diff --git a/.gitattributes b/.gitattributes
index 88a57dcb49a962ce49a5cf5b5dd5209d4883e741..c47fa28af362fa81313731546e81e74d04a63189 100644
--- a/.gitattributes
+++ b/.gitattributes
@@ -2708,3 +2708,137 @@ Programming/Smalltalk/The[[:space:]]Art[[:space:]]and[[:space:]]Science[[:space:
Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]Express[[:space:]]Edition[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
Programming/VB/Visual[[:space:]]Basic[[:space:]]2005[[:space:]]for[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
Programming/VB/Wrox.Beginning.Microsoft.Visual.Basic.2008.May.2008.pdf filter=lfs diff=lfs merge=lfs -text
+Security/0321108957.Addison-Wesley[[:space:]]Professional.Honeypots-[[:space:]]Tracking[[:space:]]Hackers.pdf filter=lfs diff=lfs merge=lfs -text
+Security/3077366-HackerHighSchool.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Addison[[:space:]]Wesley[[:space:]]-[[:space:]]Hackers[[:space:]]Delight[[:space:]]2002.pdf filter=lfs diff=lfs merge=lfs -text
+Security/addison[[:space:]]wesley[[:space:]]-[[:space:]]web[[:space:]]hacking[[:space:]]-[[:space:]]attacks[[:space:]]and[[:space:]]defense.chm filter=lfs diff=lfs merge=lfs -text
+Security/Addison[[:space:]]Wesley,[[:space:]]The[[:space:]]Outlook[[:space:]]Answer[[:space:]]Book[[:space:]]Useful[[:space:]]Tips[[:space:]]Tricks[[:space:]]And[[:space:]]Hacks[[:space:]](2005)[[:space:]]Bbl[[:space:]]Lotb.chm filter=lfs diff=lfs merge=lfs -text
+Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf filter=lfs diff=lfs merge=lfs -text
+Security/amazon-hacks.chm filter=lfs diff=lfs merge=lfs -text
+Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Botnets[[:space:]]-[[:space:]]The[[:space:]]killer[[:space:]]web[[:space:]]applications.pdf filter=lfs diff=lfs merge=lfs -text
+Security/bsd-hacks.pdf filter=lfs diff=lfs merge=lfs -text
+Security/ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Certified[[:space:]]Ethical[[:space:]]Hacker[[:space:]](CEH)[[:space:]]v3.0[[:space:]]Official[[:space:]]Course.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Cross[[:space:]]Site[[:space:]]Scripting[[:space:]]Attacks[[:space:]]Xss[[:space:]]Exploits[[:space:]]and[[:space:]]Defense.pdf filter=lfs diff=lfs merge=lfs -text
+Security/DangerousGoogle-SearchingForSecrets.pdf filter=lfs diff=lfs merge=lfs -text
+Security/ebay-hacks-100-industrial-strength-tips-and-tools.pdf filter=lfs diff=lfs merge=lfs -text
+Security/ebook.oreilly.-.windows.xp.hacks.sharereactor.chm filter=lfs diff=lfs merge=lfs -text
+Security/eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools.chm filter=lfs diff=lfs merge=lfs -text
+Security/ethical[[:space:]]hacking,[[:space:]]student[[:space:]]guide.pdf filter=lfs diff=lfs merge=lfs -text
+Security/excel-hacks.chm filter=lfs diff=lfs merge=lfs -text
+Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Gray[[:space:]]Hat[[:space:]]Hacking~The[[:space:]]Ethical[[:space:]]Hacker's[[:space:]]Handbook,[[:space:]]3e[[:space:]]\[2011\].pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hack[[:space:]]IT[[:space:]]Security[[:space:]]Through[[:space:]]Penetration[[:space:]]Testing.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hack[[:space:]]Proofing[[:space:]]Linux[[:space:]]A[[:space:]]Guide[[:space:]]to[[:space:]]Open[[:space:]]Source[[:space:]]Security[[:space:]]-[[:space:]]Stangler,[[:space:]]Lane[[:space:]]-[[:space:]]Syngress[[:space:]]-[[:space:]][[:space:]]ISBN[[:space:]]1-928994-34-2.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hack[[:space:]]Proofing[[:space:]]Sun[[:space:]]Solaris[[:space:]]8.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]E-Commerce[[:space:]]Site.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Network[[:space:]]Second[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Network_First[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Web[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm filter=lfs diff=lfs merge=lfs -text
+Security/Hack_IT_Security_Through_Penetration_Testing.chm filter=lfs diff=lfs merge=lfs -text
+Security/Hacker[[:space:]]Disassembling[[:space:]]Uncovered.chm filter=lfs diff=lfs merge=lfs -text
+Security/hacker[[:space:]]ethic.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacker[[:space:]]Linux[[:space:]]Uncovered.chm filter=lfs diff=lfs merge=lfs -text
+Security/Hacker'S.Delight.chm filter=lfs diff=lfs merge=lfs -text
+Security/hacker-disassembling-uncovered.9781931769228.20035.chm filter=lfs diff=lfs merge=lfs -text
+Security/Hackers[[:space:]]Beware.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]-[[:space:]]Firewalls[[:space:]]And[[:space:]]Networks[[:space:]]How[[:space:]]To[[:space:]]Hack[[:space:]]Into[[:space:]]Remote[[:space:]]Computers.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed[[:space:]]-[[:space:]]Network[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]2nd[[:space:]]Edition.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed[[:space:]]Network[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]Third[[:space:]]Edition[[:space:]]ch1.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]2nd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]3rd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed-Network[[:space:]]Security[[:space:]]-[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]5th[[:space:]]Ed..chm filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed-VoIP[[:space:]]-[[:space:]]Voice[[:space:]]over[[:space:]]IP[[:space:]]Security,[[:space:]]Secrets,[[:space:]]&[[:space:]]Solutions.chm filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed-Web[[:space:]]2.0[[:space:]]-[[:space:]]Web[[:space:]]2.0[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed-Windows[[:space:]]-[[:space:]]Windows[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions,[[:space:]]3rd[[:space:]]Ed..pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Exposed-Wireless[[:space:]]-[[:space:]]Wireless[[:space:]]Security[[:space:]]Secrets[[:space:]]&[[:space:]]Solutions.chm filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]for[[:space:]]Dummies[[:space:]](2004).pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]the[[:space:]]Code[[:space:]]-[[:space:]]ASP.NET[[:space:]]Web[[:space:]]Application[[:space:]]Security[[:space:]]Cookbook[[:space:]](2004)[[:space:]].chm filter=lfs diff=lfs merge=lfs -text
+Security/Hacking[[:space:]]Windows[[:space:]]XP.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking-Hacker's[[:space:]]Guide.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Hacking.Guide.V3.1.pdf filter=lfs diff=lfs merge=lfs -text
+Security/John[[:space:]]Wiley[[:space:]]&[[:space:]]Sons[[:space:]]-[[:space:]]Hacking[[:space:]]For[[:space:]]Dummies.pdf filter=lfs diff=lfs merge=lfs -text
+Security/John[[:space:]]Wiley[[:space:]]and[[:space:]]Sons.Hacking[[:space:]]GMail[[:space:]](ExtremeTech).pdf filter=lfs diff=lfs merge=lfs -text
+Security/John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm filter=lfs diff=lfs merge=lfs -text
+Security/linux-server-hacks.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Linux-Server.Hacks-OReilly.pdf filter=lfs diff=lfs merge=lfs -text
+Security/little_black_book_oc_computer_viruses.pdf filter=lfs diff=lfs merge=lfs -text
+Security/mac-os-hacks.chm filter=lfs diff=lfs merge=lfs -text
+Security/McGraw[[:space:]]Hill[[:space:]]-[[:space:]]Web[[:space:]]Applications[[:space:]](Hacking[[:space:]]Exposed).pdf filter=lfs diff=lfs merge=lfs -text
+Security/McGraw-Hill[[:space:]]-[[:space:]]Hacking[[:space:]]Exposed,[[:space:]]3rd[[:space:]]Ed[[:space:]]-[[:space:]]Hacking[[:space:]]Exposed[[:space:]]Win2.pdf filter=lfs diff=lfs merge=lfs -text
+Security/McGraw-Hill[[:space:]]-[[:space:]]Linux[[:space:]]and[[:space:]]Unix[[:space:]]Security[[:space:]]Portable[[:space:]]Reference.pdf filter=lfs diff=lfs merge=lfs -text
+Security/McGraw.Hacking.Exposed.Cisco.Networks.chm filter=lfs diff=lfs merge=lfs -text
+Security/McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
+Security/McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
+Security/McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
+Security/McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Mind[[:space:]]Hacks[[:space:]]-[[:space:]]Tips[[:space:]]&[[:space:]]Tricks[[:space:]]for[[:space:]]Using[[:space:]]Your[[:space:]]Brain.chm filter=lfs diff=lfs merge=lfs -text
+Security/No[[:space:]]Starch[[:space:]]Press[[:space:]]-[[:space:]]Hacking[[:space:]]The[[:space:]]Art[[:space:]]of[[:space:]]Exploitation[[:space:]]2nd[[:space:]]Edition.chm filter=lfs diff=lfs merge=lfs -text
+Security/No[[:space:]]Starch[[:space:]]Press[[:space:]]-[[:space:]]PGP[[:space:]]and[[:space:]]GPG[[:space:]]Email[[:space:]]for[[:space:]]the[[:space:]]Practical[[:space:]]Paranoid.pdf filter=lfs diff=lfs merge=lfs -text
+Security/O'Reilly[[:space:]]-[[:space:]]Online[[:space:]]Investing[[:space:]]Hacks.chm filter=lfs diff=lfs merge=lfs -text
+Security/O'Reilly[[:space:]]Security[[:space:]]and[[:space:]]Usability[[:space:]]Designing[[:space:]]Secure[[:space:]]Systems[[:space:]]that[[:space:]]People[[:space:]]Can[[:space:]]Use.chm filter=lfs diff=lfs merge=lfs -text
+Security/O'Reilly[[:space:]]Security[[:space:]]Power[[:space:]]Tools.pdf filter=lfs diff=lfs merge=lfs -text
+Security/O'Reilly.-.Network.Security.Hacks.chm filter=lfs diff=lfs merge=lfs -text
+Security/O_Reilly_-_Windows_XP_Hacks.chm filter=lfs diff=lfs merge=lfs -text
+Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications(2009).pdf filter=lfs diff=lfs merge=lfs -text
+Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications-Cambridge_University_Press(2009).pdf filter=lfs diff=lfs merge=lfs -text
+Security/OReilly[[:space:]][[:space:]]Google[[:space:]]Hacks,[[:space:]]1st[[:space:]]Edition2003.pdf filter=lfs diff=lfs merge=lfs -text
+Security/OReilly[[:space:]]-[[:space:]]Flickr[[:space:]]Hacks[[:space:]]Tips[[:space:]]and[[:space:]]Tools[[:space:]]for[[:space:]]Sharing[[:space:]]Photos[[:space:]]Online[[:space:]](Feb[[:space:]]2006).chm filter=lfs diff=lfs merge=lfs -text
+Security/Oreilly[[:space:]]Access[[:space:]]Hacks[[:space:]]Apr[[:space:]]2005.chm filter=lfs diff=lfs merge=lfs -text
+Security/Oreilly,[[:space:]]Paypal[[:space:]]Hacks[[:space:]](2004)[[:space:]]Ddu.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly,.IRC.Hacks.(2004).DDU.chm filter=lfs diff=lfs merge=lfs -text
+Security/oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm filter=lfs diff=lfs merge=lfs -text
+Security/oreilly.firefox.hacks.ebook-lib.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.Google.Maps.Hacks.Jan.2006.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.Linux.Security.Cookbook.pdf filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.SQL.Hacks.Nov.2006.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.Statistics.Hacks.May.2006.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm filter=lfs diff=lfs merge=lfs -text
+Security/oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm filter=lfs diff=lfs merge=lfs -text
+Security/OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm filter=lfs diff=lfs merge=lfs -text
+Security/OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm filter=lfs diff=lfs merge=lfs -text
+Security/Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm filter=lfs diff=lfs merge=lfs -text
+Security/Security[[:space:]]and[[:space:]]Hacking[[:space:]]-[[:space:]]Anti-Hacker[[:space:]]Tool[[:space:]]Kit[[:space:]]Second[[:space:]]Edition.chm filter=lfs diff=lfs merge=lfs -text
+Security/SoTayHacker1.0.chm filter=lfs diff=lfs merge=lfs -text
+Security/spidering-hacks.chm filter=lfs diff=lfs merge=lfs -text
+Security/Springer.Insider.Attack.and.Cyber.Security.Beyond.the.Hacker.Apr.2008.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Springer.Open.Source.Systems.Security.Certification.Nov.2008.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
+Security/SQL[[:space:]]Injection[[:space:]]Attacks[[:space:]]and[[:space:]]Defense.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Stamp[[:space:]]M.,[[:space:]]Low[[:space:]]R.M.[[:space:]]Applied[[:space:]]cryptanalysis...pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress[[:space:]]-[[:space:]]Hack[[:space:]]Proofing[[:space:]]Linux[[:space:]](2001).pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress[[:space:]]-[[:space:]]Hacking[[:space:]]a[[:space:]]Terror[[:space:]]Network.[[:space:]]The[[:space:]]Silent[[:space:]]Threat[[:space:]]of[[:space:]]Covert[[:space:]]Channels.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress[[:space:]]--[[:space:]]Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Wireless[[:space:]]Network.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress[[:space:]]Hack[[:space:]]Proofing[[:space:]]Your[[:space:]]Identity[[:space:]]in[[:space:]]the[[:space:]]Information[[:space:]]Age.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress.Coding.for.Penetration.Testers.Oct.2011.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress.Hack.the.Stack.Oct.2006.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.pdf filter=lfs diff=lfs merge=lfs -text
+Security/The_Business_of_Cybercrime.pdf filter=lfs diff=lfs merge=lfs -text
+Security/tivo-hacks.100-industrial-strength-tips-and-tools.pdf filter=lfs diff=lfs merge=lfs -text
+Security/u23_Wiley[[:space:]]-[[:space:]]Hacking[[:space:]]GPS[[:space:]]-[[:space:]]2005[[:space:]]-[[:space:]](By[[:space:]]Laxxuss).pdf filter=lfs diff=lfs merge=lfs -text
+Security/Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Wiley-Principles.of.Computer.Security.2010.RETAiL.EBook.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Wiley.Implementing.Email.and.Security.Tokens.May.2008.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Wiley.Lifehacker.Dec.2006.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Wiley.Secure.Computer.and.Network.Systems.Modeling.Analysis.and.Design.Mar.2008.pdf filter=lfs diff=lfs merge=lfs -text
+Security/Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm filter=lfs diff=lfs merge=lfs -text
+Security/Windows[[:space:]]Server[[:space:]]Hacks.chm filter=lfs diff=lfs merge=lfs -text
+Security/Yahoo.Hacks.Oct.2005.chm filter=lfs diff=lfs merge=lfs -text
diff --git a/Security/(Ebook - Computer) Hacking The Windows Registry.pdf b/Security/(Ebook - Computer) Hacking The Windows Registry.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..4a0914459d527202bed413316af341ae24eb227c
Binary files /dev/null and b/Security/(Ebook - Computer) Hacking The Windows Registry.pdf differ
diff --git a/Security/(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf b/Security/(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf
new file mode 100644
index 0000000000000000000000000000000000000000..a360de47e9fe6a4d95a1680fff4624d7b8aa1b62
Binary files /dev/null and b/Security/(eBook - PDF) Hugo Cornwall - The Hacker's Handbook .pdf differ
diff --git a/Security/0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf b/Security/0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..6d35d6365e316c1104648ee40322b3cdef6b3440
--- /dev/null
+++ b/Security/0321108957.Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:4da0b5c8c9a95384c54e289fa9bda1e6e2d73663aabdb71148f4b97d46ba844d
+size 2239424
diff --git a/Security/285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf b/Security/285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf
new file mode 100644
index 0000000000000000000000000000000000000000..17ee2731540d28004e0a2ab34b833f345c1eb2d8
Binary files /dev/null and b/Security/285063-Hacker.Bibel.[278.kB_www.netz.ru].pdf differ
diff --git a/Security/3077366-HackerHighSchool.pdf b/Security/3077366-HackerHighSchool.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..21241892f7ddbad1959e7186a682116bfa725632
--- /dev/null
+++ b/Security/3077366-HackerHighSchool.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:aacc59b474017f6c70140f2587d1dcf4ee492b49750a2a0f75786a406eb03702
+size 3077366
diff --git a/Security/731986-Hacker's Desk Reference.pdf b/Security/731986-Hacker's Desk Reference.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..38674ca186078c878eaff8b336441b7677e0a207
Binary files /dev/null and b/Security/731986-Hacker's Desk Reference.pdf differ
diff --git a/Security/Addison Wesley - Hackers Delight 2002.pdf b/Security/Addison Wesley - Hackers Delight 2002.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..efa74b52e38a2b81ef239b0cb2a5a14bddd5bf33
--- /dev/null
+++ b/Security/Addison Wesley - Hackers Delight 2002.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:d1ca4f349b2edc9507266f56e14109e17be5d16f00f92e005aa8fae0ddfd2879
+size 6355478
diff --git a/Security/Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm b/Security/Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm
new file mode 100644
index 0000000000000000000000000000000000000000..b8864d811b96b7412e47996b8208641e22e775af
--- /dev/null
+++ b/Security/Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:d96e57046a21d8a3c51b7d1bd0c68e557734cf4de0c328c4ba96271526be82bf
+size 14848935
diff --git a/Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf b/Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..8ba2dd5a03084a678756f8c5ca41e4c0a6afa424
--- /dev/null
+++ b/Security/Ahmad-Reza_Sadeghi,_David_Naccache,_Pim_Tuyls-Towards_Hardware-Intrinsic_Security__Foundations_and_Practice_(Information_Security_and_Cryptography)(2010).pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:1326774aa4811c56306e37ed24969f7fc0083de61c132437946330bdac920ecb
+size 8355940
diff --git a/Security/Attacking the DNS Protocol.pdf b/Security/Attacking the DNS Protocol.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..c6ad7b1d703b7b533e453c2f90e8245b3fd9912b
Binary files /dev/null and b/Security/Attacking the DNS Protocol.pdf differ
diff --git a/Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf b/Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..c4c8851515b54f1cc1befeadc0b0338ae6ba9591
--- /dev/null
+++ b/Security/Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:c6a0a407b25a9851adc6de44dd2b31d6f8b8a3ee562e957f72f213ca0c5dc762
+size 150959943
diff --git a/Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf b/Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..3a39a0ed0d96ec6a2f2d1721d0f217a96bdc69f9
--- /dev/null
+++ b/Security/Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.20.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:6c59de7e094691167df230cf0e662e12d47310ae9398b97c8a3630ad83c1984c
+size 18949650
diff --git a/Security/Botnets - The killer web applications.pdf b/Security/Botnets - The killer web applications.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..aed718f5b911a70967d733d41ebf9e00b34d0ee7
--- /dev/null
+++ b/Security/Botnets - The killer web applications.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:b590da6fb1e933c750b961d4540e2ad324f42e763ee44a55c532cf7b232d9646
+size 7318417
diff --git a/Security/Certified Ethical Hacker (CEH) v3.0 Official Course.pdf b/Security/Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..d7e9c515414f0a64bc836b7737439cc8bf9939f3
--- /dev/null
+++ b/Security/Certified Ethical Hacker (CEH) v3.0 Official Course.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:5468ba4dcb6f047dd8f1800044e1cff279ec453b4ddba0cdabacf1f94b648903
+size 27144726
diff --git a/Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf b/Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..2d02ad38b8941ffc79763f116080180c893de9a8
--- /dev/null
+++ b/Security/Charles.C.Thomas-Document.Security.Protecting.Physical.and.Electronic.Content.2007.RETAiL.EBook.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:80c66adf2b455ab057bd914f2e8e16ff77359a50be2da4000170f831a733ca1b
+size 1397278
diff --git a/Security/Computer - Hackers Secrets - e-book.pdf b/Security/Computer - Hackers Secrets - e-book.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..f9cdcfdf19080fbffc3f5d3d3c61c7a04226e35d
Binary files /dev/null and b/Security/Computer - Hackers Secrets - e-book.pdf differ
diff --git a/Security/Cracking_Passwords_Guide.pdf b/Security/Cracking_Passwords_Guide.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..6ec37c77710c3fb96b377a45496c8bb32ae5f30c
Binary files /dev/null and b/Security/Cracking_Passwords_Guide.pdf differ
diff --git a/Security/Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf b/Security/Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf
new file mode 100644
index 0000000000000000000000000000000000000000..cc2e180075159fc56699483b109e5101f5a54882
Binary files /dev/null and b/Security/Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf differ
diff --git a/Security/Cross Site Scripting Attacks Xss Exploits and Defense.pdf b/Security/Cross Site Scripting Attacks Xss Exploits and Defense.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..8327f22942ceb429d56d34ab7daa88ab4fdd92d3
--- /dev/null
+++ b/Security/Cross Site Scripting Attacks Xss Exploits and Defense.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:7f0e6872e20523232805eea516b10b433c2b304b29afcc81d878a8eac9a8cfa8
+size 7696778
diff --git a/Security/DangerousGoogle-SearchingForSecrets.pdf b/Security/DangerousGoogle-SearchingForSecrets.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..597abb851b43554b202cfa1146660c102f3dfd0e
--- /dev/null
+++ b/Security/DangerousGoogle-SearchingForSecrets.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:d0ebe99f6fe8ebb6a5d1ac234476d11424ad83651a48408496464f7561f7435e
+size 2210027
diff --git a/Security/Dummies - Hack How To Create Keygens (1).pdf b/Security/Dummies - Hack How To Create Keygens (1).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..3bc98a16eee13fec10aef0f81cf7607f6f33d40c
Binary files /dev/null and b/Security/Dummies - Hack How To Create Keygens (1).pdf differ
diff --git a/Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf b/Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..fe264ecf83a47c3ca0e9a853a76afd08f466a7da
--- /dev/null
+++ b/Security/For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:bdd453401f2dc342f04371a6968cd16a0453f8aab30bcaffd0cfe829f67ea15c
+size 11501893
diff --git a/Security/Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf b/Security/Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf
new file mode 100644
index 0000000000000000000000000000000000000000..084e8f56a3f9f7ae715275d07ac2c4a929439fe4
--- /dev/null
+++ b/Security/Gray Hat Hacking~The Ethical Hacker's Handbook, 3e [2011].pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:976ee6efc98b807ceee03c2e79bdc27e58ab9d0ab6e70944ed53d941574263a2
+size 12800878
diff --git a/Security/Hack IT Security Through Penetration Testing.pdf b/Security/Hack IT Security Through Penetration Testing.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..a87329b837f9ce1e64f21e8fad07920e535caf5f
--- /dev/null
+++ b/Security/Hack IT Security Through Penetration Testing.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:a0c7da704604ac6d78e0252b4701e9a872875dd80dde936177b9b1909f641305
+size 12864873
diff --git a/Security/Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf b/Security/Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..03d37d60715ab204a10157e7d87d9d58c53bd71a
--- /dev/null
+++ b/Security/Hack Proofing Linux A Guide to Open Source Security - Stangler, Lane - Syngress - ISBN 1-928994-34-2.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:33c5e8e2d796e68e8810ec385ec86089dcaca7dfb4fe66f431a2a98b7964050e
+size 12388348
diff --git a/Security/Hack Proofing Sun Solaris 8.pdf b/Security/Hack Proofing Sun Solaris 8.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..1684eb30a85baaee7e1903aa1ab344a655121009
--- /dev/null
+++ b/Security/Hack Proofing Sun Solaris 8.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:4e70bd69db70c42d541ad8b9f0332ba3991e739931d3ae3b5c35c2326cce1324
+size 7125013
diff --git a/Security/Hack Proofing Your E-Commerce Site.pdf b/Security/Hack Proofing Your E-Commerce Site.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..bbc9d71aa0a7cda59d0185f99a14ec5d3f47124f
--- /dev/null
+++ b/Security/Hack Proofing Your E-Commerce Site.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:e3c1100004cde4a49f6ad47e367cc980d3faea87c24c413e03871b4fed767018
+size 7697336
diff --git a/Security/Hack Proofing Your Network Second Edition.pdf b/Security/Hack Proofing Your Network Second Edition.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..f4038eec5f80a10d444d905b5a6a35319afa551e
--- /dev/null
+++ b/Security/Hack Proofing Your Network Second Edition.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:296a38af7874c121869343267630dbf56380f77153448f67132c97a4984c5b4e
+size 9195049
diff --git a/Security/Hack Proofing Your Network_First Edition.pdf b/Security/Hack Proofing Your Network_First Edition.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..44dd645de13759ea29510c00c3d7ed73777dd472
--- /dev/null
+++ b/Security/Hack Proofing Your Network_First Edition.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:419b202b033da7760768fefcbbb6bcdab4c7700ce8d69278b2210d69b03d42c6
+size 3091540
diff --git a/Security/Hack Proofing Your Web Applications.pdf b/Security/Hack Proofing Your Web Applications.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..7b4a2f75bcd3fae783853f93ab0bbff9d0e0d75f
--- /dev/null
+++ b/Security/Hack Proofing Your Web Applications.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:efc26d1b92256bbbbc69b23a49c6372ce609ca0ed004f5c6cc5fc866d32efa2a
+size 9024080
diff --git a/Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm b/Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm
new file mode 100644
index 0000000000000000000000000000000000000000..51dd6412b56d1e3c00289d37f9ed87d3aec9ece7
--- /dev/null
+++ b/Security/Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:87185f0e8fb89637609ed7ccf0e8eaf84a1013e3d61f9d7ce13e14f71c2136b8
+size 6605780
diff --git a/Security/Hack_IT_Security_Through_Penetration_Testing.chm b/Security/Hack_IT_Security_Through_Penetration_Testing.chm
new file mode 100644
index 0000000000000000000000000000000000000000..3541bed8df4fc210190c9b9fb9deb9a1d8fa29dd
--- /dev/null
+++ b/Security/Hack_IT_Security_Through_Penetration_Testing.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:ae58ce52a8a8ef3c86db16b71c8d010a6ac27258bbe5452d5b867ddb9e9f0b1f
+size 4801725
diff --git a/Security/Hacker Disassembling Uncovered.chm b/Security/Hacker Disassembling Uncovered.chm
new file mode 100644
index 0000000000000000000000000000000000000000..096fadd3b2cac42842145917c06e8ef60022b223
--- /dev/null
+++ b/Security/Hacker Disassembling Uncovered.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:6e2aea62c5c5aaf27c10acd2c94477d781a547080baa7d5677212ab5c923186f
+size 4950673
diff --git a/Security/Hacker Linux Uncovered.chm b/Security/Hacker Linux Uncovered.chm
new file mode 100644
index 0000000000000000000000000000000000000000..ec7bfa37bbf92a5f2481885bb130bb8e0c455bce
--- /dev/null
+++ b/Security/Hacker Linux Uncovered.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:90a868bc1fd4631dbf738999ae2e75818f49e32a7e1f67f8261207a3cd93f56e
+size 4681808
diff --git a/Security/Hacker Web Exploitation Uncovered.chm b/Security/Hacker Web Exploitation Uncovered.chm
new file mode 100644
index 0000000000000000000000000000000000000000..56043af436366cef192fb6117bb7e65dff6c9182
Binary files /dev/null and b/Security/Hacker Web Exploitation Uncovered.chm differ
diff --git a/Security/Hacker'S.Delight.chm b/Security/Hacker'S.Delight.chm
new file mode 100644
index 0000000000000000000000000000000000000000..757cb7a4d5ffc96ae37346a372d38bbbd574a4a3
--- /dev/null
+++ b/Security/Hacker'S.Delight.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:4b35c50c579092f84b1715b2664240d4ac643cd5fca6b0254e3abba1bbf790c6
+size 2212948
diff --git a/Security/HackerMonthly/hackermonthly-issue001.zip b/Security/HackerMonthly/hackermonthly-issue001.zip
new file mode 100644
index 0000000000000000000000000000000000000000..ca764c0ab547f06b09c3d4a488bfbad5ff5fa232
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue001.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:3f02e6022bda0d770b4d08a17a1fa7bfcfe9a4bf6b685b1ed0cce3b259a61eeb
+size 3625524
diff --git a/Security/HackerMonthly/hackermonthly-issue002.zip b/Security/HackerMonthly/hackermonthly-issue002.zip
new file mode 100644
index 0000000000000000000000000000000000000000..053d621bb466dc37375790c971038db759f7c870
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue002.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:396c114db087473e8c552c4a8012fa25f53c6d3dae821ea29c6cbf2418b583f8
+size 4679178
diff --git a/Security/HackerMonthly/hackermonthly-issue003.zip b/Security/HackerMonthly/hackermonthly-issue003.zip
new file mode 100644
index 0000000000000000000000000000000000000000..b34ddfa5a6f32c56b582cc6ef60068b58aaa8bc1
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue003.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:8646061c50a322b44a9fa4008aac2132c6ec6dc0011e2a1801b941714771977e
+size 3464440
diff --git a/Security/HackerMonthly/hackermonthly-issue004.zip b/Security/HackerMonthly/hackermonthly-issue004.zip
new file mode 100644
index 0000000000000000000000000000000000000000..a519104055b2b9bfa21da1c9ad530c726651dece
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue004.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:31f2f8cf77c8f56df673cacddd2b8d2deef60cc13af426ae0bf5dfb05e203435
+size 8043047
diff --git a/Security/HackerMonthly/hackermonthly-issue005.zip b/Security/HackerMonthly/hackermonthly-issue005.zip
new file mode 100644
index 0000000000000000000000000000000000000000..4eed4544a70d55937295dfb63c85c99e07b34b67
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue005.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:eeb87cea61fe84ce7dc89fc3f37127ad6ad69a6b76aeeffbeb1f45554ff93a01
+size 4281970
diff --git a/Security/HackerMonthly/hackermonthly-issue006.zip b/Security/HackerMonthly/hackermonthly-issue006.zip
