Video
-
The Internet’s Own Boy – The story of Aaron Swartz
ភាពយន្ត Internet’s Own Boy – រឿងរ៉ាវរបស់ Aaron Swartz Aaron Hillel Swartz គឺជាអ្នកសរសេរកម្មវិធីកុំព្យួទ័រ សកម្មជនអិុនធឺែណត ជាសហស្ថានិកវិបសាយដ៏ល្បី Reddit ស្ថានិកអង្គការ Demand Progress និងជាសកម្មជនដែលជួយជ្រោមជ្រែងក្នុងការបង្កើតនូវ RSS…
Read More » BSIDESLA 2013 – Popping the Penguin: AN INTRODUCTION TO THE PRINCIPLES OF LINUX PERSISTENCE – MARK KITA
Description: Breaking in is half the battle. I’ve talked to so many people whose only objective is to try and break…
Read More »NOTACON 11 – A BRIEF INTRODUCTION TO GAME THEORY
Description: SynopsisFrom game shows to warfare, strategic decision-making surrounds us every day, whether you realize it or not. Game theory is…
Read More »Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux
Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux. This video is taken from YouTube and for education purpose…
Read More »How Stuxnet infect PLCs
This video demonstrates how W32.Stuxnet can compromise a Programmable Logic Controller (PLC), resulting in unintended consequences for the machines connected…
Read More »-
Symantec cyber war games 2014
សង្គ្រាមតាមប្រព័ន្ធអ៊ិនធឺណែត ២០១៤ របស់ក្រុមហ៊ុន Symantec ខាងក្រោមនេះគឺជាខ្សែវិដេអូ ដែលបង្ហាញពីទិដ្ឋភាពទូទៅអំពីវិធីសាស្ត្រដែលអ៊ិនធឺណែតដំណើការ ហើយនឹងឧបករណ៍សំខាន់ៗដែលបង្កើតឡើងនូវអ៊ិនធឺែណត។ នៅក្នុងនេះផងដែរ វិដេអូទាំងនេះនឹងបង្ហាញអ្នកអំពីភាពខុសគ្នានៃឧបករណ៍សន្តិសុខ (security device) ដែលកំពុងតែដំណើរការនាពេលបច្ចុប្បន្ននៅក្នុងសហគ្រាសធំៗ មុខងាររបស់ឧបករណ៍ ទាំងនោះ និងវិធីដែលអ្នកវាយប្រហារធ្វើការជ្រៀតចូល។ [mom_video type=”youtube” id=”2klYTmgqr-8″] វិដេអូខាងក្រោមគឺធ្វើការពន្យល់អ្នកពីជំហានដំបូងនៃការវាយប្រហារដែលពាក្យបច្ចេកទេសហៅថា Reconnaissance។…
Read More » Peter Warren Singer, “Cybersecurity and Cyberwar: What Everyone Needs to Know”
Published on Feb 10, 2014 Cybersecurity and CyberWar discusses the cybersecurity issues that challenge everyone: politicians wrestling with everything from…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 12: MAN-IN-THE-MIDDLE ATTACK
Description: Welcome to Part 12 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 11:ALFA CARD KUNG-FU
Description: Welcome to Part 11 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 10: HACKING ISOLATED CLIENTS
Description: Welcome to Part 10 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 8 EXPLOITING SEH
Description: Welcome to Part 8 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 6 SEH BASICS
Description: Welcome to Part 6 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 4 MINISHARE BUFFER OVERFLOW
Welcome to Part 4 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have not…
Read More »EXPLOIT RESEARCH MEGAPRIMER PART 7 OVERWRITE SEH
Description: Welcome to Part 7 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have…
Read More »