PHRACK #59     [..] [...] [....]

  [Phile #1] Introduction - Phrack Staff
  [Phile #2] Loopback - Phrack Staff
  [Phile #3] Linenoise - Phrack Staff
  [Phile #4] Handling the Interrupt Descriptor Table - kad
  [Phile #5] Advances in kernel hacking II - palmers
  [Phile #6] Defeating Forensic Analysis on Unix - the grugq
  [Phile #7] Advances in format string exploitation - riq & gera
  [Phile #8] Runtime process infection - anonymous author
  [Phile #9] Bypassing PaX ASLR protection - Tyler Durden
  [Phile #10] Execution path analysis: finding kernel based rootkits - Jan K. Rutkowski
  [Phile #11] Cuts like a knife, SSHarp - stealth
  [Phile #12] Building ptrace injecting shellcodes - anonymous author
  [Phile #13] Linux/390 shellcode development - johnny cyberpunk
  [Phile #14] Writing Linux Kernel Keylogger - rd
  [Phile #15] CRYPTOGRAPHIC RANDOM NUMBER GENERATORS - DrMungkee
  [Phile #16] Playing with Windows /dev/(k)mem - crazylord
  [Phile #17] Phrack World News - Phrack Staff
  [Phile #18] Phrack magazine extraction utility - Phrack Staff