new file mode 100644
index 0000000000000000000000000000000000000000..9c26d2ff884d2af24de63f88ac65a421a888cee4
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue006.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:9d8f667620787a38ba6971757e336264c6b1492893053f595715f64045125141
+size 4668462
diff --git a/Security/HackerMonthly/hackermonthly-issue007.zip b/Security/HackerMonthly/hackermonthly-issue007.zip
new file mode 100644
index 0000000000000000000000000000000000000000..da957c51055fd986a7260f655c6e0b206f4b2552
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue007.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:ddedd5b84bebef62b7f78dd3c7cf48828cf50f384ca6edd32f8c9ed4411c3c3b
+size 6182658
diff --git a/Security/HackerMonthly/hackermonthly-issue008.zip b/Security/HackerMonthly/hackermonthly-issue008.zip
new file mode 100644
index 0000000000000000000000000000000000000000..8419125e19d7ba207fb8d94f90ca8d5f937452ca
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue008.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:504ce8db482ca31e664ebfceb2cc507e3d3ee3f5d39979f0954a478decb7dd0f
+size 7283366
diff --git a/Security/HackerMonthly/hackermonthly-issue009.zip b/Security/HackerMonthly/hackermonthly-issue009.zip
new file mode 100644
index 0000000000000000000000000000000000000000..171192a7414e8719f1aa7240a5890d1d78dfd152
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue009.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:c6c3b0921a090f0aa6ef5cf5804adeaaf6244ba726d7983ae2bf31b430b8a55c
+size 12729320
diff --git a/Security/HackerMonthly/hackermonthly-issue010.zip b/Security/HackerMonthly/hackermonthly-issue010.zip
new file mode 100644
index 0000000000000000000000000000000000000000..acb41c55c421a603d14a449c7df9034357e3c207
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue010.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:007ada42fe68be178bdc4928d93556c8f551b39176a3c701116f307de0383bc6
+size 8453236
diff --git a/Security/HackerMonthly/hackermonthly-issue011.zip b/Security/HackerMonthly/hackermonthly-issue011.zip
new file mode 100644
index 0000000000000000000000000000000000000000..a9c7b97e9089f80a283db380e965c955838130bc
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue011.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:514be8447ff2369c837961f124c0a61e016c5529c0974868037472f47a0888c4
+size 15527961
diff --git a/Security/HackerMonthly/hackermonthly-issue012.zip b/Security/HackerMonthly/hackermonthly-issue012.zip
new file mode 100644
index 0000000000000000000000000000000000000000..478b2abbcb364a38cc9a668e500bb38c802b191b
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue012.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:6af863b01c23e6f13dc46855f2d2116a89d3b00304a447422e442e666726cec1
+size 6781563
diff --git a/Security/HackerMonthly/hackermonthly-issue013.zip b/Security/HackerMonthly/hackermonthly-issue013.zip
new file mode 100644
index 0000000000000000000000000000000000000000..713aec4d9fb73876473c8dac6ba1fa1c301df07c
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue013.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:773577048e3ebf8c2fa0f7360bb2b59abd918f2754d114555fc5d8ff1df51094
+size 4249689
diff --git a/Security/HackerMonthly/hackermonthly-issue014.zip b/Security/HackerMonthly/hackermonthly-issue014.zip
new file mode 100644
index 0000000000000000000000000000000000000000..a1e1847f7b3590e169906a30c1c128df60e07bb1
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue014.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:5762bd5bc817d37b62b98e1f9b69c9f459f33700ee5f78bfde91769ea09d406c
+size 15997975
diff --git a/Security/HackerMonthly/hackermonthly-issue015.zip b/Security/HackerMonthly/hackermonthly-issue015.zip
new file mode 100644
index 0000000000000000000000000000000000000000..610bf2277cde0ab39c7f6b96a64e51f532673856
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue015.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:3fc5a4502b51fd0579e29ef4dd27afaf2892435a40560e1160472679e9d26b16
+size 17199952
diff --git a/Security/HackerMonthly/hackermonthly-issue016.zip b/Security/HackerMonthly/hackermonthly-issue016.zip
new file mode 100644
index 0000000000000000000000000000000000000000..1373a16b52abc4209d560dcc17d34e24188e5352
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue016.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:06cf1f958e03e20c474f2e8674011bef3d6c3e97193459abd79038c68fa80643
+size 23894887
diff --git a/Security/HackerMonthly/hackermonthly-issue017.zip b/Security/HackerMonthly/hackermonthly-issue017.zip
new file mode 100644
index 0000000000000000000000000000000000000000..c795c960f112ad6372bdcdaeec870454107b3181
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue017.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:752b887562c3014910d3896e31ee64aac20541f53aa0b52c76b1f3d79fae64c3
+size 14466251
diff --git a/Security/HackerMonthly/hackermonthly-issue018.zip b/Security/HackerMonthly/hackermonthly-issue018.zip
new file mode 100644
index 0000000000000000000000000000000000000000..ca982b776379f79ac5451ddc0fec8ee55d79054b
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue018.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:dd5c40fcf85173deae4df24bb4e87358e6f80e3bdc9c4e1a4bf0fc0412bc8433
+size 19509666
diff --git a/Security/HackerMonthly/hackermonthly-issue019.zip b/Security/HackerMonthly/hackermonthly-issue019.zip
new file mode 100644
index 0000000000000000000000000000000000000000..4e9adadb274910e75d4dc93e2598f82659155c35
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-issue019.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:aff077f94c024855f85a376cf250b38ff3a28e293b52630ee20a8f5ea5a5af25
+size 29220536
diff --git a/Security/HackerMonthly/hackermonthly-startupstories.zip b/Security/HackerMonthly/hackermonthly-startupstories.zip
new file mode 100644
index 0000000000000000000000000000000000000000..1146bd6675a55ed4e8c95bc3c94d17bbab971beb
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-startupstories.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:faaa9d38163db9ecbb9601908e5fc1a9220b5fe1a21c2d3f82a73c97c44cbe83
+size 6660352
diff --git a/Security/HackerMonthly/hackermonthly-thedebate.zip b/Security/HackerMonthly/hackermonthly-thedebate.zip
new file mode 100644
index 0000000000000000000000000000000000000000..e62931125a29aceb0d414f225e8c9a3fffc771ed
--- /dev/null
+++ b/Security/HackerMonthly/hackermonthly-thedebate.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:16358566b2bd10dc5a4354054275cb48ec88c10c5529bf92c9bbbe20bba62792
+size 2876386
diff --git a/Security/Hackers Beware.pdf b/Security/Hackers Beware.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..7654acafad46001ac75209be9d774b64a5d80d26
--- /dev/null
+++ b/Security/Hackers Beware.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:87c40ac0744731c05ff33b4993adcda3fe77c1ea0dc9f7011f843bc7a692aa52
+size 5136388
diff --git a/Security/Hackers, Heroes Of The Computer Revolution.pdf b/Security/Hackers, Heroes Of The Computer Revolution.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..585abd39bd7ff6ccf77b210558b09589f8398cbc
Binary files /dev/null and b/Security/Hackers, Heroes Of The Computer Revolution.pdf differ
diff --git a/Security/Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf b/Security/Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..31a929b0b8a92bee1760b8bdf0badb1092c83650
--- /dev/null
+++ b/Security/Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:983550099b4921096b0cac05a9b21005328f964cd7fbd5f52dd025a36932c8ef
+size 2997209
diff --git a/Security/Hacking Cisco Routers.pdf b/Security/Hacking Cisco Routers.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..b0476d941adda956bb694b00c021a1de4de5de45
Binary files /dev/null and b/Security/Hacking Cisco Routers.pdf differ
diff --git a/Security/Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf b/Security/Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..44689f78f30a0c27a22220e71abd431ace4de78b
--- /dev/null
+++ b/Security/Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:c006b27d91227d1414bdf1dad053c1ed5449842f2f4ddc8b0f549ad4cf6465eb
+size 10585232
diff --git a/Security/Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf b/Security/Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..57e100b18d384f8dc90bc4f9e7c7ac9525f2cee3
--- /dev/null
+++ b/Security/Hacking Exposed Network Security Secrets & Solutions, Third Edition ch1.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:5eac9fef35a7439e7255099dcd33fc3cdff55f3652d36b888ec65279d33c5f01
+size 1973480
diff --git a/Security/Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf b/Security/Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf
new file mode 100644
index 0000000000000000000000000000000000000000..fd5d501e010ae0999faacaeec57ea7f38b3657f9
--- /dev/null
+++ b/Security/Hacking Exposed-Network Security - Secrets & Solutions, 2nd Ed..pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:b5139c1b09ec530144beaaeb01425f15f8617db6c2ac5143cb3c0d96446c9f12
+size 8438744
diff --git a/Security/Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf b/Security/Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf
new file mode 100644
index 0000000000000000000000000000000000000000..b4726c567bf0d75ab49f4cd4d60bf4e4f1f3bcfd
--- /dev/null
+++ b/Security/Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed..pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:3ce58a16493e6fca8e25825546ddc368905e4bb115ae465af3fd4c1ad8357b74
+size 6135740
diff --git a/Security/Hacking Exposed-Network Security - Secrets & Solutions, 5th Ed..chm b/Security/Hacking Exposed-Network Security - Secrets & Solutions, 5th Ed..chm
new file mode 100644
index 0000000000000000000000000000000000000000..a655402e70e8e2eaa4a0c76f16253755d421d221
--- /dev/null
+++ b/Security/Hacking Exposed-Network Security - Secrets & Solutions, 5th Ed..chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:7e46e2f1a22d5dddb7a5adfb9282cc08c13892541fe4366821fdb0a5c64c02c6
+size 19438132
diff --git a/Security/Hacking Exposed-VoIP - Voice over IP Security, Secrets, & Solutions.chm b/Security/Hacking Exposed-VoIP - Voice over IP Security, Secrets, & Solutions.chm
new file mode 100644
index 0000000000000000000000000000000000000000..5af3959c7f9814bc58cbb8dc4a5dc669b79bc532
--- /dev/null
+++ b/Security/Hacking Exposed-VoIP - Voice over IP Security, Secrets, & Solutions.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:67ce0def9e64ac46105b1ddf1487ccc5d74e097429862d262ad7e046525a56a1
+size 17142189
diff --git a/Security/Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf b/Security/Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..5909c365e24c7b1fe2cf17a94c9110378efa4171
--- /dev/null
+++ b/Security/Hacking Exposed-Web 2.0 - Web 2.0 Security Secrets & Solutions.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:1b4f5a3c721ef47c5a0fb96b1b2f16ee4c0b195a9e0945477589368badf0ddd1
+size 6593274
diff --git a/Security/Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf b/Security/Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf
new file mode 100644
index 0000000000000000000000000000000000000000..1cc313ef5996dcca89f4d7462993c491c7117a26
--- /dev/null
+++ b/Security/Hacking Exposed-Windows - Windows Security Secrets & Solutions, 3rd Ed..pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:9240b815779249c4634bfd84fa870c51363f138d55ef04352a1e3a68eecbe736
+size 9499715
diff --git a/Security/Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm b/Security/Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm
new file mode 100644
index 0000000000000000000000000000000000000000..d84f0cf155f2fd2f6518e0cb9e877eac22813934
--- /dev/null
+++ b/Security/Hacking Exposed-Wireless - Wireless Security Secrets & Solutions.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:5bf0413e6e9bc85f0d915fbe020c70884c190b4a3cb0c3cf50bcbc8d0db664e6
+size 12832783
diff --git a/Security/Hacking For Dummies 1.pdf b/Security/Hacking For Dummies 1.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..d4d62a54a6a77fe37f3b9b71ab4b1fc70cc8e8bf
Binary files /dev/null and b/Security/Hacking For Dummies 1.pdf differ
diff --git a/Security/Hacking For Dummies 2.pdf b/Security/Hacking For Dummies 2.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..6046180e9473e16428ed84e59230affbbe24fa49
Binary files /dev/null and b/Security/Hacking For Dummies 2.pdf differ
diff --git a/Security/Hacking For Dummies.pdf b/Security/Hacking For Dummies.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..e8a3143d34d286ea82db0e7b55ae27a54ab96183
Binary files /dev/null and b/Security/Hacking For Dummies.pdf differ
diff --git a/Security/Hacking IIS Servers.pdf b/Security/Hacking IIS Servers.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..f182f2c2b3a863491b7769e39cc192ab815ea21f
Binary files /dev/null and b/Security/Hacking IIS Servers.pdf differ
diff --git a/Security/Hacking Windows XP.pdf b/Security/Hacking Windows XP.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..4d8633e12a9888123beced6ccaf120dda8581fb3
--- /dev/null
+++ b/Security/Hacking Windows XP.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:aabb060539c62615867ea72593d45c442fd75c33e910bd3d29591bc0eea02c3f
+size 10629297
diff --git a/Security/Hacking for Dummies (2004).pdf b/Security/Hacking for Dummies (2004).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..5e3605d481e8f60426af0cb0490d28f35af61456
--- /dev/null
+++ b/Security/Hacking for Dummies (2004).pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:9db24bfd826f976fa5b9e2e8a8e2a3ee33ec22b22072833709478df91436ec3e
+size 9732415
diff --git a/Security/Hacking into computer systems - a beginners guide.pdf b/Security/Hacking into computer systems - a beginners guide.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..4c53a7421577be97bb2847026da831cda66cf363
Binary files /dev/null and b/Security/Hacking into computer systems - a beginners guide.pdf differ
diff --git a/Security/Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm b/Security/Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm
new file mode 100644
index 0000000000000000000000000000000000000000..d858758edcd6ccef7eb0b9e02374ddf8313e66cb
--- /dev/null
+++ b/Security/Hacking the Code - ASP.NET Web Application Security Cookbook (2004) .chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:4526a4b070d7249563cf1654a4227cc6d24d4e9e29988f9eb0a06f634a622163
+size 5054559
diff --git a/Security/Hacking-Hacker's Guide.pdf b/Security/Hacking-Hacker's Guide.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..996769d8b968bd157380e3c12b94785677e85601
--- /dev/null
+++ b/Security/Hacking-Hacker's Guide.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:e005cafe874869696ba2fdc7c231d604ed1ec8ce919b9e1d146a625a79ffa711
+size 3845832
diff --git a/Security/Hacking-The Hacker Crackdown.pdf b/Security/Hacking-The Hacker Crackdown.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..9891d4ddfe5abc650a310afefb01d372073e8558
