JL's stuff

a boring blog about my interests, projects and research...

Wednesday, July 02, 2008

Microsoft Office Binary File Format Documents

Microsoft Office Binary File Format Documents were recently released. Should be useful to someone.
Posted by Jamie Levy at 3:39 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: docs, microsoft

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Jamie Levy
View my complete profile

Disclaimer

Anything I write here is of my own opinion and does not reflect the views of my current employer, ever. Now move along and quit trying to read meaning into every word I write here ;-)

My stuff

  • Volatility Training
  • Volatility Code Repository
  • github site
  • Linkedin
  • Twitter
  • Various stuff
  • PERMEATE

Labels

blackhat dc (2) blackhat vegas (2) CEIC (5) CentOS (3) conferences (6) cygwin (2) docs (2) elf (1) Enfuse (1) EnScript (5) enterprise (1) forensics (8) fun stuff (20) google (1) hope (2) hunting (1) installation (15) john jay (10) kcore (2) life (4) links (2) linux (14) malware (9) memory (27) microsoft (3) misc (2) misc forensic (8) modifications (1) news (23) nothing (6) nyc4sec (7) OMFW (9) open question (1) permeate (1) plugins (4) PTK (4) PyFlag (4) queens college (1) quickie (1) registry (3) talks (16) timeline (2) tools (17) training (5) travel (1) VDP (5) vista (2) vmware (1) volatility (44) volshell (2) windows (7) work (4) xp (2)

Blog Archive

  • ►  2016 (2)
    • ►  May (1)
    • ►  January (1)
  • ►  2015 (3)
    • ►  June (1)
    • ►  May (1)
    • ►  January (1)
  • ►  2014 (3)
    • ►  April (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2013 (4)
    • ►  July (1)
    • ►  April (1)
    • ►  January (2)
  • ►  2012 (10)
    • ►  November (2)
    • ►  September (4)
    • ►  April (1)
    • ►  March (3)
  • ►  2011 (11)
    • ►  September (1)
    • ►  August (1)
    • ►  April (4)
    • ►  March (4)
    • ►  January (1)
  • ►  2010 (21)
    • ►  December (2)
    • ►  November (2)
    • ►  October (1)
    • ►  August (2)
    • ►  July (4)
    • ►  May (1)
    • ►  March (1)
    • ►  February (5)
    • ►  January (3)
  • ►  2009 (33)
    • ►  December (4)
    • ►  November (2)
    • ►  October (5)
    • ►  August (5)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (3)
    • ►  February (4)
    • ►  January (4)
  • ▼  2008 (25)
    • ►  December (1)
    • ►  November (2)
    • ►  October (2)
    • ►  September (4)
    • ►  August (2)
    • ▼  July (10)
      • Cuil Not So Cool
      • The Last Hope (afterwards)
      • Linux Memory Forensics
      • PTK 0.2 Released
      • Maze Generator
      • Windows DNS bug fix can impair firewalls
      • The Last Hope
      • PTK on Fedora 8
      • MDD
      • Microsoft Office Binary File Format Documents
    • ►  June (4)

Followers

Stuff I Read

  • Didier Stevens
    DSS_DEFAULT_HASH_ALGORITHMS
  • Schneier on Security
    The Ramifications of Ukraine’s Drone Attack
  • Windows Incident Response
    I've Seen Things
  • That grumpy BSD guy
    That Grumpy BSD Guy: A Short Reading List
  • xorl %eax, %eax
    BSidesBUD 2023: A Deeper Look at the Disrupted Bot Farms in Ukraine
  • Volatility
    Here are the most important features of the battery-powered...
  • Volatility Labs
    Results from the 2019 Volatility Contests are in!
  • Integriography: A Journal of Broken Locks, Ethics, and Computer Forensics
    SAR UAVs: Video examples of IR, optical, and other challenges
  • Push the Red Button
    Of Bugs and Baselines
  • CYB3RCRIM3
    Child Sex Trafficking and Bypassing Security on a Tablet Computer
  • Memory Forensics
    Bringing together the DFIR Industry and Academia at DFRWS 2017
  • Digital Forensics Solutions
    Cara Memperbaiki Flashdisk yang Tidak Bisa di format
  • Girl, Unallocated
    Belajar Forex Untuk Pemula
  • invisiblethings' blog
    Migrating my blog out of Blogger...
  • A Day in the Life of an Information Security Investigator
    Videos: BSides Columbus Ohio, USA 2015
  • Command Line Kung Fu
    Episode #180: Open for the Holidays!
  • Forensics from the sausage factory
    Imaging drives protected with Apple FileVault2 encryption
  • Scudette in Wonderland
    Anti-forensics and memory analysis.
  • ForensicZone
    Wisconsin Association of Computer Crime Investigators 2013 Conference
  • MNIN Security Blog
    How to DoS Authenticode Signature Verification and Spoil Live Forensics with Echo
  • Digital Forensic Source
    A Rubik's Approach: Casey Anthony Google Searches Overlooked & Lessons Learned
  • Geoff Black's Forensic Gremlins
    Sorting in EnScript – Sorting Arrays and NameListClass / NameValueClass
  • Into The Boxes
    Into The Boxes: Call for Collaboration 0×02 – Second Try
  • int for(ensic){blog;}
    Evtx Parser Version 1.1.1
  • Malware and Security
    AnonCommunicate
  • Forensic Incident Response
    On the sophistication of attacks
  • Gustavo Duarte
    Added Best Of Page, Back to Writing
  • Forensic Computing
    If Apple did computer forensics…
  • Volatile Systems
    Got Memory Forensics and Malware Analysis skillz?
  • Security Ripcord
  • McGrew Security Blog

:-)

-gleeda
Theme images by mammuth. Powered by Blogger.