Your First Guide to "secure Linux"
Kunal - Introduction to BackTrack - ClubHack2008
Not Only Drupal
Files and Streams
Reverse Engineering 101
Web Application Best Practies
EVA Concepts
Con fess 2013-sse-websockets-json-bhakti
Introduction of exploit on window XP & Trick
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexandru Balan @ eLiberatica 2007
Parallel External Memory Algorithms Applied to Generalized Linear Models
MDSD.doc