Binary files /dev/null and b/Security/Hacking-The Hacker Crackdown.pdf differ
diff --git a/Security/Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf b/Security/Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..cdd26429e03bdbf4efa0c16ffd3ee60ed13d15c2
Binary files /dev/null and b/Security/Hacking-ebook - CIA-Book-of-Dirty-Tricks1.pdf differ
diff --git a/Security/Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf b/Security/Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..a33fa946263538b760277bbc22854e8090f443bf
--- /dev/null
+++ b/Security/Hacking.For.Dummies.Access.To.Other.People's.System.Made.Simple.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:4b82030d515b23141e991a9bd6ae0a56f6e2a621e84a7ad30d55a056cc2071cd
+size 1325743
diff --git a/Security/Hacking.Guide.V3.1.pdf b/Security/Hacking.Guide.V3.1.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..1491580de79ef234a75a77ee01d323ed9c932c77
--- /dev/null
+++ b/Security/Hacking.Guide.V3.1.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:5642b5fd57ab06d3f07c54c62e9e19ae2b481c0682ffaefba65288589227982e
+size 1246523
diff --git a/Security/Hackproofing Oracle Application Server.pdf b/Security/Hackproofing Oracle Application Server.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..d965e4c0e96704a6ed625eb29abf19718b1f1479
Binary files /dev/null and b/Security/Hackproofing Oracle Application Server.pdf differ
diff --git a/Security/John Wiley & Sons - Hacking For Dummies.pdf b/Security/John Wiley & Sons - Hacking For Dummies.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..14b54d7c58b186a2e51920453c186d48d9cedf1f
--- /dev/null
+++ b/Security/John Wiley & Sons - Hacking For Dummies.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:67754f8d374aaad1e744338f1249cac47bb806914c50ecaab65b0c266ca8c3d6
+size 9732004
diff --git a/Security/John Wiley and Sons.Hacking GMail (ExtremeTech).pdf b/Security/John Wiley and Sons.Hacking GMail (ExtremeTech).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..08bd1e9209af53724f91dcda58866762f0f8e356
--- /dev/null
+++ b/Security/John Wiley and Sons.Hacking GMail (ExtremeTech).pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:2e5af896140c5c861cbae6542b50c6c79e66787f25846ee5f65d0e581e487a11
+size 5545032
diff --git a/Security/John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf b/Security/John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..9ab961aefecb660dee327ddbe4618a46b047204e
--- /dev/null
+++ b/Security/John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:d0a0d65b9a7e9ff67bf66c016752718dbfb2348269e3f620be7c3a5ccd6d9db9
+size 3216746
diff --git a/Security/Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm b/Security/Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm
new file mode 100644
index 0000000000000000000000000000000000000000..b348e66bb08d48a41d1b689e1946f6297ec723f8
--- /dev/null
+++ b/Security/Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:ee16690287b252c084411692b0de685ace0f46b6f1e9f8603021e409fa377590
+size 1467971
diff --git a/Security/Jonathan_Katz,_Yehuda_Lindell-Introduction_to_Modern_Cryptography__Principles_and_Protocols-Chapman_and_Hall_CRC(2007).pdf b/Security/Jonathan_Katz,_Yehuda_Lindell-Introduction_to_Modern_Cryptography__Principles_and_Protocols-Chapman_and_Hall_CRC(2007).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..d889d03f5e2b9f33b5a37acef17920132070fb17
Binary files /dev/null and b/Security/Jonathan_Katz,_Yehuda_Lindell-Introduction_to_Modern_Cryptography__Principles_and_Protocols-Chapman_and_Hall_CRC(2007).pdf differ
diff --git a/Security/Linux-Server.Hacks-OReilly.pdf b/Security/Linux-Server.Hacks-OReilly.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..dfe526514fc8f3d2b2091e16cc27f9c91f9c0470
--- /dev/null
+++ b/Security/Linux-Server.Hacks-OReilly.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:955a912317a9d0dcc7bea08396113e1f34a84ed643dd735ae15aa821a33ca4f0
+size 35660828
diff --git a/Security/McGraw Hill - Web Applications (Hacking Exposed).pdf b/Security/McGraw Hill - Web Applications (Hacking Exposed).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..3cf179b61e6b74a144806d8489c78cd1754daf65
--- /dev/null
+++ b/Security/McGraw Hill - Web Applications (Hacking Exposed).pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:fabdb754d68bff232d78fa828594cce3dcb076ad38ce2e54483e485299670f99
+size 7969947
diff --git a/Security/McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf b/Security/McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..950e55bfd5c00fc06cfc37666407139b8d8f5b88
--- /dev/null
+++ b/Security/McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:38fd9f4e454dc591259edf44f418e7b641701b71c7128abf80bf6c6449dc448d
+size 6135740
diff --git a/Security/McGraw-Hill - Linux and Unix Security Portable Reference.pdf b/Security/McGraw-Hill - Linux and Unix Security Portable Reference.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..2f4d159ab0594217dedc1fb560179fa967221193
--- /dev/null
+++ b/Security/McGraw-Hill - Linux and Unix Security Portable Reference.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:6b583e78bd4ae96af05c94cda612abf7dbdc9f818bf2dcbaf6acc882dc5f0f3e
+size 3686338
diff --git a/Security/McGraw.Hacking.Exposed.Cisco.Networks.chm b/Security/McGraw.Hacking.Exposed.Cisco.Networks.chm
new file mode 100644
index 0000000000000000000000000000000000000000..00b3c20bf6208f9b530ec77ab0183f68d4e63269
--- /dev/null
+++ b/Security/McGraw.Hacking.Exposed.Cisco.Networks.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:146aa8ea47348e199ba3db8858997cdb846ac7a0604df912f2e621710d330714
+size 10292333
diff --git a/Security/McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf b/Security/McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..94ab50abbb8b847df9a916932c09b22ff9fbb9dd
--- /dev/null
+++ b/Security/McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:2d4906700a8f86f54f9cf27af2135aa47720e35c58d325c24602525f358dade7
+size 3576662
diff --git a/Security/McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf b/Security/McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..210ae6d6c3a6351f84af540cff37b5ba292ac6e8
--- /dev/null
+++ b/Security/McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:59f452802fe43d7267102c88e1b4226cd5eaebd2b32dd5a41d7eb282d71acad8
+size 3771857
diff --git a/Security/McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf b/Security/McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..abbfaf2bb85083047ca312cbe6103dac581b4adb
--- /dev/null
+++ b/Security/McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:e1e9079c10be3bfc8d44f60852544e6a316440b8e1151ee592ffb1804e5630e9
+size 3513514
diff --git a/Security/McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf b/Security/McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..c61d0db591c5b12032109c3f79571f9e33ddb3c7
--- /dev/null
+++ b/Security/McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eB.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:ee8262881730b4b3c9c3c16c19c828daa786c5e093aeeef39869183396e4f84b
+size 5036250
diff --git a/Security/Mind Hacks - Tips & Tricks for Using Your Brain.chm b/Security/Mind Hacks - Tips & Tricks for Using Your Brain.chm
new file mode 100644
index 0000000000000000000000000000000000000000..b48b6c55857d3ef23892e1e34d4603bc69132111
--- /dev/null
+++ b/Security/Mind Hacks - Tips & Tricks for Using Your Brain.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:de56e273ffa79452344f7f8b9484b0653aed5e5737201e538c4803592233acff
+size 3588699
diff --git a/Security/No Starch Press - Hacking The Art of Exploitation 2nd Edition.chm b/Security/No Starch Press - Hacking The Art of Exploitation 2nd Edition.chm
new file mode 100644
index 0000000000000000000000000000000000000000..27aa201d6999e374f859301aacc93c1b13547ec6
--- /dev/null
+++ b/Security/No Starch Press - Hacking The Art of Exploitation 2nd Edition.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:ac4ed789c5dd9ad798d6af1bfc1494811f3387050d7996dd85729d1bc1a3a614
+size 4900023
diff --git a/Security/No Starch Press - PGP and GPG Email for the Practical Paranoid.pdf b/Security/No Starch Press - PGP and GPG Email for the Practical Paranoid.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..108db4fd2ed486cf2bf70b11cd6ea9c92a903561
--- /dev/null
+++ b/Security/No Starch Press - PGP and GPG Email for the Practical Paranoid.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:14fcdda3ccad0efd931a3317f17c845971300ffccd887ff4307ac38e14c995d6
+size 3530846
diff --git a/Security/O'Reilly - Online Investing Hacks.chm b/Security/O'Reilly - Online Investing Hacks.chm
new file mode 100644
index 0000000000000000000000000000000000000000..05146fa04bc1abd7b18af148329b98a1e82f0cab
--- /dev/null
+++ b/Security/O'Reilly - Online Investing Hacks.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:eea0d5d282da66b3453c864bfb85240ddf3b3bb5b9cc22cbf8207385a7f72d39
+size 5234685
diff --git a/Security/O'Reilly Secure Coding Principles and Practices.chm b/Security/O'Reilly Secure Coding Principles and Practices.chm
new file mode 100644
index 0000000000000000000000000000000000000000..0fd79c1b1db1299a600d2cbbad8288a8e2a504e1
Binary files /dev/null and b/Security/O'Reilly Secure Coding Principles and Practices.chm differ
diff --git a/Security/O'Reilly Security Power Tools.pdf b/Security/O'Reilly Security Power Tools.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..84f36ac1e5bddf541012a649159ac9b9d12a93c5
--- /dev/null
+++ b/Security/O'Reilly Security Power Tools.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:33adaa60f87437e26db23cd7fde92aa47d59b5dee67be2a880390537391eeedb
+size 10842995
diff --git a/Security/O'Reilly Security and Usability Designing Secure Systems that People Can Use.chm b/Security/O'Reilly Security and Usability Designing Secure Systems that People Can Use.chm
new file mode 100644
index 0000000000000000000000000000000000000000..67c4e0eaccd9b15338b21bc976f8c7abbf34f29b
--- /dev/null
+++ b/Security/O'Reilly Security and Usability Designing Secure Systems that People Can Use.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:d9fc5bddf125785545d9f70238f8e3c58c42914c640ff5c11795d83120dc3fae
+size 7954759
diff --git a/Security/O'Reilly.-.Network.Security.Hacks.chm b/Security/O'Reilly.-.Network.Security.Hacks.chm
new file mode 100644
index 0000000000000000000000000000000000000000..44b789567e1480ad736a106223632b2594ad1493
--- /dev/null
+++ b/Security/O'Reilly.-.Network.Security.Hacks.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:5bac1e870767788fb6068de110a152ad9b8a6488e2b841ffe37ab4fffe551674
+size 1705980
diff --git a/Security/O'Reilly.Windows.Server.Hack.zip b/Security/O'Reilly.Windows.Server.Hack.zip
new file mode 100644
index 0000000000000000000000000000000000000000..47ccad3cc5d51eb289291b1d2ff445e5521d75c0
--- /dev/null
+++ b/Security/O'Reilly.Windows.Server.Hack.zip
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:ab012ddc6ebaf83a262297751d50ffa251c0a0ea070f8bf548b7c7d80b649195
+size 1893520
diff --git a/Security/OReilly Google Hacks, 1st Edition2003.pdf b/Security/OReilly Google Hacks, 1st Edition2003.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..ae82740a77d2348edb8b98e721bdc5f198464373
--- /dev/null
+++ b/Security/OReilly Google Hacks, 1st Edition2003.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:f5f08470415853df43df16ee41932840bbbd78f7b653743cb8879f137f65ebfa
+size 2992172
diff --git a/Security/OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm b/Security/OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm
new file mode 100644
index 0000000000000000000000000000000000000000..ebe6818bf5af77576284b795161bdfffd1ad4532
--- /dev/null
+++ b/Security/OReilly - Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:53ef07ab58a48f7db6791af19bfc9c17b92863853af136ffc9f38587f164efb5
+size 5706258
diff --git a/Security/OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm b/Security/OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm
new file mode 100644
index 0000000000000000000000000000000000000000..bad9b7e4a9a7fbed7a79b7117f34e459070431cd
--- /dev/null
+++ b/Security/OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:75320b4d952abbba535d5cf1c809cc37a9ef65472aa1e534095032e458212f8f
+size 3155757
diff --git a/Security/OReilly,.IRC.Hacks.(2004).DDU.chm b/Security/OReilly,.IRC.Hacks.(2004).DDU.chm
new file mode 100644
index 0000000000000000000000000000000000000000..0045f632eaf0b9aef7db0d27de269a40c254ed63
--- /dev/null
+++ b/Security/OReilly,.IRC.Hacks.(2004).DDU.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:9862b1512ad76a7cb0808d8a1b3c6a91c51b4704405b88bb64ea4517a0c4b60d
+size 3359887
diff --git a/Security/OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm b/Security/OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm
new file mode 100644
index 0000000000000000000000000000000000000000..865dbd3f3f3cd31e55ff90ba1a5f0932d68e5450
--- /dev/null
+++ b/Security/OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:512a5dbc53fa1f14a9e903f7df3738ec573645946432865fa5e31b523ef2ce28
+size 5482062
diff --git a/Security/OReilly.Google.Maps.Hacks.Jan.2006.chm b/Security/OReilly.Google.Maps.Hacks.Jan.2006.chm
new file mode 100644
index 0000000000000000000000000000000000000000..1d7f19b4340bf91796c15cb5086d3f49cbc4f106
--- /dev/null
+++ b/Security/OReilly.Google.Maps.Hacks.Jan.2006.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:9c9e30c1329c2b00e9a17d286a4779e71301c95ceee8dfbf411bd6647bd871a4
+size 9262697
diff --git a/Security/OReilly.Linux.Security.Cookbook.pdf b/Security/OReilly.Linux.Security.Cookbook.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..0f7ab00c10e3a1e98725341961a405367f74f64a
--- /dev/null
+++ b/Security/OReilly.Linux.Security.Cookbook.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:f77460cac50f6619d483e9ccccfd7f80062e18c677b96c3cf6857baf4b2563e8
+size 2079010
diff --git a/Security/OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm b/Security/OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm
new file mode 100644
index 0000000000000000000000000000000000000000..66fcb774dc0d56efbdcf133033de354343b061c2
--- /dev/null
+++ b/Security/OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:f75d77b28eb05feb926f79cdcc2b22584311e02dbd5e8571dd74031f1cf985f3
+size 2263476
diff --git a/Security/OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm b/Security/OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm
new file mode 100644
index 0000000000000000000000000000000000000000..d7ed1efeb34ab5c798e1168da97f46f87bf16fe1
--- /dev/null
+++ b/Security/OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:be6cf80816d0bf35829ce9272758de34bf6ae4a26150698e90dfabacb0f9fea2
+size 6253633
diff --git a/Security/OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm b/Security/OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm
new file mode 100644
index 0000000000000000000000000000000000000000..0c1ec0036a209044bae5c533db6860d6901dc7d3
Binary files /dev/null and b/Security/OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm differ
diff --git a/Security/OReilly.SQL.Hacks.Nov.2006.chm b/Security/OReilly.SQL.Hacks.Nov.2006.chm
new file mode 100644
index 0000000000000000000000000000000000000000..3b5dad52afb26da4af81966fda33307b6ba99bfe
--- /dev/null
+++ b/Security/OReilly.SQL.Hacks.Nov.2006.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:1bb9cac9e6fddfdb1e535b491323af7bc29577ebe17e95065b0b7b4aa4abe74e
+size 2063217
diff --git a/Security/OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm b/Security/OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm
new file mode 100644
index 0000000000000000000000000000000000000000..26fdfc8800f0498b0035e32d200b20ffef38b330
--- /dev/null
+++ b/Security/OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:d68f6457b1d8398d44ae344e40961ad43db4dd520bb9d65cd823be3145c05394
+size 3866677
diff --git a/Security/OReilly.Statistics.Hacks.May.2006.chm b/Security/OReilly.Statistics.Hacks.May.2006.chm
new file mode 100644
index 0000000000000000000000000000000000000000..c6f0653dbd04d8d7bbd87d9dc0120c0dd694da13
--- /dev/null
+++ b/Security/OReilly.Statistics.Hacks.May.2006.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:aca64375a2e17bd66ad378859555ab92efdb186cee374cd38cae8fade28803a1
+size 1090880
diff --git a/Security/OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm b/Security/OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm
new file mode 100644
index 0000000000000000000000000000000000000000..32ee345498fc0cf191384a7f5942329839ee775e
--- /dev/null
+++ b/Security/OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:55de44013e792913bc32cdad107abe017e774873cd9f6ad4e8fcd272af22fc2a
+size 3870142
diff --git a/Security/OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm b/Security/OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm
new file mode 100644
index 0000000000000000000000000000000000000000..3e7c424003e8c4ab1df60b2fa19a7ffe695be8db
--- /dev/null
+++ b/Security/OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:1183801e8d2561d0feb61bcb0d94ce66bad67d52568145188bd8ee5a9fc612b0
+size 2660014
diff --git a/Security/OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm b/Security/OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm
new file mode 100644
index 0000000000000000000000000000000000000000..2d2f7c204756068906fbcb746c1b21136f1e3b83
--- /dev/null
+++ b/Security/OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:0cb9759b353021141764976b02fd76e35c353cd25dc55b4a47d083f8086bf6cc
+size 3666899
diff --git a/Security/OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm b/Security/OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm
new file mode 100644
index 0000000000000000000000000000000000000000..e49cb089b3a74a332f52f108011b47c9004c6220
--- /dev/null
+++ b/Security/OSB.Ethical.Hacking.and.Countermeasures.EC.Council.Exam.312.50.Student.Courseware.eBook-LiB.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:16d0361165409ba4018c7df055058cdc51597496086860a2b263803f3ffb8c31
+size 14832728
diff --git a/Security/O_Reilly_-_Windows_XP_Hacks.chm b/Security/O_Reilly_-_Windows_XP_Hacks.chm
new file mode 100644
index 0000000000000000000000000000000000000000..ac46ad0d5efd3025cd50cc67e2fbcbf70364e13b
--- /dev/null
+++ b/Security/O_Reilly_-_Windows_XP_Hacks.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:208ca2f4dec530279e965c8135c3141739a6d6cdffebfe142fa772d523045767
+size 5434215
diff --git a/Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications(2009).pdf b/Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications(2009).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..6d0eab5c0c2d83cf1ab240b8e2b31b6cf70b5e6d
--- /dev/null
+++ b/Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications(2009).pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:00994a316d94e5401075d6fa555aff11a588028c179dc3c209b455bd7aea022e
+size 1974907
diff --git a/Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications-Cambridge_University_Press(2009).pdf b/Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications-Cambridge_University_Press(2009).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..4643d973583c2d980e360f63aa274e254bbf7644
--- /dev/null
+++ b/Security/Oded_Goldreich-Foundations_of_Cryptography__Volume_2,_Basic_Applications-Cambridge_University_Press(2009).pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:74f5419c505ba6bb744d572bdc52e59a0fede59c4d824f154b1629a4bf0c14b1
+size 2087127
diff --git a/Security/Oreilly Access Hacks Apr 2005.chm b/Security/Oreilly Access Hacks Apr 2005.chm
new file mode 100644
index 0000000000000000000000000000000000000000..cef3306ba918dfdd077a5fee4ea0c39a3cae11aa
--- /dev/null
+++ b/Security/Oreilly Access Hacks Apr 2005.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:1c9135f8417e75bfc2d3d74c1ef5e6df289a59861ea4f942c89fb10594a0275e
+size 19382187
diff --git a/Security/Oreilly, Paypal Hacks (2004) Ddu.chm b/Security/Oreilly, Paypal Hacks (2004) Ddu.chm
new file mode 100644
index 0000000000000000000000000000000000000000..4c0d1574e455e203991c1cb20957ce9cef61b0bf
--- /dev/null
+++ b/Security/Oreilly, Paypal Hacks (2004) Ddu.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:41467c6f27f8ff9ddd9a0e55badb6c7daa4c777aceff8f156e6a2c3349f98c5e
+size 1975617
diff --git a/Security/Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm b/Security/Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm
new file mode 100644
index 0000000000000000000000000000000000000000..d1194435db6c22fc481a977b20b757bf497540c4
Binary files /dev/null and b/Security/Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm differ
diff --git a/Security/PC Games - How to Crack CD Protection.pdf b/Security/PC Games - How to Crack CD Protection.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..0bd7d020faa3cda3e0dcd5e8f8702efa18dca983
Binary files /dev/null and b/Security/PC Games - How to Crack CD Protection.pdf differ
diff --git a/Security/Que - UNIX Hints Hacks.chm b/Security/Que - UNIX Hints Hacks.chm
new file mode 100644
index 0000000000000000000000000000000000000000..9e3db741de145bd22356b34ce8ca44f84c6c7eea
Binary files /dev/null and b/Security/Que - UNIX Hints Hacks.chm differ
diff --git a/Security/Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm b/Security/Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm
new file mode 100644
index 0000000000000000000000000000000000000000..e59520aaf90700bcf969771610c1012c0adc203c
--- /dev/null
+++ b/Security/Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:ff52cc13a027ab4b85f03049742c7e02020714a05807d84ca6cd72a84b3c1c02
+size 8651798
diff --git a/Security/SQL Injection Attacks and Defense.pdf b/Security/SQL Injection Attacks and Defense.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..8976ba72badbf92483249c33afc2a253c90471db
--- /dev/null
+++ b/Security/SQL Injection Attacks and Defense.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:b68fad4a1fef7849cec31b7f35cadbaab861f12407dfac3527ffe8c42bef4c51
+size 3503171
diff --git a/Security/SQLInjectionWhitePaper.pdf b/Security/SQLInjectionWhitePaper.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..bb0dc14baaed8678089457c0bc83072543d430aa
Binary files /dev/null and b/Security/SQLInjectionWhitePaper.pdf differ
diff --git a/Security/Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm b/Security/Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm
new file mode 100644
index 0000000000000000000000000000000000000000..0c05a705567b77146608ac02817209a5159c32d6
--- /dev/null
+++ b/Security/Security and Hacking - Anti-Hacker Tool Kit Second Edition.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:1351b4dc2b5651ab03e5668dcfd47dc99e7ff34dc7296f640b4f01200bb3376f
+size 30245817
diff --git a/Security/SoTayHacker1.0.chm b/Security/SoTayHacker1.0.chm
new file mode 100644
index 0000000000000000000000000000000000000000..5a0e0c656ef81d734d6b7e272ecc505006d84dd7
--- /dev/null
+++ b/Security/SoTayHacker1.0.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:7e04e5d2c036db7d479106bc3c3bd5179d1e784f5e2219e9de8c8a3c697293e4
+size 79910109
diff --git a/Security/Springer.Insider.Attack.and.Cyber.Security.Beyond.the.Hacker.Apr.2008.eBook-DDU.pdf b/Security/Springer.Insider.Attack.and.Cyber.Security.Beyond.the.Hacker.Apr.2008.eBook-DDU.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..ad1c9247fde7681b37c9f0284522e3ff5f8d4448
--- /dev/null
+++ b/Security/Springer.Insider.Attack.and.Cyber.Security.Beyond.the.Hacker.Apr.2008.eBook-DDU.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:db5d21dbd73255128969b619776201f8999daac43b6cfb3eb5b37172066aea2c
+size 2587998
diff --git a/Security/Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf b/Security/Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..be969e1ac63083cb8236e8f1b38ba23eedb72610
--- /dev/null
+++ b/Security/Springer.Networked.RFID.Systems.and.Lightweight.Cryptography.Dec.2007.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:76ba404c1526190d6573406df8cc81754e0a42a9ad83372ff18d4bbe0716d3a4
+size 6754172
diff --git a/Security/Springer.Open.Source.Systems.Security.Certification.Nov.2008.eBook-DDU.pdf b/Security/Springer.Open.Source.Systems.Security.Certification.Nov.2008.eBook-DDU.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..b3ae2a9d19cf14ff4b2f19cca046789949e75343
--- /dev/null
+++ b/Security/Springer.Open.Source.Systems.Security.Certification.Nov.2008.eBook-DDU.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:f2d65873f9fe478cfaa0c1f186df1c91638fc53ad7e92300354b6d3952944025
+size 3084195
diff --git a/Security/Stamp M., Low R.M. Applied cryptanalysis...pdf b/Security/Stamp M., Low R.M. Applied cryptanalysis...pdf
new file mode 100644
index 0000000000000000000000000000000000000000..d01f93f717c3ebf9cdafeef8b8fdac2ac5597fa9
--- /dev/null
+++ b/Security/Stamp M., Low R.M. Applied cryptanalysis...pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:c14d4a7578ad5347a108e62e91f7a104f7cd6ac0b820678c6ebe2588fae11ed9
+size 18486003
diff --git a/Security/Syngress - Hack Proofing Linux (2001).pdf b/Security/Syngress - Hack Proofing Linux (2001).pdf
new file mode 100644
index 0000000000000000000000000000000000000000..40083ed176fdad392afffefb5f568a845cea6845
--- /dev/null
+++ b/Security/Syngress - Hack Proofing Linux (2001).pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:03cd98fe547eedf7ee2bb8676f52c864a2a8a517d0db423b12f1bfb11ce2f0fa
+size 12388352
diff --git a/Security/Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf b/Security/Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..046f32b50518db8c5f91ab3620a6ec9cf0de173a
--- /dev/null
+++ b/Security/Syngress - Hacking a Terror Network. The Silent Threat of Covert Channels.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:51ceb482974da1b9678157e221596ee3b35dbdb4fd4e8be0612efa03ff8c144a
+size 9788667
diff --git a/Security/Syngress -- Hack Proofing Your Wireless Network.pdf b/Security/Syngress -- Hack Proofing Your Wireless Network.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..9309525e3f88a847761830f773113ec2433bdbb4
--- /dev/null
+++ b/Security/Syngress -- Hack Proofing Your Wireless Network.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:38c2f622f90c45ba9e45419feba6cea7d18c9011bc31c35cd3ae5883fdb9077f
+size 6923604
diff --git a/Security/Syngress Hack Proofing Your Identity in the Information Age.pdf b/Security/Syngress Hack Proofing Your Identity in the Information Age.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..0a3bfa6e060c1bc2ba1ad5d51d0a0ad5b3c88f00
--- /dev/null
+++ b/Security/Syngress Hack Proofing Your Identity in the Information Age.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:354aefcb54e8eca364bb7197b33e6862f379988e9b1300ae1ca364604ef76469
+size 9331351
diff --git a/Security/Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf b/Security/Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..9cc8aa80fb3e014c5e418a60997683448475b531
--- /dev/null
+++ b/Security/Syngress.Buffer.Overflow.Attacks.Dec.2004.eBook-DDU.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:36b626f8a48fcb0fb527dfff6cf29d835ed4f0f56a9a30faf0cd4ed4bf3ea946
+size 5639419
diff --git a/Security/Syngress.Coding.for.Penetration.Testers.Oct.2011.pdf b/Security/Syngress.Coding.for.Penetration.Testers.Oct.2011.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..f191c5d31114371a5f9c554c427b31b8d1c0b0bb
--- /dev/null
+++ b/Security/Syngress.Coding.for.Penetration.Testers.Oct.2011.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:32dc9c6590d79cf2a4199a9abe50d3b60d21abdde116efe1ab8fe727e13ca3bd
+size 10208638
diff --git a/Security/Syngress.Hack.the.Stack.Oct.2006.pdf b/Security/Syngress.Hack.the.Stack.Oct.2006.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..a5fa3bfdb44ba21a266814a651d38e627e707d65
--- /dev/null
+++ b/Security/Syngress.Hack.the.Stack.Oct.2006.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:a086d3c360d94378b81be7cb4e63c9640dda48af3f19fe026503e50e362a4c67
+size 7539500
diff --git a/Security/Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf b/Security/Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..777389cfe37ed2339a80e3a15c45fdf3e2c11186
--- /dev/null
+++ b/Security/Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:9b6995e5175f53cb1c9030860d6414622697815e20c1ab09710a8849bcaa0b8b
+size 8646216
diff --git a/Security/Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.pdf b/Security/Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..008913060527bdb335385b9efd7156e46a175448
--- /dev/null
+++ b/Security/Syngress.Penetration.Testers.Open.Source.Toolkit.3rd.Edition.Aug.2011.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:fb8258dccccbeabc6d00bfead57b1c5483db9cf7bab6eca877428c8a6dbdb29e
+size 31230770
diff --git a/Security/Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.pdf b/Security/Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..42b1a58e0129280530687ed12de22cdb81de2e9f
--- /dev/null
+++ b/Security/Syngress.The.Basics.of.Hacking.and.Penetration.Testing.Aug.2011.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:fb74677e210d3306dd5869873af1dfe19a51daadc679545be6d3aaf4bb2f0b5f
+size 7027591
diff --git a/Security/The_Business_of_Cybercrime.pdf b/Security/The_Business_of_Cybercrime.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..40a6603832a1aefba8932a857ca6c7960f20a102
--- /dev/null
+++ b/Security/The_Business_of_Cybercrime.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:72a36703b4a3e8b548d6872bb1a880a551e46ebd0b42b2bdfa4cb4cef659ab53
+size 4901604
diff --git a/Security/Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf b/Security/Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..bed3ac4b46af646b6c3533e36fe1bb951d4f176b
--- /dev/null
+++ b/Security/Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:40f9580b63f93bd73362e3fdf5bcd66151245109f1d9877e1d6026b3bfb9175b
+size 5165339
