Email address | private |
---|---|
First Active | 2014-08-26 |
Last Active | 2021-10-12 |
Whitepaper that discusses the functionality of EDR (Endpoing Protection and Response), how it compares to antivirus, and how it can be manipulated.
ece8d73b3f5b494064886d578b32c0f9fcd8723057d66ff7d4e4b551ab1d242d
This is a whitepaper that touches on various cryptography and discusses hash functions at a slightly greater length.
5aa0be1d76aebe75b38c23e223c667b62f5b40c08d40af7df228f6c99c7dfcbf