Hardware

Stay current with the components, peripherals and physical parts that constitute your IT department.

  • Webcasts // Apr 2015

    Webcast: You Don't Know What You Don't Know! New Insights for Driving Cloud Strategy Through Analyzing Existing Behavior

    You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how good we are at managing our existing technologies. In this webinar we’ll explore the world of cloud...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Apr 2015

    Network Attached Shell: N.A.S.ty Systems That Store Network Accessible Shells

    In this webcast, the presenter focus on "How to", and the implications of compromising network based storage systems, but will conclude that the absence of security in not only storage hardware, but networking hardware in general, has left data unprotected and millions of networks vulnerable to exploitation.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hard Drive Punch: Destroying Data as a Performative Act

    In general data is stored on technically sensitive systems and can easily be lost. At the same time files today appear often as indestructible once uploaded to the Internet. In this webcast, the presenter will explain about a variety of approaches on data destruction and how these connect to current...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Uncaging Microchips - Techniques for Chip Preparation

    An entertaining, thrilling and educational journey through the world of chip preparation. Deep insight into amateur-as well as professional methods and equipment is given, for the first, most important steps for analysis and attacks on dedicated hardware.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Towards General Purpose Reconfigurable Computing on Novena - FPGAs for Everybody with Novena

    The Novena open source laptop contains a FPGA, but free software support for FPGAs is lacking and requires root access to the hardware. The presenters' work is on providing a framework and a demonstration application for general purpose accelerator cores for Novena's FPGA.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hardware Reverse-Engineering Tools New Threats - New Opportunities

    More recently, such forms of analysis have been obsoleted by advanced invasive analysis techniques that utilize capital-intensive failure analysis equipment and require extensive technical skills. One such technique, laser glitching, has recently been included into common criteria evaluations. The transient faults produced by laser glitching are similar in nature to...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Teridian SoC Exploitation: Exploration of Harvard Architecture Smart Grid Systems

    The Teridian system-on-a-chip platform wraps a complete system around a modified 8051 core, with additional features for chip security to block debug functionality and external access to memory. Additionally, the Harvard architecture design sets relatively rigid barriers between code and data (as opposed to x86/64), which presents an unintentional security...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Synthetic Data Generation and Defense in Depth Measurement of Web Applications

    In this webcast, the presenter will explain quickly cover architecture and system overviews, then dive into exploitation scenarios with techniques to attack Harvard architecture systems and code security implementations. End state results include pathways to gain coveted binary images of firmware and resident code execution.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    More Shadow Walker the Progression of TLB Splitting on X86

    In this webcast, the presenter will cover the concept of Translation Lookaside Buffer (TLB) splitting for code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Single Chip Microcontrollers: Beyond Arduino

    The world of Arduino has introduced many to the world of embedded controls. What does the world of commercial single chip microcontroller development look like? Are the users ready to move beyond Arduino? Come learn how the "Pros" do single chip embedded development and easy ways they can take their...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Absolute Backdoor Revisited

    In this webcast, the presenter will includes a live demonstration of security flaws in modern anti-theft technologies that reside in firmware and PC BIOS of most popular laptops and some desktop computers. While the general idea behind anti-theft technology is good, improper implementation can render it useless as well as...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Citrix App Orchestration 2.5 Overview

    Citrix App Orchestration accelerates and automates the delivery of Desktops-as-a-Service (DaaS). It is built on proven Citrix best practices; App Orchestration helps service providers design and implement a secure, multi-tenant, multi-domain and multi-location based environment.

    Provided By Citrix Systems

  • Webcasts // Apr 2015

    Overview of the Citrix Client Virtualization Solution

    In this webcast, the presenter explains about how the Citrix client virtualization solution and Intel Core processors that helps the organization to manage and secure Windows and Mac devices. The client virtualization solution includes both XenClient and DesktopPlayer.

    Provided By Citrix Systems

  • Webcasts // Apr 2015

    Extend the Benefits of VMware Horizon 6 with Liquidware Labs

    VMware Horizon 6 provides more options than ever to deliver workspaces to the users tailored to their needs and requirements. In this webcast, the presenter will explain about the benefits of VMware Horizon 6. The presenter will also cover how the user can use their solutions and established methodology of...

    Provided By DABCC

  • Webcasts // Apr 2015

    Google Hangout: HP and Intel - The Midsized Challenge - IT Strategies for Today's Medium Sized Businesses

    Do today’s IT solutions only focus on large enterprises and ignore small and midsize businesses? Small businesses often rely on personal productivity solutions and off-the shelf accounting software. Large businesses have teams of IT staff focused on apps, infrastructure and security. Unfortunately, many midsized businesses have outgrown their original technology...

    Provided By Hewlett-Packard & Intel®

  • Webcasts // Apr 2015

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Apr 2015

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Provided By CommVault Systems

  • Webcasts // Apr 2015

    XenDesktop Cloud Provisioning with CloudPlatform

    In this webcast, the presenter will explain about the Cloud Provisioning with CloudPlatform and integrated desktop cloud solution to streamline management, improve scalability and increase operational efficiency for the user XenDesktop or XenApp environments.

