Rechercher
Se connecter
  • Accueil

  • Catalogue

  • Livres audio

  • Livres numériques

  • Magazines

  • Pour les enfants

  • Meilleures listes

  • Aide

  • Télécharger l'application

  • Utiliser un code promotionnel

  • Utiliser une carte cadeau

  • Essayer gratuitement
  • Se connecter
  • Langue

    🇫🇷 France

    • FR
    • EN

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇰 Danmark

    • DK
    • EN

    🇩🇪 Deutschland

    • DE
    • EN

    🇪🇸 España

    • ES
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇫🇮 Suomi

    • FI
    • EN

    🇸🇪 Sverige

    • SE
    • EN
  1. Livres
  2. Savoirs et Culture
  3. Informatique

Lecture gratuite illimitée pendant 14 jours

Sans engagement

Essayer gratuitement
0.0(0)

Summary of Andy Greenberg's Sandworm

Please note: This is a companion version & not the original book.

Sample Book Insights:

#1 iSight Partners, a private intelligence firm, had a team that specialized in software vulnerability research. In 2014, they discovered a secret security flaw in Microsoft Office that allowed hackers to break out of the confines of the software application and begin to execute their own code on a target computer.

#2 iSight’s Ukrainian staff found the email, and Hultquist, the company’s loud and bearish army veteran, made a point of periodically shouting from his desk into the bull pen. He burst out of his office and into the room, briefing the room and assigning tasks to triage what would become one of the biggest finds in the small company’s history.

#3 The hackers had used the feature to carefully plant two chunks of data within the presentation. The first was loaded into a temporary folder on the target computer. The second took advantage of PowerPoint’s animation feature: when the presentation loaded that animation file, it would run an automated script that right-clicked on the first file and click install on the resulting drop-down menu, giving that code a foothold on the computer without tipping off its user.

#4 Zero days do have authors. When Erickson had first begun to pull apart the attack in his blacked-out workshop that morning, he hadn’t simply been studying some naturally occurring, inanimate puzzle. He was admiring the first hints of a remote, malevolent intelligence.


Auteur(e) :

  • Everest Media

Format :

  • Livre numérique

Durée :

  • 43 pages

Langue :

anglais

Catalogue :

  • Savoirs et Culture
  • Informatique

Plus de Everest Media

Passer la liste
  1. Summary of Pamela Des Barres's I'm with the Band

    Everest Media

    book
  2. Summary of Jonathan Harr's A Civil Action

    Everest Media

    book
  3. Summary of Robert Whitaker's Anatomy of an Epidemic

    Everest Media

    book
  4. Summary of Peter Scazzero's Emotionally Healthy Discipleship

    Everest Media

    book
  5. Summary of Gino Wickman & Mike Paton's Get A Grip

    Everest Media

    book
  6. Summary of Deepak Chopra & David Simon's The Seven Spiritual Laws of Yoga

    Everest Media

    book
  7. Summary of Ayelet Fishbach's Get It Done

    Everest Media

    book
  8. Summary of Geoffrey A. Moore's Zone to Win

    Everest Media

    book
  9. Summary of Carlo Ancelotti's Quiet Leadership

    Everest Media

    book
  10. Summary of Joshua Becker's The Minimalist Home

    Everest Media

    book
  11. Summary of Penelope Quest's Reiki for Life

    Everest Media

    book
  12. Summary of Richard Carlson & Kristine Carlson's Don't Sweat the Small Stuff in Love

    Everest Media

    book

D'autres ont également lu

Passer la liste
  1. The New Tourist : Waking Up to the Power and Perils of Travel

    Paige McClanahan

    audiobookbook
  2. History of Taiwan : A Captivating Guide to Taiwanese History and the Relationship with the People's Republic of China

    Captivating History

    book
  3. How to Teach Quantum Physics to Your Dog

    Chad Orzel

    book
  4. Mathematica Data Analysis

    Sergiy Suchok

    book
  5. How to Make Your Money Work : Decide what you want, plan to get there

    Eoin McGee

    book
  6. One Myanmar : The faces of the Burmese transition - Les visages de la transition birmane

    Carine Jaquet

    book
  7. Vieillir en santé : C'est possible !

    Michèle Sirois, Sylvie Belleville

    book
  8. Lifespan: Why We Age—and Why We Don't Have To

    David A. Sinclair, Matthew D. LaPlante

    book
  9. Last Child in the Woods : Saving our Children from Nature-Deficit Disorder

    Richard Louv

    book
  10. Aiming for Quantum Computer

    Veijo Hänninen

    book
  11. Why We Meditate : The Science and Practice of Clarity and Compassion

    Daniel Goleman, Tsoknyi Rinpoche

    audiobookbook
  12. Chip War : The Fight for the World's Most Critical Technology

    Chris Miller

    audiobookbook

Aide et contact


À propos

  • Notre histoire
  • Offres d'emploi
  • Presse
  • Accessibilité
  • Nextory One
  • Rejoignez-nous
  • Service aux actionnaires
  • Instagram
  • Facebook

Explorer

  • Catégories
  • Livres audio
  • Livres numériques
  • Magazines
  • Pour les enfants
  • Meilleures listes

Catégories populaires

  • Polar & Thriller
  • Biographies et reportages
  • Littérature générale
  • Feel Good & Romance
  • Développement personnel
  • Jeunesse
  • Histoires vraies
  • Bien-être & relaxation

Nextory

Copyright © 2025 Nextory AB

Politique de confidentialité · Conditions d'utilisation · Mentions légales ·
Excellent4.3 sur 5