Polyalphabetical Ciphering Method - Cyneox
System Calls under Linux - Cyneox
RRLF Meeting 2k5 - DiA, philet0ast3r, rastafarie, SPTH
Save your fingers - get your fake names from the i-net - DiA
Some stealth idea's - DiA
Little bit about ASP Virus - Psychologic
EPOC Virus Tutorial - Retro
Code Evolution: Follow nature's example - Second Part To Hell
Over-File Splitting - Second Part To Hell
New era of bootsectorviruses #1: FAT12 IMG infection at Disks - Second Part To Hell
New era of bootsectorviruses #2: El Torito ISO infection at FAT32 - Second Part To Hell
Monad: Microsoft Command Shell Infection Tutorial - Second Part To Hell
Surrealism in viruswriting - Second Part To Hell
SnakeByte Interview - Second Part To Hell
Cyneox Interview - Second Part To Hell

Stronger social engineering in e-mail worms with free antivirus mail scanner circumvention - lifewire / ikx
Spreading by P2P for Fun and Profit - Rott_En / Helith
Out of Office Responses - roy g biv / 29A
Cross-scripting attacks - roy g biv / 29A