diff --git a/Security/Wiley-Principles.of.Computer.Security.2010.RETAiL.EBook.pdf b/Security/Wiley-Principles.of.Computer.Security.2010.RETAiL.EBook.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..10e59455422d75e72680621b35891acf6e0636c3
--- /dev/null
+++ b/Security/Wiley-Principles.of.Computer.Security.2010.RETAiL.EBook.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:a94a3a41c7615aee09ed35782659d6428b55809b66155666489874ec6f759b89
+size 5820049
diff --git a/Security/Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf b/Security/Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..9f5cb9a7e5a2faffead15e3f1c9c4f431777c40a
--- /dev/null
+++ b/Security/Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:a34af7b55e335afc8cdc207a07b697f2952eeedf1e3612edbfb2a1c302cb15c3
+size 14267328
diff --git a/Security/Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf b/Security/Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..f2ccfb850f3e46612ff7472fc76c08d54c00d802
--- /dev/null
+++ b/Security/Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:e291eed266ab191c521214b28f6ae45f869adba2b2724586bb0b2b326079c924
+size 10899628
diff --git a/Security/Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf b/Security/Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..76bc0fe30138c405769ba3f617fdf76bab4aee09
--- /dev/null
+++ b/Security/Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:119c6262110581c7d6aaddd114b8a29ba5bb13ba80382dda37b7b19ea0147e29
+size 11825341
diff --git a/Security/Wiley.Implementing.Email.and.Security.Tokens.May.2008.pdf b/Security/Wiley.Implementing.Email.and.Security.Tokens.May.2008.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..753f83f2fa64cb5736542e0ba842b4ee28a4d7e6
--- /dev/null
+++ b/Security/Wiley.Implementing.Email.and.Security.Tokens.May.2008.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:8877c6ade7d831bdfaa90ea83a4c31cc6c24c2ad99680d67060e3fc93592e566
+size 4148856
diff --git a/Security/Wiley.Lifehacker.Dec.2006.pdf b/Security/Wiley.Lifehacker.Dec.2006.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..0d5982eca097417446bcd1581e44b0eed990c0aa
--- /dev/null
+++ b/Security/Wiley.Lifehacker.Dec.2006.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:cf739d2f8f92f58cdd70de0b129574e839ede3a132e866637644786fd6b110f4
+size 7739714
diff --git a/Security/Wiley.Secure.Computer.and.Network.Systems.Modeling.Analysis.and.Design.Mar.2008.pdf b/Security/Wiley.Secure.Computer.and.Network.Systems.Modeling.Analysis.and.Design.Mar.2008.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..a9aea132e49408ffc0c6fe09364ea6494bc59bec
--- /dev/null
+++ b/Security/Wiley.Secure.Computer.and.Network.Systems.Modeling.Analysis.and.Design.Mar.2008.pdf
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:3d4ea23fd47898194c43167ad0661ab2f6126cdfcc3df350e8d00fcebd1929c6
+size 3821091
diff --git a/Security/Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm b/Security/Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm
new file mode 100644
index 0000000000000000000000000000000000000000..b39bd5b6d820a070aa233ee5e3c4976e1a598d50
--- /dev/null
+++ b/Security/Wiley.The.Database.Hackers.Handbook.Defending.Database.Servers.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:b5b82df6cb408a8cc38580f2aa498c441a4cce5487307e764019002e4bd2f976
+size 1182626
diff --git a/Security/WinXP SP1 Hack.pdf b/Security/WinXP SP1 Hack.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..6fb17ed7251ae3ccd6a4d28e963f04fbf5d62167
Binary files /dev/null and b/Security/WinXP SP1 Hack.pdf differ
diff --git a/Security/Windows Server Hacks.chm b/Security/Windows Server Hacks.chm
new file mode 100644
index 0000000000000000000000000000000000000000..2576055916b4e5ce1c5b86dcc4eee304122a2376
--- /dev/null
+++ b/Security/Windows Server Hacks.chm
@@ -0,0 +1,3 @@
+version https://git-lfs.github.com/spec/v1
+oid sha256:1825ce2c80872a0bac0292d8ba9cbba9205491b5fd30a1489018f56bc50f452d
+size 1918087
diff --git a/Security/Xbox-hack - AIM-2002-008.pdf b/Security/Xbox-hack - AIM-2002-008.pdf
new file mode 100644
index 0000000000000000000000000000000000000000..8d731e4dccf2f7132ede7600a5d6081c3fbcebed
--- /dev/null
+++ b/Security/Xbox-hack - AIM-2002-008.pdf
@@ -0,0 +1,3823 @@
+%PDF-1.4
%����
+1 1 obj
<< /Type /Metadata /Subtype /XML /Length 1334 >>
stream
+
+
+
+
+
+ 2002-05-26T15:04:41Z
+ Acrobat Distiller 3.01 for Windows
+
+ dvips(k) 5.86 Copyright 1999 Radical Eye Software
+ E:\paperailab\paper.dvi
+ 2002-05-31T14:25:55-04:00
+
+
+
+ 2002-05-26T15:04:41Z
+
+
+
+ E:\paperailab\paper.dvi
+
+
+ 2002-05-31T14:25:55-04:00
+ 2002-05-31T14:25:55-04:00
+
+
+
+
+ E:\paperailab\paper.dvi
+
+
+
+
endstream
endobj
4 0 obj
<<
/Type /Font
/Subtype /Type1
/Name /F6
/Encoding 72 0 R
/BaseFont /Times-Roman
>>
endobj
5 0 obj
<<
/Type /ExtGState
/SA false
/OP false
/HT /Default
>>
endobj
6 0 obj
<<
/Type /Pages
/Kids [ 76 0 R 7 0 R 11 0 R 15 0 R 18 0 R ]
/Count 5
/Parent 47 0 R
>>
endobj
7 0 obj
<<
/Type /Page
/Parent 6 0 R
/Resources 9 0 R
/Contents 8 0 R
>>
endobj
8 0 obj
<< /Length 2961 >>
stream
+BT
+/F8 1 Tf
+8.966 0 0 8.966 288.96 657.18 Tm
+0 g
+/GS1 gs
+-0.001 Tc
+[(Ab)-7(stract)]TJ
+/F6 1 Tf
+-13.0354 -1.8335 TD
+-0.004 Tc
+[(T)-9(h)1(i)-7(s)-298(paper)-300(d)1(i)-7(s)-3(cusses)-311(t)-7(he)-283(har)-6(d)1(w)9(a)-2(r)-6(e)-309(f)-6(oundat)-7(i)-7(ons)-311(of)-300(t)-7(h)1(e)-296(c)-2(r)-6(ypt)-7(osyst)-7(e)-2(m)-297(empl)-7(o)14(yed)]TJ
+-1.4989 -1.2179 TD
+-0.005 Tc
+[(by)-375(t)-8(h)0(e)-364(X)-6(box)]TJ
+5.978 0 0 5.978 204.84 633.54 Tm
+-0.009 Tc
+(TM)Tj
+8.966 0 0 8.966 217.68 629.82 Tm
+-0.003 Tc
+[(vi)-6(deo)-373(g)2(ame)-362(consol)-6(e)-375(f)-5(r)-5(o)2(m)-363(M)3(i)-6(c)-1(r)-5(o)2(sof)-5(t)-6(.)-650(A)-365(secr)-5(et)-367(boot)-381(bl)-6(ock)-373(o)15(v)15(e)-1(r)9(-)]TJ
+-6.5846 -1.2313 TD
+-0.004 Tc
+[(l)-7(a)-2(y)-334(i)-7(s)-311(b)14(ur)-6(i)-7(e)-2(d)-334(w)-5(i)-7(t)-7(h)1(i)-7(n)-320(a)-323(s)-3(yst)-7(e)-2(m)-337(A)-5(S)-10(I)-6(C)-6(.)-316(T)-9(h)1(i)-7(s)-311(secr)-6(et)-342(boot)-328(bl)-7(ock)-347(d)1(ecr)-6(ypt)-7(s)-338(a)-2(nd)-334(v)14(e)-2(r)-6(i)-7(\002)-10(e)-2(s)]TJ
+0 -1.2179 TD
+[(por)-6(t)-7(i)-7(ons)-298(of)-287(an)-294(e)12(x)1(t)-7(e)-2(r)-6(n)1(al)-288(F)-10(L)-9(A)-5(S)-10(H)-5(-)-6(t)-7(ype)-283(R)34(O)-5(M.)-276(T)-9(h)1(e)-296(p)1(r)-6(e)-2(sence)-296(o)1(f)-287(t)-7(he)-283(secr)-6(et)-301(boot)-288(bl)-7(ock)]TJ
+T*
+[(i)-7(s)-324(camou\003)-10(aged)-347(by)-320(a)-323(d)1(eco)14(y)-347(boot)-342(bl)-7(ock)-334(i)-7(n)-320(t)-7(he)-323(e)12(x)1(t)-7(e)-2(r)-6(n)1(al)-328(R)34(O)-5(M.)-329(T)-9(h)1(e)-323(c)-2(ode)-336(cont)-7(ai)-7(ned)]TJ
+0 -1.2313 TD
+-0.003 Tc
+[(w)-4(i)-6(t)-6(h)2(i)-6(n)-360(t)-6(h)2(e)-349(s)-2(ecr)-5(et)-367(boot)-367(bl)-6(ock)-373(i)-6(s)-350(t)-6(r)-5(a)-1(nsf)-5(e)-1(r)-5(r)-5(e)-1(d)-360(t)-6(o)-346(t)-6(he)-362(C)-5(P)-9(U)-352(i)-6(n)-346(t)-6(he)-362(cl)-6(ear)-353(o)15(v)15(e)-1(r)-366(a)-362(set)-354(o)2(f)]TJ
+0 -1.2179 TD
+[(hi)-6(gh-)-5(speed)-333(b)15(u)2(sses)-323(w)-4(her)-5(e)-322(i)-6(t)-300(can)-319(be)-322(e)13(x)2(t)-6(r)-5(act)-6(ed)-319(usi)-6(n)2(g)-319(s)-2(i)-6(m)-1(pl)-6(e)-308(c)-1(ust)-6(o)2(m)-322(h)2(ar)-5(dw)10(ar)-5(e.)-502(T)-8(h)2(e)]TJ
+T*
+[(paper)-326(c)-1(oncl)-6(udes)-323(w)-4(i)-6(t)-6(h)-293(r)-5(ecommendat)-6(i)-6(ons)-337(f)-5(o)2(r)-312(i)-6(mpr)-5(o)15(vi)-6(ng)-319(t)-6(h)2(e)-308(X)-4(box)-306(secur)-5(i)-6(t)-6(y)-306(syst)-6(em.)]TJ
+0 -1.2313 TD
+-0.004 Tc
+[(O)-5(n)1(e)-323(l)-7(esson)-334(o)1(f)-327(t)-7(hi)-7(s)-324(s)-3(t)-7(udy)-320(i)-7(s)-324(t)-7(h)1(at)-328(t)-7(h)1(e)-323(u)1(se)-323(of)-327(a)-323(h)1(i)-7(gh-)-6(per)-6(f)-6(o)1(r)-6(mance)-350(b)14(u)1(s)-324(a)-2(l)-7(one)-323(i)-7(s)-324(not)-328(a)]TJ
+0 -1.2179 TD
+-0.002 Tc
+[(suf)23(\002)-8(cient)-246(s)-1(ecurity)-238(measure,)-247(gi)22(v)16(e)0(n)-238(t)-5(he)-241(adv)16(e)0(nt)-246(of)-231(ine)14(xpensi)22(v)16(e,)-274(f)10(a)0(st)-233(rapid)-238(p)3(rototyping)]TJ
+T*
+-0.001 Tc
+[(services)-268(and)-250(h)4(igh-performance)-280(F)-7(P)-7(GAs.)]TJ
+9.963 0 0 9.963 303.12 89.34 Tm
+0 Tc
+0 Tw
+(2)Tj
+ET
+endstream
endobj
9 0 obj
<<
/ProcSet [ /PDF /Text ]
/Font << /F6 4 0 R /F8 10 0 R >>
/ExtGState << /GS1 5 0 R >>
>>
endobj
10 0 obj
<<
/Type /Font
/Subtype /Type1
/Name /F8
/Encoding 72 0 R
/BaseFont /Times-Bold
>>
endobj
11 0 obj
<<
/Type /Page
/Parent 6 0 R
/Resources 13 0 R
/Contents 12 0 R
>>
endobj
12 0 obj
<< /Length 9846 >>
stream
+BT
+/F8 1 Tf
+14.346 0 0 14.346 133.8 657.18 Tm
+0 g
+/GS1 gs
+-0.004 Tc
+[(1)-1001(I)-8(nt)-6(r)13(o)-6(duct)-6(i)-2(o)-6(n)-259(a)-6(n)0(d)-251(B)-6(a)-6(c)-3(kg)-6(r)13(o)-6(und)]TJ
+/F6 1 Tf
+9.963 0 0 9.963 133.8 634.86 Tm
+0.004 Tc
+[(Ev)10(ery)-255(c)2(rypt)5(os)8(ys)8(t)5(e)2(m)-266(i)5(s)-282(b)-2(as)8(ed)-267(on)-279(s)8(o)-2(me)-275(ki)5(nd)-267(of)-277(s)8(ecret)5(,)-288(s)8(uch)-279(a)2(s)-269(a)-287(k)10(e)14(y)58(.)-384(R)9(e)14(gardl)5(e)2(s)8(s)-269(of)-277(t)5(h)-2(e)]TJ
+0 -1.1925 TD
+0.005 Tc
+[(ci)6(pher)37(,)-215(t)6(h)-1(e)-250(s)9(ecuri)6(t)6(y)-230(of)-240(a)-250(c)3(rypt)6(os)9(ys)9(t)6(e)3(m)-217(i)6(s)-256(onl)6(y)-230(a)3(s)-244(s)9(t)6(r)1(ong)-230(as)-244(t)6(h)-1(e)-250(s)9(ecrec)15(y)-230(o)-1(f)-240(t)6(he)-238(k)11(e)15(y)59(.)-287(Thus)9(,)]TJ
+0 -1.2045 TD
+[(s)9(o)-1(me)-274(of)-276(t)6(h)-1(e)-274(m)0(os)9(t)-271(s)9(t)6(a)3(rt)6(l)6(i)6(ngl)6(y)-278(e)3(f)25(f)1(ect)6(i)30(v)11(e)-262(a)3(t)6(t)6(acks)-268(o)-1(n)-278(a)-274(crypt)6(os)9(ys)9(t)6(e)3(m)-265(i)6(n)35(v)23(ol)6(v)11(e)-250(no)-278(ci)6(phert)6(e)15(x)-1(t)]TJ
+0 -1.1925 TD
+[(anal)6(ys)9(i)6(s)9(,)-299(b)23(ut)-283(i)6(n)-1(s)9(t)6(ead)-290(\002)7(n)-1(d)-278(\003)7(a)15(w)4(s)-293(i)6(n)-290(t)6(he)-286(prot)6(ocol)6(s)-268(t)6(hat)-283(m)0(anage)-274(t)6(he)-286(k)11(e)15(ys)9(.)-432(C)10(rypt)6(os)9(ys)9(t)6(e)3(ms)]TJ
+0 -1.2045 TD
+0.004 Tc
+[(bas)8(e)2(d)-267(o)-2(n)-267(s)8(ymmet)5(r)0(i)5(c)-263(ci)5(phers)-257(are)-275(p)-2(art)5(i)5(c)2(ul)5(arl)5(y)-255(vul)5(nerabl)5(e)-239(t)5(o)-279(p)-2(rot)5(o)-2(col)-248(a)2(t)5(t)5(acks)8(,)-288(s)8(i)5(nce)-263(bot)5(h)]TJ
+T*
+[(the)-371(s)8(ender)-374(a)2(nd)-375(the)-371(r)0(ecei)29(v)10(e)2(r)-362(m)-1(us)8(t)-368(b)-2(e)-383(t)5(rus)8(t)5(ed)-375(to)-375(ha)26(v)10(e)-371(a)-383(c)2(op)10(y)-363(o)-2(f)-374(t)5(he)-383(s)8(a)2(me)-371(s)8(ecret)-380(k)10(e)14(y)58(.)]TJ
+0 -1.1925 TD
+0 Tc
+[(Desp)-6(ite)-255(th)-6(e)-267(d)-6(if)20(\002cu)-6(lty)-247(o)-6(f)-257(ke)10(y)-259(m)-5(an)-6(ag)-6(em)-5(en)-6(t)-228(i)1(n)-271(s)4(y)-6(m)-5(m)-5(e)-2(tric)-243(cip)-6(h)-6(e)-2(rs,)-256(t)1(h)-6(e)10(y)-259(r)-4(em)-5(ain)-247(a)-2(ttracti)25(v)6(e)]TJ
+0 -1.2045 TD
+0.003 Tc
+[(becaus)7(e)-264(of)-266(their)-266(a)1(lgorithmic)-252(s)7(implicity)-268(and)-268(h)-3(igh)-268(t)4(hroughput)-225(when)-268(compared)-256(to)-268(public)]TJ
+T*
+0.004 Tc
+[(k)10(e)14(y)-231(c)2(i)5(phers)8(.)]TJ
+1.4936 -1.1925 TD
+0.003 Tc
+[(Symmetric)-300(cipher)-290(k)9(e)13(y)-304(management)-273(becomes)-283(e)1(s)7(p)-3(ecially)-304(problematic)-288(when)-292(the)-312(r)-1(e-)]TJ
+-1.4936 -1.2045 TD
+0.001 Tc
+[(cei)26(v)-5(i)2(n)-5(g)-318(p)-5(a)-1(rty)-330(i)2(s)-333(n)-5(o)-5(t)-323(tru)-5(s)5(ted)-330(o)-5(r)-328(i)2(s)-333(i)2(n)-342(a)-326(p)-5(o)-5(s)5(itio)-5(n)-330(t)2(h)-5(a)-1(t)-323(can)-342(b)-5(e)-326(easily)-330(co)-5(m)-4(p)-5(ro)-5(m)-4(i)2(sed)-5(.)-532(Th)-5(is)]TJ
+0 -1.1925 TD
+0.003 Tc
+[(is)-307(where)-288(t)4(amper)23(-res)7(i)4(s)7(t)4(ant)-285(h)-3(ardw)14(are)-288(c)1(omes)-283(into)-304(play;)-321(a)-312(s)7(u)-3(mmary)-280(of)-302(tamper)23(-res)7(i)4(s)7(t)4(ance)]TJ
+0 -1.2045 TD
+0.004 Tc
+[(gui)5(del)5(i)5(n)-2(es)-233(can)-243(be)-251(found)-231(i)5(n)-255([6)10(].)-336(Man)10(y)-243(s)8(ys)8(t)5(e)2(ms)-245(empl)5(o)10(y)-243(t)5(a)2(mper)24(-res)8(i)5(s)8(t)5(ant)-236(h)-2(ardw)15(are)-227(t)5(ech-)]TJ
+T*
+0.005 Tc
+[(ni)6(ques)-208(i)6(n)-230(v)23(aryi)6(ng)-206(de)15(grees)9(,)-215(i)6(ncl)6(udi)6(ng)-206(t)6(h)-1(e)-226(S)7(andi)6(a)-213(N)4(at)6(i)6(onal)-223(L)2(abs)9(')-216(\223S)7(t)6(r)1(ongl)6(i)6(nk\224)-201(mi)6(crome-)]TJ
+0 -1.1925 TD
+[(chani)6(cal)-271(24-bi)6(t)-271(l)6(ock)-278([)1(2)11(])1(,)-299(t)6(he)-286(C)10(l)6(i)6(pper)-276(c)3(hi)6(p)-290([)1(1)11(])1(,)-299(I)1(B)10(M)3(')61(s)-293(4758)-266(P)7(C)10(I)-300(C)10(rypt)6(ographi)6(c)-250(C)10(opro-)]TJ
+0 -1.2045 TD
+0.003 Tc
+[(ces)7(s)7(o)-3(r)-230([)-1(3],)-229(C)8(ryptographic)-203(S)5(martcards)-222([5)9(])-242([)-1(4)9(])-1(,)-241(A)2(utomatic)-228(T)72(e)1(ller)-230(Machines)-222(\(A)111(TMs)7(\))-1(,)-229(a)1(nd)]TJ
+T*
+0.004 Tc
+[(no)22(w)64(,)-204(vi)5(deo)-207(g)-2(ame)-214(c)2(ons)8(ol)5(es)8(.)-276(H)3(o)22(w)3(e)26(v)10(er)36(,)-204(t)5(rus)8(t)5(i)5(n)-2(g)-207(i)5(nadequat)5(e)-202(phys)8(i)5(cal)-200(s)8(ecuri)5(t)5(y)-219(meas)8(ures)-197(t)5(o)]TJ
+0 -1.1925 TD
+[(prot)5(ect)-260(i)5(m)-1(port)5(a)2(nt)-260(s)8(ecret)5(s)-282(i)5(s)-282(r)0(i)5(s)8(k)10(y)58(.)-396([)0(14)10(])-277(a)2(nd)-279([15)22(])-289(pres)8(ent)-272(e)14(xampl)5(e)2(s)-257(o)-2(f)-277(h)-2(o)22(w)-262(s)8(o)-2(me)-287(of)-277(t)5(h)-2(e)]TJ
+0 -1.2045 TD
+[(aforement)5(i)5(oned)-207(t)5(amper)24(-res)8(i)5(s)8(t)5(ant)-224(s)8(ys)8(t)5(e)2(ms)-233(can)-243(be)-239(defeat)5(ed)-231(wi)5(t)5(h)-255(s)8(u)-2(rpri)5(s)8(i)5(ngl)5(y)-219(s)8(i)5(m)-1(pl)5(e)-239(a)2(nd)]TJ
+0 -1.1925 TD
+[(di)5(rect)-236(met)5(hods)8(.)]TJ
+1.4936 -1.2045 TD
+[(In)-339(t)5(h)-2(e)-335(cas)8(e)-335(o)-2(f)-338(t)5(he)-335(Xbox)]TJ
+6.974 0 0 6.974 246.24 399.42 Tm
+0.009 Tc
+(TM)Tj
+9.963 0 0 9.963 260.52 395.82 Tm
+0.004 Tc
+[(vi)5(deo)-327(g)-2(ame)-323(c)2(ons)8(ol)5(e)-323(from)-326(M)2(i)5(c)2(ros)8(o)-2(ft)5(,)-336(t)5(he)-335(s)8(ecret)-344(bei)5(n)-2(g)]TJ
+-12.7195 -1.2045 TD
+[(prot)5(ect)5(ed)-315(i)5(s)-342(a)-347(k)10(e)14(y)-327(and)-339(a)2(n)-339(a)2(l)5(gori)5(t)5(h)-2(m)-326(f)0(or)-325(decrypt)5(i)5(n)-2(g)-315(a)2(nd)-327(v)10(e)2(ri)5(fyi)5(n)-2(g)-315(a)-347(boot)5(l)5(o)-2(ader)60(.)-553(T)1(hi)5(s)]TJ
+0 -1.1925 TD
+0.003 Tc
+[(bootloader)-326(then)-352(decrypts)-343(a)1(nd)-352(v)9(e)1(ri\002es)-343(a)-360(k)9(e)1(rnel)-345(image.)-626(B)8(o)-3(th)-364(the)-360(bootloader)-326(and)-352(k)9(er)23(-)]TJ
+0 -1.2045 TD
+0.004 Tc
+[(nel)-320(i)5(mage)-323(are)-323(c)2(ont)5(ai)5(ned)-315(i)5(n)-339(a)2(n)-327(uns)8(ecured)-303(F)6(LAS)6(H)-334(R)45(O)3(M.)-336(The)-323(k)10(ernel)-320(t)5(hen)-315(v)10(eri)5(\002)6(es)-330(t)5(h)-2(e)]TJ
+T*
+0 Tc
+[(au)-6(th)-6(en)-6(ticity)-295(an)-6(d)-307(i)1(n)-6(t)1(e)10(g)-6(rity)-295(o)-6(f)-317(th)-6(e)-303(a)-2(p)-6(p)-6(licatio)-6(n)-6(s)-298(it)-312(ru)-6(n)-6(s)4(.)-497(T)-3(h)-6(u)-6(s)4(,)-316(a)-315(ch)-6(ain)-307(o)-6(f)-317(t)1(ru)-6(st)-312(is)-310(g)-6(r)-4(o)18(w)-1(n)-6(,)]TJ
+0 -1.1925 TD
+0.004 Tc
+[(bot)5(t)5(o)-2(m)-254(up,)-264(from)-254(a)-275(s)8(eed)-267(of)-265(t)5(r)0(us)8(t)5(.)-384(Thi)5(s)-257(s)8(eed\226t)5(he)-263(s)8(ecret)-260(k)10(e)14(y)-267(a)2(nd)-267(an)-267(al)5(gori)5(t)5(h)-2(m\226i)5(s)-245(pl)5(ant)5(e)2(d)]TJ
+0 -1.2045 TD
+[(i)5(n)-243(a)-251(phys)8(i)5(cal)5(l)5(y)-219(s)8(ecure,)-240(s)8(ecret)-236(boot)-236(bl)5(ock.)]TJ
+1.4936 -1.2045 TD
+[(The)-299(X)3(box)-303(archi)5(t)5(ect)5(ure)-287(r)0(es)8(ul)5(t)5(s)-294(i)5(n)-315(t)5(h)-2(e)-299(d)-2(epl)5(o)10(yment)-284(o)-2(f)-301(l)5(ar)12(ge)-287(number)-289(o)-2(f)-301(i)5(dent)5(i)5(cal)-296(de-)]TJ
