| 2014-04-30 | keyscan.py: looking for prime factors | 路人甲 | 8947 | |
| 2014-04-30 | Defending Against Network-based Distributed Denial of Service Attacks | 路人甲 | 2571 | |
| 2014-04-30 | 用Google语音识别API破解reCaptcha验证码 | 路人甲 | 3916 | |
| 2014-04-30 | Joomla Plugin Constructor Backdoor | 路人甲 | 2258 | |
| 2014-04-30 | 某众多高校邮件系统的0day挖掘思路及XSS新防御方案 | 路人甲 | 2623 | |
| 2014-04-30 | Laravel cookie伪造,解密,和远程命令执行 | 路人甲 | 4976 | |
| 2014-04-30 | Best Paper Awards in Computer Science (since 1996) | 路人甲 | 2801 | |
| 2014-04-30 | Revisiting Mac OS X Kernel Rootkits | 路人甲 | 2745 | |
| 2014-04-30 | 那些年,那些 Apache Struts2 的漏洞 | 路人甲 | 2220 | |
| 2014-04-30 | 小米自动化运维实践 qcon 2014 Beijing | 路人甲 | 2298 | |
| 2014-04-30 | Identifying Malware Traffic with Bro and (CIF) | 路人甲 | 3059 | |
| 2014-04-30 | 基于AngularJS的企业软件前端架构 | 路人甲 | 2502 | |
| 2014-04-30 | 可能被绕过的防御有什么用 | 路人甲 | 2564 | |