| 2014-04-06 | International Conference on Learning Representations 2014 | 路人甲 | 3419 | |
| 2014-04-06 | A Close Look at RTF Zero-Day Attack CVE-2014-1761 | 路人甲 | 3155 | |
| 2014-04-04 | iMilo 实时引擎:Solr vs Elasticsearch | 路人甲 | 2458 | |
| 2014-04-04 | How to Own a Router – Fritz!Box AVM Vulnerability Analysis | 路人甲 | 2285 | |
| 2014-04-04 | DLL Side-Loading: Another Blind-Spot for Anti-Virus | 路人甲 | 2863 | |
| 2014-04-04 | Using the Immunity Debugger API to Automate Analysis | 路人甲 | 2075 | |
| 2014-04-04 | 500行PHP代码搞定富文本安全过滤 | 路人甲 | 2083 | |
| 2014-04-04 | Polypasshash:A Password hashing scheme | 路人甲 | 3304 | |
| 2014-04-04 | 支持多策略的安全数据库系统研究 | 路人甲 | 2615 | |
| 2014-04-04 | Reverse Engineering for Beginners | 路人甲 | 2595 | |
| 2014-04-04 | Struts2 S2-020在Tomcat 8下的命令执行分析 | 路人甲 | 2815 | |
| 2014-04-04 | phantomjs使用说明 | 路人甲 | 2644 | |
| 2014-04-03 | Transceiver for 27 MHz wireless keyboards from Logitech | 路人甲 | 2446 | |