+-1.4936 -1.1925 TD
+0 Tc
+[(v)-6(i)1(ces,)-328(a)-2(ll)-324(o)-6(f)-305(wh)-6(ich)-319(c)-2(o)-6(n)-6(t)1(ain)-295(t)1(h)-6(e)-315(sam)-5(e)-327(secret)-312(in)-6(fo)-6(rm)-5(atio)-6(n)-6(.)-473(As)-322(th)-6(e)-315(a)-2(n)-6(a)-2(ly)-6(sis)-310(b)-6(elo)18(w)-302(illu)-6(s-)]TJ
+0 -1.2045 TD
+0.003 Tc
+[(trates)7(,)-289(t)4(he)-276(s)7(ecurity)-280(of)-278(s)7(u)-3(ch)-280(a)-288(s)7(ys)7(tem)-279(can)-280(be)-276(readily)-280(compromis)7(e)1(d,)-253(e)25(v)9(en)-268(if)-290(the)-276(s)7(ecret)-285(is)]TJ
+0 -1.1925 TD
+0.004 Tc
+[(prot)5(ect)5(ed)-219(by)-243(t)5(a)2(mper)24(-res)8(i)5(s)8(t)5(ant)-224(h)-2(ardw)15(are)-227(a)2(nd)-243(obs)8(cured)-219(b)-2(y)-243(a)2(l)5(gori)5(t)5(h)-2(mi)5(c)-214(c)2(ompl)5(e)14(x)-2(i)5(t)5(y)58(.)]TJ
+/F8 1 Tf
+14.346 0 0 14.346 133.8 242.58 Tm
+0.001 Tc
+[(2)-996(X)4(b)5(o)-1(x)-252(H)1(ard)22(w)4(ar)18(e)-258(C)4(ryp)5(tosystem)-237(O)1(v)7(e)2(r)10(v)-1(iew)]TJ
+/F6 1 Tf
+9.963 0 0 9.963 133.8 220.38 Tm
+0.005 Tc
+[(The)-274(X)4(box)-290(crypt)6(o)-266(p)-1(rot)6(o)-1(col)-271(p)-1(res)9(e)3(nt)6(s)-268(a)-298(s)9(t)6(rong)-278(defens)9(e)-274(i)6(n)-290(t)6(he)-286(f)13(ace)-286(of)-288(uns)9(ecured)-266(F)7(LAS)7(H)]TJ
+0 -1.2045 TD
+[(R)46(O)4(M-bas)9(e)3(d)-266(m)0(odi)6(\002)7(cat)6(i)6(ons)9(.)-407(P)7(l)6(eas)9(e)-286(r)1(efer)-276(t)6(o)-290(\002)7(gure)-262(1)-1(.)-432(T)2(he)-274(Xbox)-266(boot)6(s)-268(from)-277(a)-286(512-byt)6(e)]TJ
+0 -1.1925 TD
+0.004 Tc
+[(s)8(ecret)-248(boot)-236(bl)5(ock)-243(t)5(hat)-236(i)5(s)-257(h)-2(ard-coded)-219(i)5(nt)5(o)-243(t)5(he)-251(s)8(out)5(hbri)5(dge)-227(s)8(y)-2(s)8(t)5(em)-254(AS)6(IC)-244(\(t)5(he)-251(\223MC)9(P)6(X)3(\224\).)]TJ
+0 -1.2045 TD
+0.005 Tc
+[(Thi)6(s)-232(boot)-223(bl)6(ock)-242(p)-1(erforms)-208(t)6(he)-238(fol)6(l)6(o)23(wi)6(ng)-230(funct)6(i)6(ons)9(,)-215(i)6(n)-254(o)-1(rder:)]TJ
+/T2 1 Tf
+0.12 0 0 -0.12 138.72 172.5 Tm
+0 Tc
+0 Tw
+(\017)Tj
+/F6 1 Tf
+9.963 0 0 9.963 148.68 172.5 Tm
+0.001 Tc
+[(lo)-5(ad)-5(s)-236(t)2(h)-5(e)-242(\223jam)-257(tab)-5(l)2(es\224,)-243(i.e.,)-243(i)2(n)-5(itializes)-236(th)-5(e)-242(c)-1(o)-5(n)-5(s)5(o)-5(l)2(e)-242(c)-1(h)-5(i)2(p)-5(s)5(et)]TJ
+/T2 1 Tf
+0.12 0 0 -0.12 138.72 160.62 Tm
+0 Tc
+(\017)Tj
+/F6 1 Tf
+9.963 0 0 9.963 148.68 160.62 Tm
+0.004 Tc
+[(turns)-233(o)-2(n)-243(t)5(he)-239(proces)8(s)8(o)-2(r)-229(caches)]TJ
+/T2 1 Tf
+0.12 0 0 -0.12 138.72 148.62 Tm
+0 Tc
+(\017)Tj
+/F6 1 Tf
+9.963 0 0 9.963 148.68 148.62 Tm
+0.004 Tc
+[(decrypt)5(s)-221(t)5(he)-251(k)10(e)2(rnel)-224(boot)5(l)5(o)-2(ader)36(,)-204(c)2(ont)5(ai)5(ned)-231(i)5(n)-243(F)6(LAS)6(H)-250(R)45(O)3(M)]TJ
+/T2 1 Tf
+0.12 0 0 -0.12 138.72 136.62 Tm
+0 Tc
+(\017)Tj
+/F6 1 Tf
+9.963 0 0 9.963 148.68 136.62 Tm
+0.003 Tc
+[(v)9(e)1(ri\002es)-234(t)4(hat)-237(d)-3(ecryption)-220(w)14(as)-246(s)7(u)-3(cces)7(s)7(f)-1(ul)]TJ
+/T2 1 Tf
+0.12 0 0 -0.12 138.72 124.74 Tm
+0 Tc
+(\017)Tj
+/F6 1 Tf
+9.963 0 0 9.963 148.68 124.74 Tm
+0.004 Tc
+[(jumps)-233(t)5(o)-243(t)5(he)-251(decrypted)-219(k)10(e)2(rnel)-224(bootloader)]TJ
+15.5019 -3.5533 TD
+0 Tc
+(3)Tj
+ET
+endstream
endobj
13 0 obj
<<
/ProcSet [ /PDF /Text ]
/Font << /F6 4 0 R /F8 10 0 R /T2 14 0 R >>
/ExtGState << /GS1 5 0 R >>
>>
endobj
14 0 obj
<<
/Name /T2
/Type /Font
/Subtype /Type3
/Resources 67 0 R
/FontBBox [ 5 -18 77 60 ]
/FontMatrix [ 1 0 0 -1 0 0 ]
/FirstChar 13
/LastChar 15
/Encoding 68 0 R
/CharProcs 69 0 R
/Widths [ 83 0 42 ]
>>
endobj
15 0 obj
<<
/Type /Page
/Parent 6 0 R
/Resources 17 0 R
/Contents 16 0 R
>>
endobj
16 0 obj
<< /Length 10385 >>
stream
+BT
+/F6 1 Tf
+9.963 0 0 9.963 148.68 657.18 Tm
+0 g
+/GS1 gs
+0.001 Tc
+[(Th)-5(e)-314(b)-5(o)-5(o)-5(tlo)-5(ad)-5(er)-292(th)-5(en)-318(p)-5(e)-1(rfo)-5(rm)-4(s)-297(s)5(o)-5(m)-4(e)-314(m)-4(o)-5(r)-3(e)-314(s)5(y)-5(s)5(tem)-317(i)2(n)-5(itializatio)-5(n)-5(,)-327(d)-5(ecry)-5(p)-5(t)2(s)-309(a)-314(kern)-5(el)]TJ
+-1.4936 -1.2045 TD
+0.003 Tc
+[(image)-240(from)-243(F)5(LASH)-251(R)44(O)2(M,)-253(decompres)7(s)7(e)1(s)-234(a)1(nd)-244(v)9(e)1(ri\002es)-246(t)4(he)-240(decrypted)-232(image,)-241(and)-256(e)1(nters)]TJ
+0 -1.1925 TD
+0 Tc
+[(th)-6(e)-255(k)6(ern)-6(e)-2(l.)-316(Th)-6(e)-243(k)6(ern)-6(e)-2(l)-240(d)-6(ecry)-6(p)-6(tio)-6(n)-223(k)6(e)10(y)-259(is)-249(sto)-6(r)-4(ed)-259(with)-6(in)-247(th)-6(e)-255(b)-6(o)-6(o)-6(tlo)-6(ad)-6(er)-221(im)-5(ag)-6(e.)-328(No)-6(te)-243(th)-6(at)]TJ
+0 -1.2045 TD
+0.004 Tc
+[(t)5(h)-2(e)-275(s)8(ecret)-272(boot)-260(bl)5(ock)-267(c)2(ode)-263(i)5(s)-282(s)8(t)5(ruct)5(ured)-255(s)8(o)-291(t)5(h)-2(at)-272(t)5(h)-2(e)-275(boot)5(l)5(o)-2(ader)-241(decrypt)5(i)5(o)-2(n)-255(k)10(e)14(y)-267(i)5(s)-282(ne)26(v)10(e)2(r)]TJ
+T*
+0.002 Tc
+[(written)-305(t)3(o)-317(m)-3(ain)-305(m)-3(emory)56(,)-302(thus)-308(defeating)-293(a)0(n)-317(a)0(ttack)-305(that)-310(in)32(v)20(o)-4(lv)8(es)-296(ea)24(v)8(e)0(s)6(d)-4(ropping)-269(on)-317(the)]TJ
+0 -1.1925 TD
+0.004 Tc
+[(mai)5(n)-243(memory)-219(b)22(u)-2(s)8(.)]TJ
+1.4936 -1.2045 TD
+0.005 Tc
+[(The)-274(boot)6(l)6(o)-1(ader)-264(i)6(s)-281(encrypt)6(ed)-266(wi)6(t)6(h)-278(R)10(C)10(-)1(4)-290(u)-1(s)9(i)6(ng)-278(a)-286(128-bi)6(t)-259(k)11(e)15(y)59(.)-407(T)2(he)-274(decrypt)6(i)6(o)-1(n)-254(a)3(l)6(go-)]TJ
+-1.4936 -1.1925 TD
+0.004 Tc
+[(ri)5(t)5(h)-2(m)-302(a)2(nd)-303(k)10(e)14(y)-303(a)2(re)-299(s)8(t)5(ored)-303(i)5(n)-315(t)5(h)-2(e)-311(s)8(ecret)-308(boot)-284(bl)5(ock)-303(a)2(nd)-303(e)14(x)10(ecut)5(e)2(d)-291(b)-2(y)-303(t)5(he)-299(P)6(e)2(nt)5(i)5(u)-2(m)-302(C)9(P)6(U)3(;)]TJ
+0 -1.2045 TD
+[(t)5(h)-2(e)-275(b)22(us)8(s)8(e)2(s)-282(b)-2(et)5(ween)-279(t)5(h)-2(e)-275(s)8(ecret)-284(boot)-272(bl)5(ock)-267(a)2(nd)-279(t)5(h)-2(e)-275(C)9(P)6(U)-298(are)-275(not)-272(encrypt)5(ed)-267(b)22(u)-2(t)-272(a)2(s)8(s)8(u)-2(med)]TJ
+T*
+0.003 Tc
+[(to)-280(be)-264(s)7(ecure)-276(due)-264(to)-280(their)-266(h)-3(igh)-268(s)7(peeds)7(.)-385(The)-276(d)-3(ecryption)-244(o)-3(f)-278(t)4(he)-264(bootloader)-254(image)-264(i)4(s)-270(v)9(eri-)]TJ
+0 -1.1925 TD
+0.005 Tc
+[(\002)7(e)3(d)-266(b)-1(y)-266(c)3(hecki)6(n)-1(g)-254(f)1(or)-264(a)-274(32-bi)6(t)-247(m)0(agi)6(c)-262(number)-252(n)-1(ear)-252(t)6(h)-1(e)-274(e)3(nd)-266(of)-264(t)6(h)-1(e)-262(p)-1(l)6(a)3(i)6(n)-1(t)6(e)15(xt)-259(s)9(t)6(ream.)-371(T)2(hi)6(s)]TJ
+0 -1.2045 TD
+0.004 Tc
+[(check)-267(onl)5(y)-279(e)2(ns)8(ures)-269(t)5(h)-2(at)-284(t)5(h)-2(e)-275(c)2(i)5(phert)5(e)14(x)-2(t)-260(s)8(t)5(r)0(eam)-290(w)15(a)2(s)-282(not)-272(corrupt)5(ed;)-272(one)-275(wi)5(t)5(h)-291(kno)22(wl)5(edge)]TJ
+T*
+0.003 Tc
+[(of)-290(the)-300(s)7(ecret)-297(k)9(e)13(y)-292(a)1(nd)-292(the)-288(m)-2(agic)-300(number)-266(can)-304(eas)7(ily)-304(create)-288(o)-3(riginal)-285(bootloader)-266(images)7(.)]TJ
+0 -1.1925 TD
+0.004 Tc
+[(It)-332(i)5(s)-342(f)12(a)2(i)5(r)0(l)5(y)-327(cl)5(ear)-338(from)-326(t)5(he)-335(code)-323(s)8(t)5(ruct)5(ure)-323(o)-2(f)-338(t)5(he)-335(s)8(ecret)-332(boot)-320(bl)5(ock)-327(t)5(hat)-332(s)8(uch)-327(a)-347(s)8(i)5(mpl)5(e)2(,)]TJ
+0 -1.2045 TD
+0.003 Tc
+[(unreliable)-228(c)1(heck)-244(w)14(a)1(s)-258(e)1(mplo)9(yed)-232(b)-3(ecaus)7(e)-240(there)-240(w)14(as)-246(not)-249(enough)-232(s)7(p)-3(ace)-240(for)-242(a)1(n)9(y)-3(thing)-232(e)1(ls)7(e.)]TJ
+0 -1.1925 TD
+0.004 Tc
+[(The)-239(m)-1(agi)5(c)-239(number)-217(c)2(heck)-243(mi)5(ght)-236(al)5(s)8(o)-243(confus)8(e)-239(e)2(f)24(f)0(ort)5(s)-221(t)5(o)-255(creat)5(e)-239(o)-2(ri)5(gi)5(nal)-224(boot)5(l)5(o)-2(ader)-217(code)]TJ
+0 -1.2045 TD
+0.005 Tc
+[(bas)9(e)3(d)-326(o)-1(n)-338(a)-334(k)11(e)15(y)-338(obt)6(ai)6(ned)-314(w)4(i)6(t)6(hout)-319(ful)6(l)-331(kno)23(wl)6(edge)-310(of)-337(t)6(h)-1(e)-334(s)9(ecret)-331(boot)-319(bl)6(ock')61(s)-329(c)3(ont)6(ent)6(s)9(,)]TJ
+T*
+0.004 Tc
+[(s)8(u)-2(ch)-231(as)-221(t)5(h)-2(rough)-207(a)-239(p)-2(ers)8(onnel)-200(l)5(eak)-231(or)-229(brut)5(e)-214(f)0(orce.)-288(Ho)22(we)26(v)10(e)2(r)36(,)-204(a)-227(b)-2(rut)5(e)-227(force)-214(a)2(pproach)-207(t)5(o)-231(re-)]TJ
+0 -1.1925 TD
+0.005 Tc
+[(co)11(v)11(e)3(ri)6(ng)-170(t)6(h)-1(e)-201(boot)6(l)6(o)-1(ader)-168(i)6(s)-208(probabl)6(y)-170(out)-187(of)-204(t)6(h)-1(e)-189(ques)9(t)6(i)6(on,)-191(s)9(i)6(nce)-201(d)-1(i)6(s)9(t)6(r)1(i)6(b)23(ut)6(ed.net)6(')61(s)-184(\223bo)11(v)-1(i)6(n)-1(e\224)]TJ
+0 -1.2045 TD
+[(ef)25(fort)6(,)-215(r)1(unni)6(ng)-218(for)-228(o)11(v)11(e)3(r)-228(4)-242(years)-232(a)3(nd)-230(current)6(l)6(y)-218(capabl)6(e)-226(of)-240(t)6(e)3(s)9(t)6(i)6(n)-1(g)-242(o)11(v)11(e)3(r)-216(100)-230(gi)6(gak)11(e)15(ys)9(/)6(s)9(,)-227(i)6(s)]TJ
+T*
+-0.001 Tc
+[(still)-253(w)10(o)-7(rk)-7(in)-7(g)-236(o)-7(n)-248(a)-244(6)-7(4)-7(-)-5(b)-7(i)0(t)-229(RC-5)-260(c)-3(ip)-7(h)-7(e)-3(r)-234(a)-3(t)-253(t)0(h)-7(e)-244(tim)-6(e)-244(o)-7(f)-246(w)-2(ritin)-7(g)-248([)-5(7].)]TJ
+1.4936 -1.1925 TD
+0.005 Tc
+[(Gi)30(v)11(e)3(n)-230(t)6(hi)6(s)-232(s)9(ecure)-226(boot)-211(prot)6(ocol)6(,)-215(m)0(odi)6(fyi)6(n)-1(g)-206(t)6(he)-226(cont)6(ent)6(s)-220(of)-228(t)6(h)-1(e)-238(F)7(LAS)7(H)-225(R)46(O)4(M)-238(a)3(l)6(one)]TJ
+-1.4936 -1.2045 TD
+[(wi)6(l)6(l)-355(s)9(t)6(and)-350(a)-358(v)11(e)3(ry)-350(l)6(o)23(w)-345(c)3(hance)-346(o)-1(f)-349(r)1(e)27(v)11(eal)6(i)6(n)-1(g)-338(a)3(n)11(y)-1(t)6(h)-1(i)6(n)-1(g)-338(u)-1(s)9(e)3(ful)-343(a)3(bout)-331(t)6(h)-1(e)-358(c)3(ons)9(ol)6(e)]TJ
+6.974 0 0 6.974 447 397.74 Tm
+0 Tc
+0 Tw
+(1)Tj
+9.963 0 0 9.963 450.84 394.14 Tm
+0.641 Tc
+[(.T)638(h)635(i)642(s)]TJ
+-31.8229 -1.1925 TD
+0.004 Tc
+[(i)5(s)-342(compounded)-303(b)-2(y)-339(t)5(he)-347(f)12(act)-332(t)5(h)-2(at)-344(t)5(h)-2(e)-335(F)6(LAS)6(H)-346(R)45(O)3(M)-348(c)2(ont)5(ai)5(ns)-330(a)-347(d)-2(eco)10(y)-327(boot)-332(bl)5(ock)-327(w)3(i)5(t)5(h)]TJ
+0 -1.2045 TD
+0.003 Tc
+[(halfw)14(a)1(y)-316(r)-1(eas)7(onable)-312(l)4(ooking)-316(decryption)-304(a)1(nd)-328(initialization)-316(c)1(ode.)-554(T)0(he)-324(algorithm)-315(i)4(n)-340(t)4(he)]TJ
+T*
+0.005 Tc
+[(deco)11(y)-266(boot)-271(bl)6(ock)-278(i)6(s)-293(a)-286(bas)9(t)6(ardi)6(zed)-266(R)10(C)10(-)1(4,)-299(and)-278(o)-1(f)-276(c)3(ours)9(e)-274(appl)6(yi)6(ng)-266(t)6(h)-1(i)6(s)-281(al)6(gori)6(t)6(h)-1(m)-265(o)-1(n)-290(t)6(he)]TJ
+0 -1.1925 TD
+[(R)46(O)4(M)-335(c)3(ont)6(ent)6(s)-305(yi)6(el)6(ds)-329(not)6(hi)6(ng)-302(b)23(u)-1(t)-331(w)4(hi)6(t)6(e)-322(noi)6(s)9(e)3(.)-564(F)7(urt)6(h)-1(er)-312(di)6(s)9(c)3(us)9(s)9(i)6(on)-326(on)-326(ho)23(w)-321(t)6(he)-322(s)9(ecret)]TJ
+0 -1.2045 TD
+[(boot)-223(bl)6(ock)-230(w)16(as)-244(di)6(s)9(c)3(o)11(v)11(e)3(red)-218(i)6(s)-244(c)3(ont)6(ai)6(ned)-230(i)6(n)-242(t)6(he)-238(ne)15(xt)-235(s)9(ect)6(i)6(on.)]TJ
+/F8 1 Tf
+14.346 0 0 14.346 133.8 300.78 Tm
+0 Tc
+[(3)-997(B)-2(r)17(e)1(ak)4(in)4(g)-253(t)-2(h)4(e)-259(Ph)21(ysical)-249(S)4(ecu)4(rity)]TJ
+/F6 1 Tf
+9.963 0 0 9.963 133.8 278.46 Tm
+0.005 Tc
+[(Thi)6(s)-317(s)9(ect)6(i)6(o)-1(n)-314(p)-1(ro)11(vi)6(des)-293(a)-322(chronol)6(ogy)-278(of)-324(ho)23(w)-309(t)6(he)-322(Xbox')61(s)-305(phys)9(i)6(cal)-295(s)9(ecuri)6(t)6(y)-314(w)16(a)3(s)-329(r)1(e)27(v)11(ers)9(e)]TJ
+0 -1.1925 TD
+0.004 Tc
+(engineered.)Tj
+1.4936 -1.2045 TD
+0.003 Tc
+[(R)8(eading)-220(out)-225(the)-228(F)5(LASH)-227(R)44(O)2(M)-228(c)1(ontents)-222(and)-220(t)4(racing)-220(the)-228(p)-3(roces)7(s)7(o)-3(r')59(s)-210(e)13(x)9(ecution)-196(s)7(tart-)]TJ
+-1.4936 -1.2045 TD
+0.004 Tc
+[(ing)-315(from)-302(t)5(he)-311(boot)-308(v)10(ector)-301(pro)10(v)10(e)2(d)-291(t)5(o)-315(b)-2(e)-323(f)0(utile,)-324(a)2(s)-318(t)5(he)-311(contents)-306(of)-313(the)-311(boot)-308(block)-303(i)5(n)-327(t)5(he)]TJ
+0 -1.1925 TD
+0.003 Tc
+[(F)5(L)0(AS)5(H)-227(R)44(OM)-228(were)-228(a)-228(d)-3(eco)9(y)57(,)-205(cl)4(e)25(v)9(erl)4(y)-208(des)7(i)4(gned)-220(t)4(o)-232(t)4(hw)14(art)-213(s)7(uch)-232(act)4(i)28(v)-3(i)4(t)4(y)57(.)-277(T)0(he)-228(code)-215(wi)4(t)4(h)-3(i)4(n)]TJ
+0 -1.2045 TD
+0.004 Tc
+[(t)5(h)-2(e)-323(F)6(LAS)6(H)-322(R)45(O)3(M)-336(boot)-308(bl)5(ock)-315(f)0(ol)5(l)5(o)22(wed)-303(t)5(he)-335(s)8(a)2(me)-323(general)-308(\003)6(o)22(w)-322(as)-318(t)5(h)-2(e)-323(c)2(ode)-323(wi)5(t)5(h)-2(i)5(n)-327(t)5(h)-2(e)]TJ
+0 -1.1925 TD
+0.005 Tc
+[(s)9(ecret)-259(boot)-259(bl)6(ock,)-263(b)23(u)-1(t)-259(t)6(he)-274(decrypt)6(i)6(o)-1(n)-242(a)3(l)6(gori)6(t)6(h)-1(m,)-251(t)6(h)-1(e)-274(k)11(e)15(y)-1(s)-256(a)3(nd)-266(t)6(h)-1(e)-262(c)3(i)6(phert)6(e)15(x)-1(t)-247(s)9(t)6(a)3(rt)-271(l)6(o)-1(ca-)]TJ
+0 -1.2045 TD
+0.001 Tc
+[(tio)-5(n)-330(w)0(ere)-326(i)2(n)-5(c)-1(o)-5(rrect.)-532(T)-2(h)-5(i)2(s)-321(i)2(n)-5(itially)-330(resu)-5(lted)-330(i)2(n)-330(a)-338(g)-5(r)-3(eat)-311(d)-5(eal)-323(o)-5(f)-328(co)-5(n)-5(f)-3(u)-5(s)5(io)-5(n)-306(b)19(u)-5(t)-335(w)12(a)-1(s)-321(l)2(ater)]TJ
+T*
+0.004 Tc
+[(e)14(xpl)5(ai)5(ned)-219(b)-2(y)-243(t)5(he)-239(di)5(s)8(c)2(o)10(v)10(e)2(ry)-219(of)-241(t)5(h)-2(e)-239(s)8(ecret)-248(boot)-224(bl)5(ock)-231(o)10(v)10(e)2(rl)5(ay)58(.)]TJ
+1.4936 -1.1925 TD
+[(The)-287(r)0(eal)5(i)5(zat)5(i)5(o)-2(n)-279(o)-2(f)-289(t)5(he)-287(e)14(x)-2(i)5(s)8(t)5(e)2(nce)-287(o)-2(f)-289(a)-287(s)8(ecret)-296(boot)-272(bl)5(ock)-279(h)-2(appened)-267(a)2(s)-294(a)-287(res)8(u)-2(l)5(t)-296(of)-289(t)5(h)-2(e)]TJ
+-1.4936 -1.2045 TD
+0 Tc
+[(o)-6(b)-6(s)4(erv)18(a)-2(tio)-6(n)-355(t)1(h)-6(a)-2(t)-372(overwritin)-6(g)-343(t)1(h)-6(e)-375(p)-6(r)-4(o)-6(cesso)-6(r)-366(r)-4(eset)-372(vecto)-6(r)-366(in)-379(th)-6(e)-375(F)2(LASH)-374(R)41(O)-1(M)-388(h)-6(as)-370(n)-6(o)]TJ
+T*
+0.004 Tc
+[(ef)24(fect)-236(on)-255(t)5(h)-2(e)-251(X)3(box)-243(boot)-236(s)8(e)2(quence.)-312(Thi)5(s)-245(l)5(e)2(d)-255(t)5(o)-255(a)-251(s)8(e)2(ri)5(es)-257(of)-241(e)14(xperi)5(ment)5(s)-233(t)5(hat)-248(m)-1(apped)-231(out)]TJ
+ET
+q
+137.52 0 0 -0.48 133.788 138.888 cm
+BI
+/W 1
+/H 1
+/BPC 1
+/IM true
+/F /CCF
+/DP <>
+ID P
+EI
+Q
+BT
+5.978 0 0 5.978 144.6 131.82 Tm
+0 Tc
+(1)Tj
+7.97 0 0 7.97 148.08 128.94 Tm
+-0.006 Tc
+[(A)-7(n)-259(im)-11(portant)-285(e)16(xception)-304(r)-4(ecently)-289(dis)-8(c)1(o)12(v)12(e)1(red)-304(i)1(s)-264(d)-3(es)-8(cribed)-289(in)-259(s)-8(ection)-289(6)-3(.)]TJ
+9.963 0 0 9.963 303.12 89.34 Tm
+0 Tc
+(4)Tj
+ET
+endstream
endobj
17 0 obj
<<
/ProcSet [ /PDF /Text /ImageB ]
/Font << /F6 4 0 R /F8 10 0 R >>
/ExtGState << /GS1 5 0 R >>
>>
endobj
18 0 obj
<<
/Type /Page
/Parent 6 0 R
/Resources 20 0 R
/Contents 19 0 R
>>
endobj
19 0 obj
<< /Length 14449 >>
stream
+0 0 0 0 k
+0 0 0 1 K
+0 J 1 j 0 w 10 M []0 d
+/GS2 gs
+1 i
+188.832 343.058 m
+221.574 343.058 l
+221.574 362.668 l
+188.832 362.668 l
+188.832 343.058 l
+B
+BT
+/F10 1 Tf
+5.827 0 0 5.827 191.721 351.112 Tm
+0 0 0 1 k
+0 Tc
+(controllers)Tj
+ET
+0 0 0 0.247 k
+383.794 402.851 m
+383.794 358.554 l
+383.969 357.853 l
+384.495 357.153 l
+385.283 356.54 l
+386.421 355.927 l
+387.821 355.315 l
+389.572 354.789 l
+391.498 354.352 l
+393.687 353.914 l
+396.138 353.564 l
+398.589 353.213 l
+401.303 353.038 l
+404.017 352.951 l
+406.731 352.863 l
+409.445 352.951 l
+412.159 353.038 l
+414.873 353.213 l
+417.412 353.564 l
+419.775 353.914 l
+421.964 354.352 l
+423.89 354.789 l
+425.641 355.315 l
+427.041 355.927 l
+428.18 356.54 l
+428.967 357.153 l
+429.493 357.853 l
+429.668 358.554 l
+429.668 402.851 l
+429.493 403.552 l
