Video
Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux
Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux. This video is taken from YouTube and for education purpose…
Read More »How Stuxnet infect PLCs
This video demonstrates how W32.Stuxnet can compromise a Programmable Logic Controller (PLC), resulting in unintended consequences for the machines connected…
Read More »-
Symantec cyber war games 2014
សង្គ្រាមតាមប្រព័ន្ធអ៊ិនធឺណែត ២០១៤ របស់ក្រុមហ៊ុន Symantec ខាងក្រោមនេះគឺជាខ្សែវិដេអូ ដែលបង្ហាញពីទិដ្ឋភាពទូទៅអំពីវិធីសាស្ត្រដែលអ៊ិនធឺណែតដំណើការ ហើយនឹងឧបករណ៍សំខាន់ៗដែលបង្កើតឡើងនូវអ៊ិនធឺែណត។ នៅក្នុងនេះផងដែរ វិដេអូទាំងនេះនឹងបង្ហាញអ្នកអំពីភាពខុសគ្នានៃឧបករណ៍សន្តិសុខ (security device) ដែលកំពុងតែដំណើរការនាពេលបច្ចុប្បន្ននៅក្នុងសហគ្រាសធំៗ មុខងាររបស់ឧបករណ៍ ទាំងនោះ និងវិធីដែលអ្នកវាយប្រហារធ្វើការជ្រៀតចូល។ [mom_video type=”youtube” id=”2klYTmgqr-8″] វិដេអូខាងក្រោមគឺធ្វើការពន្យល់អ្នកពីជំហានដំបូងនៃការវាយប្រហារដែលពាក្យបច្ចេកទេសហៅថា Reconnaissance។…
Read More » Peter Warren Singer, “Cybersecurity and Cyberwar: What Everyone Needs to Know”
Published on Feb 10, 2014 Cybersecurity and CyberWar discusses the cybersecurity issues that challenge everyone: politicians wrestling with everything from…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 12: MAN-IN-THE-MIDDLE ATTACK
Description: Welcome to Part 12 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 11:ALFA CARD KUNG-FU
Description: Welcome to Part 11 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 10: HACKING ISOLATED CLIENTS
Description: Welcome to Part 10 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 8 EXPLOITING SEH
Description: Welcome to Part 8 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 6 SEH BASICS
Description: Welcome to Part 6 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 4 MINISHARE BUFFER OVERFLOW
Welcome to Part 4 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have not…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 7 OVERWRITE SEH
Description: Welcome to Part 7 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have…
Read More »Security – Information Security Conference 2014
This is the recorded video for the Information Security Conference 2014 @ Bangladesh. Please feel free to enjoy it.
Read More »Circle City Con 2014 – Profiling Campus Crime — Chris J., Jason J., Katelyn C.,Alex H.
Description: Abstract: A student study based on crime alerts to the campus community, of when, where, and the type of crimes…
Read More »Security Awareness – Shoulder Surfing
នៅក្នុងវិដេអូឃ្លីបមួយនេះនឹងបង្ហាញអ្នកអំពីវិធីសាស្ត្រក្នុងការលួចមើលនូវពាក្យសម្ងាត់របស់អ្នកដោយមើលពីខាងក្រោយអ្នក។
Read More »