Home proofofconcept
 

Keywords :   


Tag: proofofconcept

Evil Xfinity WiFi access point proof-of-concept for fun, profit and Comcast chaos

2014-06-19 20:41:36| Wireless - Topix.net

If you needed another reason to hate Comcast's plans to turn your home router into an Xfinity WiFi hotspot, meet the Xfinity Pineapple.

Tags: point access fun profit

 

ASSET and Synopsys Collaborate on Proof-of-Concept Demonstrating an IEEE P1687 IJTAG Tools Flow

2014-05-21 06:00:00| Industrial Newsroom - All News for Today

ASSET® InterTech (<a href="http://www.asset-intertech.com">www.asset-intertech.com</a>), the leading supplier of tools for embedded instrumentation, announced it has collaborated with Synopsys, Inc., a global leader providing software, IP and services used to accelerate innovation in chips and electronic systems, on a proof-of-concept case study demonstrating the viability of an IJTAG tools ecosystem. Tools are needed to insert and synthesize IEEE P1687 IJTAG embedded instruments into chips ...This story is related to the following:Green & CleanSearch for suppliers of: Instrumentation Software | Embedded Software |

Tags: tools flow asset ieee

 
 

Dell ARMs itself with new proof-of-concept 64-bit 'microserver'

2014-02-05 20:14:32| InfoWorld: Top News

During the last two years, Dell's been pushing its nose all the more into the low-power 64-bit ARM server tent -- but only by slow inches, much like the rest of the industry.

Tags: dell arms 64bit proofofconcept

 

Proof-of-concept exploit available for Android vulnerability

2013-07-09 17:18:20| InfoWorld: Top News

Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.

Tags: exploit vulnerability android proofofconcept

 

New proof-of-concept malware demonstrates virus for OS X

2013-06-04 18:56:24| CNET News.com

Clapzok.A is a new malware approach that, with current (albeit limited) loopholes in OS X, can spread among binary files when executed, making it one of the first-known, true computer viruses for OS X. [Read more]    

Tags: x os virus demonstrates

 

Sites : [1] [2] [3] [4] [5]