Video
EXPLOIT RESEARCH MEGAPRIMER PART 3 STRCPY BUFFER OVERFLOW
Welcome to Part 3 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have not…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 2 MEMCPY BUFFER OVERFLOW
Welcome to Part 2 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have not…
Read More »Exploit Research Megaprimer Part 1 Topic Introduction by Vivek
We are starting a new Exploit Research Megaprimer on SecurityTube. The prerequisites for this series include the following: 1. Assembly Language…
Read More »Custom Wireless Regulation Database
Description: Sorry about the audio I know its out be a little and I sound like crap but Linux and my…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 13 : SSL Man-In-The-Middle Attack
Description: Welcome to Part 13 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »-
The Internet’s Own Boy – The story of Aaron Swartz
ភាពយន្ត Internet’s Own Boy – រឿងរ៉ាវរបស់ Aaron Swartz Aaron Hillel Swartz គឺជាអ្នកសរសេរកម្មវិធីកុំព្យួទ័រ សកម្មជនអិុនធឺែណត ជាសហស្ថានិកវិបសាយដ៏ល្បី Reddit ស្ថានិកអង្គការ Demand Progress និងជាសកម្មជនដែលជួយជ្រោមជ្រែងក្នុងការបង្កើតនូវ RSS…
Read More » BSIDESLA 2013 – Popping the Penguin: AN INTRODUCTION TO THE PRINCIPLES OF LINUX PERSISTENCE – MARK KITA
Description: Breaking in is half the battle. I’ve talked to so many people whose only objective is to try and break…
Read More »NOTACON 11 – A BRIEF INTRODUCTION TO GAME THEORY
Description: SynopsisFrom game shows to warfare, strategic decision-making surrounds us every day, whether you realize it or not. Game theory is…
Read More »Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux
Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux. This video is taken from YouTube and for education purpose…
Read More »How Stuxnet infect PLCs
This video demonstrates how W32.Stuxnet can compromise a Programmable Logic Controller (PLC), resulting in unintended consequences for the machines connected…
Read More »-
Symantec cyber war games 2014
សង្គ្រាមតាមប្រព័ន្ធអ៊ិនធឺណែត ២០១៤ របស់ក្រុមហ៊ុន Symantec ខាងក្រោមនេះគឺជាខ្សែវិដេអូ ដែលបង្ហាញពីទិដ្ឋភាពទូទៅអំពីវិធីសាស្ត្រដែលអ៊ិនធឺណែតដំណើការ ហើយនឹងឧបករណ៍សំខាន់ៗដែលបង្កើតឡើងនូវអ៊ិនធឺែណត។ នៅក្នុងនេះផងដែរ វិដេអូទាំងនេះនឹងបង្ហាញអ្នកអំពីភាពខុសគ្នានៃឧបករណ៍សន្តិសុខ (security device) ដែលកំពុងតែដំណើរការនាពេលបច្ចុប្បន្ននៅក្នុងសហគ្រាសធំៗ មុខងាររបស់ឧបករណ៍ ទាំងនោះ និងវិធីដែលអ្នកវាយប្រហារធ្វើការជ្រៀតចូល។ [mom_video type=”youtube” id=”2klYTmgqr-8″] វិដេអូខាងក្រោមគឺធ្វើការពន្យល់អ្នកពីជំហានដំបូងនៃការវាយប្រហារដែលពាក្យបច្ចេកទេសហៅថា Reconnaissance។…
Read More » Peter Warren Singer, “Cybersecurity and Cyberwar: What Everyone Needs to Know”
Published on Feb 10, 2014 Cybersecurity and CyberWar discusses the cybersecurity issues that challenge everyone: politicians wrestling with everything from…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 12: MAN-IN-THE-MIDDLE ATTACK
Description: Welcome to Part 12 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 11:ALFA CARD KUNG-FU
Description: Welcome to Part 11 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »