﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>BlogJava-Snowdream-随笔分类-Security</title><link>http://www.blogjava.net/zellux/category/31295.html</link><description>迷茫的大二：读书 思考 等待</description><language>zh-cn</language><lastBuildDate>Tue, 06 May 2008 07:50:33 GMT</lastBuildDate><pubDate>Tue, 06 May 2008 07:50:33 GMT</pubDate><ttl>60</ttl><item><title>阅读笔记 - SubVirt: Implementing malware with virtual machines (2)</title><link>http://www.blogjava.net/zellux/archive/2008/05/06/198693.html</link><dc:creator>ZelluX</dc:creator><author>ZelluX</author><pubDate>Tue, 06 May 2008 06:35:00 GMT</pubDate><guid>http://www.blogjava.net/zellux/archive/2008/05/06/198693.html</guid><wfw:comment>http://www.blogjava.net/zellux/comments/198693.html</wfw:comment><comments>http://www.blogjava.net/zellux/archive/2008/05/06/198693.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/zellux/comments/commentRss/198693.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/zellux/services/trackbacks/198693.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 一种利用虚拟机进行的攻击手段(下篇)&nbsp;&nbsp;<a href='http://www.blogjava.net/zellux/archive/2008/05/06/198693.html'>阅读全文</a><img src ="http://www.blogjava.net/zellux/aggbug/198693.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/zellux/" target="_blank">ZelluX</a> 2008-05-06 14:35 <a href="http://www.blogjava.net/zellux/archive/2008/05/06/198693.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>阅读笔记 - SubVirt: Implementing malware with virtual machines (1)</title><link>http://www.blogjava.net/zellux/archive/2008/05/05/198564.html</link><dc:creator>ZelluX</dc:creator><author>ZelluX</author><pubDate>Mon, 05 May 2008 13:53:00 GMT</pubDate><guid>http://www.blogjava.net/zellux/archive/2008/05/05/198564.html</guid><wfw:comment>http://www.blogjava.net/zellux/comments/198564.html</wfw:comment><comments>http://www.blogjava.net/zellux/archive/2008/05/05/198564.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.blogjava.net/zellux/comments/commentRss/198564.html</wfw:commentRss><trackback:ping>http://www.blogjava.net/zellux/services/trackbacks/198564.html</trackback:ping><description><![CDATA[&nbsp;&nbsp;&nbsp;&nbsp; 摘要: 一种利用虚拟机进行的攻击手段&nbsp;&nbsp;<a href='http://www.blogjava.net/zellux/archive/2008/05/05/198564.html'>阅读全文</a><img src ="http://www.blogjava.net/zellux/aggbug/198564.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.blogjava.net/zellux/" target="_blank">ZelluX</a> 2008-05-05 21:53 <a href="http://www.blogjava.net/zellux/archive/2008/05/05/198564.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>