Security in cloud computing

Whitepaper on “hacking oracle from the web”

Operation Aurora exploit in Google Attack

XSS vulnerabilities in flash files

Bash shell logging technique

How to enable SSH on VMware ESX 3.5?