continue…
Related to
Practical Win32 and UNICODE exploitation
The Perl Jam: Exploiting a 20 Year-old Vulnerability
29 min
Defending the Poor
71 min
one time crypto (480)
51 min