Hardware

Stay current with the components, peripherals and physical parts that constitute your IT department.

  • Webcasts // Apr 2015

    Network Attached Shell: N.A.S.ty Systems That Store Network Accessible Shells

    In this webcast, the presenter focus on "How to", and the implications of compromising network based storage systems, but will conclude that the absence of security in not only storage hardware, but networking hardware in general, has left data unprotected and millions of networks vulnerable to exploitation.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Hard Drive Punch: Destroying Data as a Performative Act

    In general data is stored on technically sensitive systems and can easily be lost. At the same time files today appear often as indestructible once uploaded to the Internet. In this webcast, the presenter will explain about a variety of approaches on data destruction and how these connect to current...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Uncaging Microchips - Techniques for Chip Preparation

    An entertaining, thrilling and educational journey through the world of chip preparation. Deep insight into amateur-as well as professional methods and equipment is given, for the first, most important steps for analysis and attacks on dedicated hardware.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Towards General Purpose Reconfigurable Computing on Novena - FPGAs for Everybody with Novena

    The Novena open source laptop contains a FPGA, but free software support for FPGAs is lacking and requires root access to the hardware. The presenters' work is on providing a framework and a demonstration application for general purpose accelerator cores for Novena's FPGA.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Hardware Reverse-Engineering Tools New Threats - New Opportunities

    More recently, such forms of analysis have been obsoleted by advanced invasive analysis techniques that utilize capital-intensive failure analysis equipment and require extensive technical skills. One such technique, laser glitching, has recently been included into common criteria evaluations. The transient faults produced by laser glitching are similar in nature to...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Teridian SoC Exploitation: Exploration of Harvard Architecture Smart Grid Systems

    The Teridian system-on-a-chip platform wraps a complete system around a modified 8051 core, with additional features for chip security to block debug functionality and external access to memory. Additionally, the Harvard architecture design sets relatively rigid barriers between code and data (as opposed to x86/64), which presents an unintentional security...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Synthetic Data Generation and Defense in Depth Measurement of Web Applications

    In this webcast, the presenter will explain quickly cover architecture and system overviews, then dive into exploitation scenarios with techniques to attack Harvard architecture systems and code security implementations. End state results include pathways to gain coveted binary images of firmware and resident code execution.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Single Chip Microcontrollers: Beyond Arduino

    The world of Arduino has introduced many to the world of embedded controls. What does the world of commercial single chip microcontroller development look like? Are the users ready to move beyond Arduino? Come learn how the "Pros" do single chip embedded development and easy ways they can take their...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Absolute Backdoor Revisited

    In this webcast, the presenter will includes a live demonstration of security flaws in modern anti-theft technologies that reside in firmware and PC BIOS of most popular laptops and some desktop computers. While the general idea behind anti-theft technology is good, improper implementation can render it useless as well as...

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    Citrix App Orchestration 2.5 Overview

    Citrix App Orchestration accelerates and automates the delivery of Desktops-as-a-Service (DaaS). It is built on proven Citrix best practices; App Orchestration helps service providers design and implement a secure, multi-tenant, multi-domain and multi-location based environment.

    Provided By Citrix Systems

  • Webcasts // Apr 2014

    The Collaboration System that Brings Teams Together

    Sharing knowledge, developing ideas, making better decisions – these move agencies and teams in the right direction. With Christie Brio, you can simultaneously contribute rich multimedia content from multiple wireless sources and engage easily with colleagues – in the same room or around the world, in real-time. Learn about Christie...

    Provided By AVI-SPL

  • Webcasts // Mar 2014

    Citrix DaaS - A High-Growth Hosted Business Opportunity for Service Providers

    Citrix Service Provider (CSP) partners have four unique opportunities to create a high-value, high-growth DaaS business. The four unique opportunities are: the opportunity to develop a profitable hosted business with complete technical, business and marketing resources, the opportunity to differentiate and focus with vertical advice and specialized offerings, opportunities beyond...

    Provided By Citrix Systems

  • Webcasts // Feb 2014

    Answering the Tough Question: Who Has Access to What?

    Learn from this webcast how to select specific users or groups in Active Directory (AD) and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.

    Provided By Dell Software

  • Webcasts // Jan 2014

    A Syscall to ARMs

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    All Your Baseband Are Belong to Us

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army or Gained in Translation

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to Firmware Analysis

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    General Notes About Exploiting Windows X64

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    Citrix XenDesktop: Concepts

    In this webcast, the presenter explains about the concepts inside the new Citrix XenDesktop architecture. The presenter also explains couple of important infrastructure concepts they are : machine catalog and delivery group.

    Provided By DABCC

  • Webcasts // Nov 2013

    Ensuring Application Readiness Processes for Mobile Application Management

    In this webcast, the presenter discusses the rapid increase in mobile applications within the enterprise. The presenter also discusses some of the mobile application management challenges and explains how mature best practices in desktop application readiness should be leveraged to create similarly robust processes for managing mobile applications.

