Press "Enter" to skip to content

Posts tagged as “cyber”

Pentesting for n00bs: Episode 5 – Jerry

0:00 – Introduction and box overview 2:53 – Reviewing scan results 4:34 – Exploring port 8080 6:15 – Apache Tomcat default credentials 6:50 – Configuring…

Black Tech Talk E256: SysAdmin's and Cyber Security

1) https://opensource.com/article/19/7/be-a-sysadmin 2) https://www.redhat.com/sysadmin/locking-down-sshd 3) https://certification.comptia.org/it-career-news/post/view/2019/06/17/what-is-the-difference-between-it-security-and-cybersecurity 4) https://krebsonsecurity.com/2019/07/quickbooks-cloud-hosting-firm-insynq-hit-in-ransomware-attack/ 5) https://www.wired.com/story/browser-extensions-data-slack-passwords-security-roundup/?verso=true 6) https://www.linuxjournal.com/content/shrinking-linux-attack-surfaces 7) https://www.zdnet.com/article/this-new-ransomware-is-targeting-network-attached-storage-devices/

Israel's ultra secret cyber warfare "Unit 8200"

( From Wikipedia) Unit 8200 (Hebrew: יחידה 8200‎, Yehida shmonae -Matayim- “Unit eight – two hundred”) is an Israeli Intelligence Corps unit responsible for collecting…

Election Security and Cyber Security

To celebrate the grand opening of our new home, the Keller Center, Harris Public Policy hosted a forum with leading academic experts and policy voices.…

Pentesting for n00bs: Episode 1 – Legacy

0:00 – Introduction 3:25 – Begin nmap scan / overview of nmap properties 9:54 – TCP handshake vs SYN/stealth scanning 13:48 – Reviewing our nmap…

Machine Learning for Cyber Security: Clustering

Description: In this video, we are going to show you how to use sklearn to do clustering. You can also visit our website here: http://www.ricardocalix.com/teaching/MLCyber/course1.htm…

The Absolute Beginners Guide to Cyber Security 2019

Learn Cyber Security concepts such as hacking, malware, firewalls, worms, phishing, encryption, biometrics, BYOD & more What you’ll learn Understand the basic concepts and terminologies…