    Provided By Citrix Systems

  • Webcasts // Apr 2015

    The Collaboration System that Brings Teams Together

    Sharing knowledge, developing ideas, making better decisions – these move agencies and teams in the right direction. With Christie Brio, you can simultaneously contribute rich multimedia content from multiple wireless sources and engage easily with colleagues – in the same room or around the world, in real-time. Learn about Christie...

    Provided By AVI-SPL

  • Webcasts // Apr 2015

    Citrix - The Complete Solution for Service Providers in the Cloud Desktop Market

    Citrix offers the complete solution for service providers in the cloud desktop market. The user will learn why the Citrix believes \"DaaS\" is really about packaging a portfolio of end-user hosted services. Understand the experience of more than 2,600 Citrix Service Provider partners, from major telcos to small firms, who...

    Provided By DABCC

  • Webcasts // Apr 2015

    Citrix DaaS - A High-Growth Hosted Business Opportunity for Service Providers

    Citrix Service Provider (CSP) partners have four unique opportunities to create a high-value, high-growth DaaS business. The four unique opportunities are: the opportunity to develop a profitable hosted business with complete technical, business and marketing resources, the opportunity to differentiate and focus with vertical advice and specialized offerings, opportunities beyond...

    Provided By Citrix Systems

  • Webcasts // Apr 2015

    VMware & Google: Windows Desktops & Apps as a Cloud Service on Chromebooks

    Google and VMware are working together to modernize corporate desktops for the mobile cloud era by providing businesses with secure, cloud access to Windows applications, data and desktops on Google Chromebooks.

    Provided By DABCC

  • Webcasts // Apr 2015

    Answering the Tough Question: Who Has Access to What?

    Learn from this webcast how to select specific users or groups in Active Directory (AD) and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.

    Provided By Dell Software

  • Webcasts // Apr 2015

    How to Secure Your Web Properties & Apps

    Cyber threats come at businesses from all directions. Whether it's through BYOD arrangements or the actions of hackers, companies face unprecedented risks in safeguarding data and managing compliance. Organizations must be equipped to deal with current and emerging cyber threats. This means securing the user's mission-critical web properties and applications,...

    Provided By DABCC

  • Webcasts // Apr 2015

    A Syscall to ARMs

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    All Your Baseband Are Belong to Us

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Page Fault Liberation Army or Gained in Translation

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    An Introduction to Firmware Analysis

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    General Notes About Exploiting Windows X64

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Page Fault Liberation Army

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    The Exploration and Exploitation Of an SD Memory Card

    In this webcast, the presenter demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card. All \"Managed flash\" devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hardware Hacking with Microcontrollers: A Panel Discussion

    Microcontrollers and embedded systems come in many shapes, sizes and flavors. From tiny 6-pin devices with only a few bytes of RAM (ala the DEF CON 14 Badge) to 32- bit, eight core multiprocessor systems (ala DEF CON 20 Badge) each has their own strengths and weaknesses.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Citrix XenDesktop: Concepts

    In this webcast, the presenter explains about the concepts inside the new Citrix XenDesktop architecture. The presenter also explains couple of important infrastructure concepts they are : machine catalog and delivery group.

    Provided By DABCC

  • Webcasts // Apr 2015

    The On Demand Workforce: Accelerating Performance with Tablet Solutions

    We live in an "on demand" world where customers have instant access to critical information on every product and service they consider purchasing. This ubiquitous "awareness" creates a highly educated market that expects quality, simplicity and convenience at all times. To effectively meet the needs of this highly dynamic...

    Provided By Dell & Microsoft

  • Webcasts // Apr 2015

    Ensuring Application Readiness Processes for Mobile Application Management

    In this webcast, the presenter discusses the rapid increase in mobile applications within the enterprise. The presenter also discusses some of the mobile application management challenges and explains how mature best practices in desktop application readiness should be leveraged to create similarly robust processes for managing mobile applications.

    Provided By DABCC

  • Webcasts // Apr 2015

    How to Evaluate Total Cost of Ownership for IP Telephony Deployments

    In this Webinar, we will evaluate key UC deployment models for SMBs – On-Premise, Cloud and Hybrid solutions. Each model will be evaluated for pros and cons, and ideal deployment scenarios will be outlined. Companies can achieve significant savings when selecting an IP Telephony and Unified Communications solution by...

    Provided By ShoreTel

  • Webcasts // Apr 2015

    Remoting Android Applications for Fun and Profit

    Fino is a brand new tool the presenters designed to perform dynamic android applications analysis in a pythonic and scriptable way. They ended up with a very powerful tool, allowing any reverse-engineer to remotely control any android application, from its main component (user interface) to every internal and obscure class.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    What?s New with Dell DVS Enterprise

    In this webcast, the presenter explains about the Desktop Virtualization Solutions (DVS). DVS is a reliable, pre-configured enterprise-class solution that delivers Virtual Desktop Infrastructure (VDI) and application streaming solutions with Citrix XenDesktop.

    Provided By Citrix Systems