    Provided By DABCC

  • Webcasts // Nov 2012

    Linear Book Scanner

    In this webcast, the presenter talks about a hardware prototype of an automatic, non-destructive book scanner. The machine turns pages automatically, and captures high-resolution images of each page. It was developed in 20% time, and built in the Google Workshops.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2012

    X-Series Overview

    The X-series direct connect, desktop virtualization kits enable up to eleven users to simultaneously share a single PC at a fraction of the cost of a typical PC. Each user enjoys their own virtual workspace complete with their own applications, settings, files and preferences providing each user with a rich...

    Provided By DABCC

  • Webcasts // Oct 2012

    Introduction to Virtual Desktop Infrastructure with VMware View

    Although the capital expenditures for traditional computers have decreased over time, the operational costs of managing these desktops have increased significantly because of the escalating complexity of tasks, labor costs and security concerns. End users are also tied to a single piece of hardware to access all their data and...

    Provided By VMware

  • Webcasts // Sep 2012

    Cable Modem Termination Systems (CMTS): Architecture, Configuration, and Troubleshooting

    In this webcast, the presenter going to provides an overview about the Cisco Cable Modem Termination System (CMTS) platforms and the uBR product family. The presenter also explains about the Cable Modem Termination Systems architecture and the system configuration.

    Provided By Cisco Systems

  • Webcasts // Aug 2012

    Google I/O 2012 - Writing Efficient Drive Apps for Android

    In this webcast, the presenter will explain about how to write Drive apps that synchronize files with Android devices. The presenter will also explains about how to open files on Android devices, or create new files from this environment.

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    Google Faculty Summit 2009: Education - Young Android (App Inventor), CS4HS, YouTubeEDU

    Each year Google hosts leading academics from universities across the globe though the user faculty summit program. In this webcast, the presenter will about the education along with the Young Android applications.

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    Google I/O 2012 - Building Android Applications That Use Web APIs

    Google offers a large and growing set of back-end services, from AdSense to Tasks to Calendar to Google+, that can enrich their app, and increasingly they have a uniform set of APIs. In this webcast, the presenter will discusses how to use them efficiently and securely, including authenticating safely and...

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2012

    Nate Koechley: A Taxonomy of Touch

    The presenter breaks down the elements of touch primitives, gestures and semantics, laying a foundation for the broader language of touch interactions that drive the emerging class of portable devices.

    Provided By Oleksiy Kovyrin

  • Webcasts // Mar 2012

    Post Memory Corruption Analysis & Exploitation

    In this webcast, the presenter will introduce a new exploitation methodology of invalid memory reads and writes, based on dataflow analysis after a memory corruption bug has occurred inside a running process. The presenter will expose a methodology which shall help with writing a reliable exploit out of a PoC...

    Provided By SecurityTube.net

  • Webcasts // Mar 2012

    Desktop Betrayal: Exploiting Clients Through the Features They Demand

    In this webcast, the presenters will not disclose any vulnerabilities within popular client software, they will be releasing multiple attacks that use these clients against their users. They will be discussing attacks using JavaScript, HTML5, PDF files and Firefox extensions.

    Provided By SecurityTube.net

  • Webcasts // Mar 2012

    Building a Svartkast: Cheap Hardware to Leave Behind on Someone Else's Network

    It's useful to control a host on a remote network, but the users don't necessarily have to pwn a box that is already there. The users can also leave behind a host they can remote into, or since egress filtering rules are often less restrictive than ingress, have it shovel...

    Provided By SecurityTube.net

  • Webcasts // Mar 2012

    Inside Apple's MDM Black Box

    Mobile Device Management (MDM) has become a hot topic as organizations are pressured to bring iStuff into their organization, especially as BYOD (Bring Your Own Device) gains steam. Mobile devices are invading every level of corporate society, making the need to remotely manage and control them increasingly urgent.

    Provided By SecurityTube.net

  • Webcasts // Mar 2012

    Satyen Desai: A Phone, a Tablet and a Laptop Walk Into a Bar

    The presenter creator of the YUI 3 component and widget subsystems, discusses YUI's approach to supporting the new set of web enabled devices on the market today, and how the user would like to think of them in terms of features and constraints as opposed to an isolated problem space.

    Provided By Oleksiy Kovyrin

  • Webcasts // Jan 2012

    Nike FuelBand, IBooks Textbooks, IBooks Author, Card.io App, BackSTAGE Pro II

    In this webcast, the presenter going to give an overview about iBooks textbooks. Another outcome of Apple's education event, this allows the user to create and publish books from scratch for their iPad. There's all kinds of visual fun built in as well.

    Provided By ViMedicus, Inc.

  • Webcasts // Jan 2012

    Digital Camera Picture Quality

    In this webcast, the presenter explains about digital camera picture quality. The presenter also discusses can a digital camera capture high-quality video?; can a cell phone capture high-quality stills?; can a video camcorder capture high-quality digital stills?

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    How Digital Cameras Work

    In this webcast, the presenter shares his experience of using digital camera and its work. The presenter also discusses about the usage of "Image stabilizing and various image stabilizers technology which is used in today's cameras and about shutter speed range that is needed for digital camera.

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    How to Defrag a Computer

    If constantly annoyed by the slowing down of their computer and would like to know the techniques to speed it up. In this Webcast the presenter describes about how to Defrag a computer thereby increasing its overall speed.

    Provided By Videojug