Video
Defcon 21 – Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Description: The US National Security Agency has been public about the inevitability of mobile computing and the need to support…
Read More »Defcon 21 – ACL Steganography – Permissions to Hide Your Porn
Description: Everyone’s heard the claim: Security through obscurity is no security at all. Challenging this claim is the entire field…
Read More »Defcon 21 – Torturing Open Government Systems for Fun, Profit and Time Travel
Description: “I’m from the government and I’m here to help you” takes on a sinister new meaning as jurisdictions around the…
Read More »DEFCON 21 – PROLIFERATION
Description: Ambassador Joseph DeTrani was named President of the Intelligence and National Security Alliance (INSA) on February 5, 2013. As President,…
Read More »-
LiveTechTalkShow – Hacking Your WebCam
សូមចុចលើ Use Original Player បើសិនជាអ្នកមើលមិនឃើញ នៅក្នុងយប់នេះ (ថ្ងៃទី ២៩ ខែធ្នូ ២០១៣) ក្រុមយើងខ្ញុំនឹងលើកយក “Hacking Your Webcam” មកធ្វើការ Live ផ្ទាល់ ចាប់ពីម៉ោង 9:30PM-11:00PM។ សូមរង់ចាំតាមដាន…
Read More » Network security threats explained: Advanced persistent threats
What exactly is an “advanced persistent threat” (APT)? Sophos security expert James Lyne breaks down this somewhat complicated and overused…
Read More »-
LiveTechTalkShow – Hack Windows Via Browsers and PDF Vs. JAVA by Jao Komsot
លោក ចៅ កំសត់បានត្រលប់មកវិញហើយ … សូមរងចាំទស្សនាការផ្សាយផ្ទាល់ក្រោយប្រធានបទ “Hack Windows Via Browsers and PDF Vs. JAVA” វេលាម៉ោង 9.30នាទី យប់នេះ ។ សូមចុចលើ Use Original…
Read More » Putin talks NSA, Syria, Iran, drones in exclusive RT interview
Vladimir Putin speaks to RT while visiting the channel in the capital. Various themes were discussed during the interview: Syria,…
Read More »How to Hack a Web Site by Dr. Susan Loveland
In this first lecture of the Fall 2010 series, Dr. Loveland and her special guest Eve Hacker take you on…
Read More »-
Workshop – OWASP AppSec EU 2013 (Complete)
Modern web applications frequently implement complex control flows, which require the users to perform actions in a given order. Users…
Read More » -
LiveTechTalkShow – Exploit Window 7 using VLC Player
Online TV Tech Talk Show ដោយនិសិ្សត BBU ក្រុមនិសិ្សតនៃសាកលវិទ្យាល័យប្រៀលប្រាយជំនាញផ្នែកព័ត៌មានវិទ្យា មានកតិ្តយសសូមជម្រាបជូនសាធារណៈជនទាំងអស់មេត្តាជ្រាបថា៖ ដោយមានបំណងចែករំលែកព័ត៌មាន និងចំណេះដឹងទាក់ទងនឹង ផ្នែកព័ត៌មានវិទ្យា ឲ្យកាន់តែមានភាពទូលំទូលាយបន្ថែមទៀតនោះ ក្រុមនិស្សិតយើងខ្ញុំបានបង្កើតឡើងនូវ Online TV Tech Talk Show (Live)…
Read More » BBC Horizon – Defeating the Hackers HD
Exploring the murky and fast-paced world of the hackers out to steal money and identities and wreak havoc with people’s…
Read More »Top security stories of 2013 – the expert opinion
Vitaly Kamluk, Principal Security Researcher of Kaspersky Lab discussing what was the most important in 2013, the way we use…
Read More »Google Data Center
Exclusive Video Inside Google. (I Dont Own This, All Rights Go To CBS News)
Read More »