Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Sponsored By Dell Software

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // Jan 2015

    Too Many Cooks - Exploiting the Internet-of-TR-069-Things

    In this webcast, the presenter will begin by describing their previous efforts presented this summer (DEF CON 22 & more), where their group revealed critically vulnerable TR-069 server deployments and discussed the incomprehensible asymmetry between the trust instated in this protocol and the measures taken to protect it (or lack...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Necromancy - Reverse Engineering Dead Protocols

    Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this webcast, the presenters will go into the gruesome details of how they dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    You're Leaking Trade Secrets

    Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While the people hear a lot about personal privacy, little is said in regard to organizational privacy.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Attacking the Internet of Things (Using Time)

    Internet of Things (IoT) devices are often slow and resource constrained. This makes them the perfect target for network-based timing attacks, which allow an attacker to brute-force credentials one character at a time, rather than guessing the entire string at once. The presenter will discuss how timing attacks work, how...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abusing Software Defined Networks

    Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the network with the same degree of control and flexibility as the cloud. And with all the major vendors onboard, it will soon be supporting networks everywhere. But current implementations are full of weaknesses that could...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Bypass Firewalls and Application White Lists and Secure Remote Desktops Under 20 Seconds

    In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is, imagine a scenario, where the person have deployed a malware on a user's workstation, but the target information is on a secure server accessed via two-factor...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Investigating Powershell Attacks

    Over the past two years, the presenters have seen targeted attackers increasingly make use of PowerShell to conduct command-and-control in compromised Windows environments. If the user's organization is running Windows 7 or Server 2008 R2, they've got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by default!).

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Security Analysis of a Full-Body Scanner

    Advanced imaging technologies are a new class of people screening systems used at airports and other sensitive environments to detect metallic as well as nonmetallic contraband. The presenter presents the first independent security evaluation of such a system, the Rapiscan secure 1000 full-body scanner, which was widely deployed at airport...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Probabilistic Spying on Encrypted Tunnels

    At the network layer, encrypted tunnels are typically seen as black boxes. Network traffic however, leaks side channel information that can often be analyzed to determine what the tunnel is being used for and the type of content being sent over it. Probabilistic algorithms will be explored that can analyze...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Wins Again Why TLS Keeps Failing to Protect HTTP

    SSL has been around for decades and yet it keeps happening: new attacks are being discovered against TLS at a steady rate. The past year has seen its share of rogue CA certificates and critical vulnerabilities in TLS libraries that the people have come to expect. In this webcast, the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Devil Does Not Exist-The Role of Deception in Cyber

    While it might be convenient to think of cyber-adversaries as ones and zeros, the reality is that systems are attacked and defended by human beings. As a result, it is important to understand the role deception plays in network operations.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    When the Lights Go Out Hacking Cisco Energywise

    Energy Management Protocols (EMPs) are used in a variety of devices and environments. Their purpose is always the same: controlling and measuring the energy consumption of connected devices. However, most EMPs are designed and implemented for embedded, non-IP environments, such as HDMI or home automation networks.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Bitcoin Transaction Malleability Theory in Practice

    A mysterious vulnerability from 2011 almost made the Bitcoin network collapse. Silk Road, MTGox and potentially many more trading websites claim to be prone to \"Transaction malleability\". In this webinar, the presenter will shed some light and show in practice how to exploit this vulnerability.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    APT Attribution and DNS Profiling

    Advanced Persistent Threat (APT) attacks are highly organized and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns. In order to maintain the Command and Control (C2) network redundant, APT attacks are generally embedded with multiple DNS names.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Practical Attack Against Virtual Desktop Infrastructure (VDI) Solutions

    The secure BYOD hype is growing and Virtual Desktop Infrastructure (VDI) is considered the alternative solution for secure containers. In a nutshell, VDI solutions provide a remote workstation offering so that no data is stored locally. The presenter decided to examine the architecture and see for themselves whether VDI delivers...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Catching Malware En Masse DNS and IP Style

    The Internet is constantly growing, providing a myriad of new services both legitimate and malicious. Criminals take advantage of the scalable, distributed, and rather easily accessible naming, hosting and routing infrastructures of the Internet. As a result, the battle against malware is raging on multiple fronts: the endpoint, the network...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    It Just (Net)works the Truth About iOS 7's Multipeer Connectivity Framework

    With the release of iOS 7, Apple has quietly introduced a nifty feature called multipeer connectivity. Using a surprisingly small and simple set of APIs, developers can create applications that have the ability to discover and directly communicate with nearby iOS devices over Bluetooth or WiFi, without the need for...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Cellular Exploitation on a Global Scale the Rise and Fall of the Control Protocol

    In this webcast, the presenter will discuss and disclose how over-the-air code execution can be obtained on the major cellular platforms and networks (GSM/CDMA/LTE). Including but not limited to Android, iOS, Blackberry, and embedded M2M devices. The listener will come away from this webcast, armed with detailed insight into these...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    The Wireless World of the Internet of Things

    In this webcast, the presenter explains about the Internet of Things (IoT), which brings all the hardware are home together. Most of these devices are controlled through wireless command and control network. But what kind of wireless? And what is the security is in place? The speaker covers the wireless...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    How to Secure and Sys Admin Windows Like a Boss

    In this webcast, the presenter looked at some of the specifics of how to secure a windows network from 6000 hostile users with domain creds. Those users are still there, still hostile and still hell bent on breaking their stuff. The presenter will recap the security measures they have in...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Mirage - Next Gen Honeyports

    In this webcast, the presenter explains about Honeyports. Honeyports are a great way for defenders to not only see what the attackers are doing, but to quickly, and automatically, deploy countermeasures. Does the people's business cringe when they talk about auto shun on the firewall? Mirage takes honeyports to the...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Code Insecurity or Code in Security

    In this webcast, the presenter explains about what constitutes insecure code and the associated attacks that stem from such code. The presenter also demonstrated to reinforce the applicable attacks ranging from injection to reversing. This way, the presenter not only teaches about \"What not to do?\" but also, \"Why this...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secrets of DNS

    DNS is a weird and fantastic protocol that lets any system on even the most secure networks talk to an evil system without ever sending it a packet. Who wouldn't love that? Every pentester needs to know how to leverage the DNS infrastructure to find vulnerabilities-exploit vulnerabilities- and even set...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Stealing a Mobile Identity Using Wormholes

    Authentication in mobile networks is usually done using a secure element which is commonly a sim-card. It is a tamper resistant device that should prevent cloning of mobile identities by legitimate users as well as attackers. Mobile network operators as well as most users have an interest in preventing the...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Phone Phreaks: What We Can Learn From the First Network Hackers?

    Before Smartphone's and iPads, before the Internet or the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. In this webcast, the presenter will explain about some lessons identified (if not actually learned!) relevant to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring

    Sometimes, hiding the existence of a communication is as important as hiding the contents of that communication. While simple network tunneling such as Tor or a VPN can keep the contents of communications confidential, under active network monitoring or restrictive IDS such tunnels are red flags which can subject the...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    OAuth App Impersonation Attack: How to Leak a 100-Million-Node Social Graph in Just One Week? - A Reflection on OAuth and API Design in Online Social Networks

    Many Online Social Networks (OSNs) are using OAuth 2.0 to grant access to API endpoints now-a-days. Despite many thorough threat model analyses (e.g. RFC6819), only a few real world attacks have been discovered and demonstrated. To the presenter's knowledge, previously discovered loopholes are all based on the misuse of OAuth.

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Provided By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Provided By Druva Software

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva