
Comments
10
Blog Entries
0
Ideas
0
Articles
0
Videos
0
Downloads
0
Events
0
Groups Joined

Greg Ahmad's Activity

Show:
New blog entry 30 Apr 2010
Web browsers are an integral part of home and business computing environments and one of the most popular and ubiquitous applications on computer systems. Due to their popularity, the exploitation of security vulnerabilities in browsers is a common method for attackers to compromise ...
New blog entry 18 Mar 2010
Over the past few years, targeted attacks against organizations have become increasingly common and have gained notoriety. One of the most well known of these attacks is the recent compromise of Google, Adobe, and many other companies as part of the
New blog entry 15 Sep 2009
Recently we became aware of a new security vulnerability that affects various versions of Microsoft Windows operating systems. This vulnerability allows remote attackers to carry out denial-of-service and local privilege escalation attacks against affected computers and though not confirmed, ...
New blog entry 26 Mar 2009
System Management Mode (SMM) is an operating mode available in Intel x86 and x86_64 architectures. SMM is the most privileged CPU operation mode on Intel architectures and facilitates power-management ...
New blog entry 13 Nov 2007
Earlier this year I wrote a series of poststhat highlighted the rise in vulnerabilities affecting ActiveX controlsduring 2006. I mentioned that there had been an increase in the numberof ActiveX vulnerabilities over the last six years, but moreimportantly there had been a significant ...
New blog entry 13 Jun 2007
On April 27, 2007, various Internet resources from the Republic of Estonia came under a series of DDOS or distributed denial ...
New blog entry 18 Jan 2007
In my previous post, I talked about the sudden rise in vulnerabilities affecting ActiveX controls. In this post, I would like to talk a bit about the ...
New blog entry 18 Jan 2007
In my previous post,I talked about the sudden rise in vulnerabilities affecting ActiveXcontrols. In this post, I would like to talk a bit about the ...
New blog entry 16 Jan 2007
The year 2006 saw the rise of numeroussecurity trends such as attacks against social networks, initiatives byresearchers to sequentially disclose many flaws in Web browsers andoperating system kernels, attacks being used for financial gain, and adramatic increase in the number of ...
New blog entry 16 Jan 2007
The year 2006 saw the rise of numerous security trends such as attacks against social networks, initiatives by researchers to sequentially disclose many flaws in Web browsers and operating system kernels, attacks being used for financial gain, and a dramatic increase in the number of ...