+428.967 404.252 l
+428.18 404.865 l
+427.041 405.565 l
+425.641 406.09 l
+423.89 406.616 l
+421.964 407.053 l
+419.775 407.491 l
+417.412 407.841 l
+414.873 408.104 l
+412.159 408.367 l
+409.445 408.454 l
+406.731 408.542 l
+404.017 408.454 l
+401.303 408.367 l
+398.589 408.104 l
+396.138 407.841 l
+393.687 407.491 l
+391.498 407.053 l
+389.572 406.616 l
+387.821 406.09 l
+386.421 405.565 l
+385.283 404.865 l
+384.495 404.252 l
+383.969 403.552 l
+383.794 402.851 l
+f
+1 J 0.364 w
+383.794 402.851 m
+383.794 358.554 l
+383.969 357.853 l
+384.495 357.153 l
+385.283 356.54 l
+386.421 355.927 l
+387.821 355.315 l
+389.572 354.789 l
+391.498 354.352 l
+393.687 353.914 l
+396.138 353.564 l
+398.589 353.213 l
+401.303 353.038 l
+404.017 352.951 l
+406.731 352.863 l
+409.445 352.951 l
+412.159 353.038 l
+414.873 353.213 l
+417.412 353.564 l
+419.775 353.914 l
+421.964 354.352 l
+423.89 354.789 l
+425.641 355.315 l
+427.041 355.927 l
+428.18 356.54 l
+428.967 357.153 l
+429.493 357.853 l
+429.668 358.554 l
+429.668 402.851 l
+429.493 403.552 l
+428.967 404.252 l
+428.18 404.865 l
+427.041 405.565 l
+425.641 406.09 l
+423.89 406.616 l
+421.964 407.053 l
+419.775 407.491 l
+417.412 407.841 l
+414.873 408.104 l
+412.159 408.367 l
+409.445 408.454 l
+406.731 408.542 l
+404.017 408.454 l
+401.303 408.367 l
+398.589 408.104 l
+396.138 407.841 l
+393.687 407.491 l
+391.498 407.053 l
+389.572 406.616 l
+387.821 406.09 l
+386.421 405.565 l
+385.283 404.865 l
+384.495 404.252 l
+383.969 403.552 l
+383.794 402.851 l
+383.969 402.151 l
+384.495 401.451 l
+385.283 400.838 l
+386.421 400.225 l
+387.821 399.612 l
+389.572 399.087 l
+391.498 398.562 l
+393.687 398.124 l
+396.138 397.774 l
+398.589 397.511 l
+401.303 397.248 l
+406.731 397.073 l
+412.159 397.248 l
+414.873 397.511 l
+417.412 397.774 l
+419.775 398.124 l
+421.964 398.562 l
+423.89 399.087 l
+425.641 399.612 l
+427.041 400.225 l
+428.18 400.838 l
+428.967 401.451 l
+429.493 402.151 l
+429.668 402.851 l
+S
+BT
+5.827 0 0 5.827 392.724 390.07 Tm
+0 0 0 1 k
+(key-locked)Tj
+0.3606 -1.202 TD
+0 Tw
+(hard disk)Tj
+-1.217 -1.202 TD
+(\(executeables,)Tj
+0.3756 -1.202 TD
+(cached data,)Tj
+T*
+(save games\))Tj
+ET
+0 0 0 0 k
+0 w
+272.35 475.689 m
+305.179 475.689 l
+305.179 508.43 l
+272.35 508.43 l
+272.35 475.689 l
+B
+BT
+5.827 0 0 5.827 278.303 493.898 Tm
+0 0 0 1 k
+(pentium)Tj
+0.7362 -1.202 TD
+(CPU)Tj
+ET
+0 0 0 0 k
+269.023 423.249 m
+308.418 423.249 l
+308.418 449.513 l
+269.023 449.513 l
+269.023 423.249 l
+B
+BT
+5.827 0 0 5.827 281.104 441.634 Tm
+0 0 0 1 k
+(NV2A)Tj
+-1.217 -1.202 TD
+(northbridge)Tj
+1.4274 -1.202 TD
+(+ gfx)Tj
+ET
+0 0 0 0 k
+269.023 364.244 m
+308.418 364.244 l
+308.418 390.507 l
+269.023 390.507 l
+269.023 364.244 l
+B
+BT
+5.827 0 0 5.827 280.404 379.127 Tm
+0 0 0 1 k
+(MCPX)Tj
+-1.187 -1.202 TD
+(southbridge)Tj
+ET
+0 0 0 0 k
+334.682 423.249 m
+367.423 423.249 l
+367.423 449.513 l
+334.682 449.513 l
+334.682 423.249 l
+B
+BT
+5.827 0 0 5.827 340.46 438.132 Tm
+0 0 0 1 k
+(SDRAM)Tj
+0.3606 -1.202 TD
+(64 MB)Tj
+ET
+269.023 279.063 39.395 32.742 re
+S
+BT
+5.827 0 0 5.827 279.266 304.276 Tm
+(FLASH)Tj
+0.4658 -1.202 TD
+(ROM)Tj
+-1.3673 -1.202 TD
+(\(bootloader)Tj
+-0.3155 -1.202 TD
+(+ OS kernel\))Tj
+ET
+0 0 0 0 k
+269.023 351.2 m
+308.418 351.2 l
+308.418 364.244 l
+269.023 364.244 l
+269.023 351.2 l
+B
+BT
+5.827 0 0 5.827 274.188 359.429 Tm
+0 0 0 1 k
+(secret boot)Tj
+1.3372 -1.187 TD
+(ROM)Tj
+ET
+0 0 0 0.247 k
+383.794 332.378 m
+383.794 304.539 l
+383.969 303.838 l
+384.495 303.138 l
+385.283 302.525 l
+386.421 301.912 l
+387.821 301.299 l
+389.572 300.687 l
+391.498 300.249 l
+393.687 299.811 l
+396.138 299.461 l
+398.589 299.198 l
+401.303 298.936 l
+404.017 298.848 l
+406.731 298.761 l
+409.445 298.848 l
+412.159 298.936 l
+414.873 299.198 l
+417.412 299.461 l
+419.775 299.811 l
+421.964 300.249 l
+423.89 300.687 l
+425.641 301.299 l
+427.041 301.912 l
+428.18 302.525 l
+428.967 303.138 l
+429.493 303.838 l
+429.668 304.539 l
+429.668 332.378 l
+429.493 333.078 l
+428.967 333.691 l
+428.18 334.391 l
+427.041 335.004 l
+425.641 335.617 l
+423.89 336.142 l
+421.964 336.667 l
+419.775 337.105 l
+417.412 337.455 l
+414.873 337.718 l
+412.159 337.893 l
+409.445 338.068 l
+404.017 338.068 l
+401.303 337.893 l
+398.589 337.718 l
+396.138 337.455 l
+393.687 337.105 l
+391.498 336.667 l
+389.572 336.142 l
+387.821 335.617 l
+386.421 335.004 l
+385.283 334.391 l
+384.495 333.691 l
+383.969 333.078 l
+383.794 332.378 l
+f
+0.364 w
+383.794 332.378 m
+383.794 304.539 l
+383.969 303.838 l
+384.495 303.138 l
+385.283 302.525 l
+386.421 301.912 l
+387.821 301.299 l
+389.572 300.687 l
+391.498 300.249 l
+393.687 299.811 l
+396.138 299.461 l
+398.589 299.198 l
+401.303 298.936 l
+404.017 298.848 l
+406.731 298.761 l
+409.445 298.848 l
+412.159 298.936 l
+414.873 299.198 l
+417.412 299.461 l
+419.775 299.811 l
+421.964 300.249 l
+423.89 300.687 l
+425.641 301.299 l
+427.041 301.912 l
+428.18 302.525 l
+428.967 303.138 l
+429.493 303.838 l
+429.668 304.539 l
+429.668 332.378 l
+429.493 333.078 l
+428.967 333.691 l
+428.18 334.391 l
+427.041 335.004 l
+425.641 335.617 l
+423.89 336.142 l
+421.964 336.667 l
+419.775 337.105 l
+417.412 337.455 l
+414.873 337.718 l
+412.159 337.893 l
+409.445 338.068 l
+404.017 338.068 l
+401.303 337.893 l
+398.589 337.718 l
+396.138 337.455 l
+393.687 337.105 l
+391.498 336.667 l
+389.572 336.142 l
+387.821 335.617 l
+386.421 335.004 l
+385.283 334.391 l
+384.495 333.691 l
+383.969 333.078 l
+383.794 332.378 l
+383.969 331.677 l
+384.495 330.977 l
+385.283 330.277 l
+386.421 329.664 l
+387.821 329.051 l
+389.572 328.526 l
+391.498 328.088 l
+393.687 327.65 l
+396.138 327.3 l
+398.589 326.95 l
+401.303 326.775 l
+404.017 326.687 l
+406.731 326.6 l
+409.445 326.687 l
+412.159 326.775 l
+414.873 326.95 l
+417.412 327.3 l
+419.775 327.65 l
+421.964 328.088 l
+423.89 328.526 l
+425.641 329.051 l
+427.041 329.664 l
+428.18 330.277 l
+428.967 330.977 l
+429.493 331.677 l
+429.668 332.378 l
+S
+BT
+5.827 0 0 5.827 393.424 320.822 Tm
+0 0 0 1 k
+(DVD drive)Tj
+-0.5409 -1.202 TD
+(\(game data /)Tj
+-0.2855 -1.202 TD
+(executeables\))Tj
+ET
+0 0 0 0 k
+0 w
+185.505 339.732 m
+218.247 339.732 l
+218.247 359.342 l
+185.505 359.342 l
+185.505 339.732 l
+B
+BT
+5.827 0 0 5.827 194.61 351.375 Tm
+0 0 0 1 k
+(game)Tj
+-1.0668 -1.202 TD
+(controllers)Tj
+ET
+0 0 0 0.247 k
+180.603 302.087 m
+223.15 302.087 l
+223.15 331.502 l
+180.603 331.502 l
+180.603 302.087 l
+B
+BT
+5.827 0 0 5.827 187.957 325.549 Tm
+0 0 0 1 k
+(dongles w/)Tj
+-0.5559 -1.202 TD
+(executeables)Tj
+0.0902 -1.202 TD
+(\(DVD player,)Tj
+1.8781 -1.187 TD
+(etc.\))Tj
+ET
+0 0 0 0 k
+308.418 376.15 m
+379.242 376.15 l
+379.242 371.685 l
+383.794 380.702 l
+379.242 389.72 l
+379.242 385.167 l
+308.418 385.167 l
+308.418 376.15 l
+f
+308.418 376.15 m
+379.242 376.15 l
+379.242 371.685 l
+383.794 380.702 l
+379.242 389.72 l
+379.242 385.167 l
+308.418 385.167 l
+308.418 376.15 l
+S
+BT
+5.827 0 0 5.827 341.248 378.952 Tm
+0 0 0 1 k
+(IDE)Tj
+ET
+0 0 0 0 k
+341.248 314.081 m
+379.855 314.081 l
+379.855 310.229 l
+383.794 318.02 l
+379.855 325.812 l
+379.855 321.872 l
+341.248 321.872 l
+341.248 314.081 l
+f
+341.248 314.081 m
+379.855 314.081 l
+379.855 310.229 l
+383.794 318.02 l
+379.855 325.812 l
+379.855 321.872 l
+341.248 321.872 l
+341.248 314.081 l
+S
+341.248 321.697 9.805 54.103 re
+f
+341.248 375.8 m
+341.248 321.697 l
+341.248 375.8 l
+351.053 375.8 m
+351.053 321.697 l
+351.053 375.8 l
+f
+341.248 375.8 m
+341.248 321.697 l
+351.053 375.8 m
+351.053 321.697 l
+S
+0 0 0 0 K
+0.364 w
+341.598 376.063 m
+341.598 375.712 l
+350.702 375.712 l
+350.702 376.063 l
+341.598 376.063 l
+B
+341.598 321.785 m
+341.598 321.435 l
+350.702 321.435 l
+350.702 321.785 l
+341.598 321.785 l
+B
+0 0 0 1 K
+0 w
+292.835 419.222 m
+296.95 419.222 l
+288.721 423.249 l
+280.579 419.222 l
+284.694 419.222 l
+284.694 394.622 l
+280.579 394.622 l
+288.721 390.507 l
+296.95 394.622 l
+292.835 394.622 l
+292.835 419.222 l
+B
+BT
+0.002 5.827 -5.827 0.002 289.483 397.424 Tm
+0 0 0 1 k
+(HyperT)Tj
+ET
+0 0 0 0 k
+330.567 432.354 m
+330.567 428.239 l
+334.682 436.381 l
+330.567 444.61 l
+330.567 440.496 l
+312.445 440.496 l
+312.445 444.61 l
+308.418 436.381 l
+312.445 428.239 l
+312.445 432.354 l
+330.567 432.354 l
+B
+BT
+5.827 0 0 5.827 311.57 434.63 Tm
+0 0 0 1 k
+(SSTL-2)Tj
+ET
+0 0 0 0 k
+292.835 471.661 m
+296.95 471.661 l
+288.721 475.689 l
+280.579 471.661 l
+284.694 471.661 l
+284.694 453.627 l
+280.579 453.627 l
+288.721 449.513 l
+296.95 453.627 l
+292.835 453.627 l
+292.835 471.661 l
+B
+BT
+0.002 5.827 -5.827 0.002 289.483 455.291 Tm
+0 0 0 1 k
+(GTL+)Tj
+5.827 0 0 5.827 299.489 464.308 Tm
+(64/)Tj
+-0.1503 -1.202 TD
+(32+)Tj
+3.005 -0.9015 TD
+(128/)Tj
+0.1202 -1.202 TD
+(21+)Tj
+-3.5459 -6.2504 TD
+(8/)Tj
+0.1352 -1.187 TD
+(2)Tj
+ET
+0 0 0 0 k
+292.835 347.173 m
+296.95 347.173 l
+288.721 351.2 l
+280.579 347.173 l
+284.694 347.173 l
+284.694 315.919 l
+280.579 315.919 l
+288.721 311.805 l
+296.95 315.919 l
+292.835 315.919 l
+292.835 347.173 l
+B
+BT
+0.002 5.827 -5.827 0.002 289.483 323.098 Tm
+0 0 0 1 k
+(legacy)Tj
+5.827 0 0 5.827 297.475 325.987 Tm
+(8/)Tj
+-0.4357 -1.202 TD
+(24+)Tj
+-4.4324 24.9416 TD
+(133)Tj
+-0.1803 -1.202 TD
+(MHz)Tj
+8.3389 -5.2137 TD
+(200)Tj
+-0.1953 -1.202 TD
+(MHz)Tj
+-0.0601 -1.202 TD
+(DDR)Tj
+-7.9032 -0.2855 TD
+(200)Tj
+-0.1803 -1.202 TD
+(MHz)Tj
+-0.0601 -1.202 TD
+(DDR)Tj
+0.0901 -12.2604 TD
+(< 10)Tj
+-0.03 -1.202 TD
+(MHz)Tj
+ET
+263.508 370.81 m
+242.847 370.81 l
+242.847 318.371 l
+228.753 318.371 l
+S
+262.983 372.823 m
+269.023 370.81 l
+262.983 368.796 l
+262.983 372.823 l
+f
+229.19 316.357 m
+223.15 318.371 l
+229.19 320.384 l
+229.19 316.357 l
+f
+228.753 383.942 m
+263.508 383.942 l
+S
+229.19 381.928 m
+223.15 383.942 l
+229.19 385.955 l
+229.19 381.928 l
+f
+262.983 385.955 m
+269.023 383.942 l
+262.983 381.928 l
+262.983 385.955 l
+f
+0.728 w
+249.413 344.634 124.576 176.928 re
+S
+BT
+5.827 0 0 5.827 278.916 523.138 Tm
+(secure hardware boundary)Tj
+ET
+0 0 0 0 k
+246.174 365.907 6.566 23.024 re
+f
+0 w
+246.174 365.907 m
+246.349 365.907 l
+247.225 365.907 m
+247.4 365.907 l
+248.275 365.907 m
+248.45 365.907 l
+249.326 365.907 m
+249.501 365.907 l
+250.376 365.907 m
+250.551 365.907 l
+251.427 365.907 m
+251.602 365.907 l
+252.477 365.907 m
+252.652 365.907 l
+252.74 366.695 m
+252.74 366.87 l
+252.74 367.746 m
+252.74 367.921 l
+252.74 368.796 m
+252.74 368.971 l
+252.74 369.847 m
+252.74 370.022 l
+252.74 370.897 m
+252.74 371.073 l
+252.74 371.948 m
+252.74 372.123 l
+252.74 372.999 m
+252.74 373.174 l
+252.74 374.049 m
+252.74 374.224 l
+252.74 375.1 m
+252.74 375.275 l
+252.74 376.15 m
+252.74 376.325 l
+252.74 377.201 m
+252.74 377.376 l
+252.74 378.251 m
+252.74 378.426 l
+252.74 379.302 m
+252.74 379.477 l
+252.74 380.352 m
+252.74 380.527 l
+252.74 381.403 m
+252.74 381.578 l
+252.74 382.453 m
+252.74 382.628 l
+252.74 383.504 m
+252.74 383.679 l
+252.74 384.554 m
+252.74 384.73 l
+252.74 385.605 m
+252.74 385.78 l
+252.74 386.656 m
+252.74 386.831 l
+252.74 387.706 m
+252.74 387.881 l
+252.74 388.757 m
+252.74 388.932 l
+251.864 388.932 m
+251.689 388.932 l
+250.814 388.932 m
+250.639 388.932 l
+249.763 388.932 m
+249.588 388.932 l
+248.713 388.932 m
+248.538 388.932 l
+247.662 388.932 m
+247.487 388.932 l
+246.612 388.932 m
+246.437 388.932 l
+246.174 388.319 m
+246.174 388.144 l
+246.174 387.268 m
+246.174 387.093 l
+246.174 386.218 m
+246.174 386.043 l
+246.174 385.167 m
+246.174 384.992 l
+246.174 384.117 m
+246.174 383.942 l
+246.174 383.066 m
+246.174 382.891 l
+246.174 382.016 m
+246.174 381.841 l
+246.174 380.965 m
+246.174 380.79 l
+246.174 379.915 m
+246.174 379.74 l
+246.174 378.864 m
+246.174 378.689 l
+246.174 377.814 m
+246.174 377.638 l
+246.174 376.763 m
+246.174 376.588 l
+246.174 375.712 m
+246.174 375.537 l
+246.174 374.662 m
+246.174 374.487 l
+246.174 373.611 m
+246.174 373.436 l
+246.174 372.561 m
+246.174 372.386 l
+246.174 371.51 m
+246.174 371.335 l
+246.174 370.46 m
+246.174 370.285 l
+246.174 369.409 m
+246.174 369.234 l
+246.174 368.359 m
+246.174 368.184 l
+246.174 367.308 m
+246.174 367.133 l
+246.174 366.258 m
+246.174 366.082 l
+226.476 415.108 m
+242.847 393.309 l
+S
+0 0 0 1 k
+244.16 394.972 m
+246.174 388.932 l
+240.921 392.521 l
+244.16 394.972 l
+f
+BT
+5.827 0 0 5.827 186.644 424.125 Tm
+(security relationship)Tj
+1.3523 -1.202 TD
+(not yet known)Tj
+33.3706 6.4157 TD
+(trusted code)Tj
+0.6761 -1.202 TD
+(and data:)Tj
+-1.202 -1.202 TD
+(digitally signed)Tj
+0.2254 -1.202 TD
+(with Microsoft)Tj
+0.6461 -1.202 TD
+(private key)Tj
+-1.2321 10.0067 TD
+(bus width:)Tj
+-0.2554 -1.202 TD
+(data/others)Tj
+ET
+380.555 482.254 m
+313.759 464.045 l
+S
+314.722 462.207 m
+308.418 462.557 l
+313.671 466.146 l
+314.722 462.207 l
+f
+BT
+5.827 0 0 5.827 209.23 458.53 Tm
+(bus clock)Tj
+1.2471 -1.187 TD
+(rate)Tj
+ET
+229.716 456.079 m
+260.444 462.207 l
+S
+259.568 464.045 m
+265.872 463.257 l
+260.356 460.106 l
+259.568 464.045 l
+f
+BT
+5.827 0 0 5.827 194.26 382.191 Tm
+(100Base-T)Tj
+ET
+242.847 352.863 m
+223.763 352.863 l
+S
+224.288 350.85 m
+218.247 352.863 l
+224.288 354.877 l
+224.288 350.85 l
+f
+BT
+5.827 0 0 5.827 228.665 368.359 Tm
+(USB)Tj
+ET
+400.253 423.249 m
+405.068 408.016 l
+S
+406.731 409.155 m
+406.731 402.851 l
+403.054 407.929 l
+406.731 409.155 l
+f
+BT
+/F6 1 Tf
+9.963 0 0 9.963 199.56 256.14 Tm
+0 g
+/GS1 gs
+0.005 Tc
+[(F)7(i)6(gure)-238(1)-1(:)-295(O)4(v)11(e)3(rvi)6(e)27(w)-225(o)-1(f)-240(t)6(he)-238(Mi)6(cros)9(oft)-223(X)4(box)-242(hardw)16(a)3(re.)]TJ
+10.3948 -16.7426 TD
+0 Tc
+(5)Tj
+ET
+endstream
endobj
20 0 obj
<<
/ProcSet [ /PDF /Text ]
/Font << /F6 4 0 R /F10 21 0 R >>
/ExtGState << /GS1 5 0 R /GS2 22 0 R >>
>>
endobj
21 0 obj
<<
/Type /Font
/Subtype /Type1
/Name /F10
/Encoding 73 0 R
/BaseFont /Helvetica
>>
endobj
22 0 obj
<<
/Type /ExtGState
/SA true
/OP false
/HT /Default
>>
endobj
23 0 obj
<< /Type /XObject /Subtype /Image /Name /Im1 /Width 900 /Height 806
/BitsPerComponent 8 /ColorSpace /DeviceGray /Length 123286 /Filter /DCTDecode >>
stream
+���� Adobe d� �� C ##""'"!!"''.030.'>>BB>>DDDDDDDDDDDDDDD�� &�" �� �
+ 3 !1AQa"q�2���B#$R�b34r��C%�S���cs5���&D�TdE£t6�U�e���u��F'���������������Vfv��������7GWgw���������� 9�� ? ��Kp��^�<$m�7%���. 6����\�\�&tq��ģƚ'pk�v"'����3��([eua`�
~:�N�ə��0�m�~��܇k��M�Ci?�)��;Ca ��(dI�g�R
n?��H������t�ܪb��E�/�f}1;g���I�\t� @�@�u�~��7H���mG�>���N����&�y�(���|?ؖ��#�����w�������'�|�'-#�����a��Sm0`;�����F�H:w� j�}���u��p�Lm���1c��i��?ސ��~������2���=��LA�=ɟȥ�:x^5Q�`�����'-p����$����t��E��-�/�)
+��xL�&77�Oȝ�� G�g���X��ِ@�
+.n��
D�+'o��q��Sv��G���I� ~��� YL�Z~������C�gwcϗ�E��7�~ :Z���:���e�H�t�зX.?I���r ��x�S�֙w���w�h�w$i䝍$I.�
G��F�=�����@�dv��ڦn��?���.l;M�:�%��:�E��qs���;��� 4�u�$�`&{@R�SV�ִC�x���9��̇1�ǔ�cv������Rqiys� h�5� ���+��d�N?��@� Ǐ���E�Y�Z �t��E��o=���]r�8��~���i 's]��xS,�;��
�� K�.3���۰;N=B���� �di��������5�w�R���i�"%��r�}@�D�}�O��SI:q�.������stq�$��Sc�u@�ճ��r��.� N����o����b�+�
6>��~�X�6�o��5��#u Dn� ^T��>��i�ô�L�@L��9N7
Ђg���ĵ��̨�{�`������Y'