About: Security Now 128: Your Questions, Steve's Answers 33   Sponge Permalink

An Entity of Type : owl:Thing, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Steve talks about the remote code execution exploit of the Microsoft Windows TCP/IP vulnerability and answers your questions. For 16kpbs versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Bandwidth for Security Now! is provided by AOL Radio. Running time: 1:13:11

AttributesValues
rdfs:label
  • Security Now 128: Your Questions, Steve's Answers 33
rdfs:comment
  • Steve talks about the remote code execution exploit of the Microsoft Windows TCP/IP vulnerability and answers your questions. For 16kpbs versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Bandwidth for Security Now! is provided by AOL Radio. Running time: 1:13:11
dcterms:subject
abstract
  • Steve talks about the remote code execution exploit of the Microsoft Windows TCP/IP vulnerability and answers your questions. For 16kpbs versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Bandwidth for Security Now! is provided by AOL Radio. Running time: 1:13:11
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software