This article is written By Overlord, The latest version of this guide is always avaliable from www.cyberarmy.com. You are Exploiting design flaws in the Win32 API for privilege escalation.
Or...
Shatter Attacks - How to break Windows.
By Foon - ivegotta@tombom.co.uk
Introduction
This paper presents a new generation Tutorial to make your folder (any ) secure and inaccessible by others without using any program..
by
MUZAMMIL BUTT-THE NECROMANCER
Hi...I am Muzammil but from Pakistan, this is my Microsoft IIS Unicode Exploit Explained - Part-I
( By Lucky )
Unicode extensions are installed by default with Microsoft Internet Information Server (IIS) version 4.0 and 5.0. This is to 404