Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Practical Machine Learning for Network Security

    Machine learning is currently receiving a lot of attention in network security. There are many start-ups and existing companies that claim they use it in their solutions; yet, few details are shared on why or how it works. So, is machine learning a potential solution or all hype? The answer...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    SEWiFi: Building a Security Enhanced WiFi Dongle

    Securing a computer's network connection over WiFi has been a problem for years. Whether it's the user's mom, grandfather, colleagues or themselves, not everyone understands how to properly setup and use VPNs, personal firewalls and local IDS. Even if they do understand how setup and use network security tools, it...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NSA Playset: USB Tools

    USB implants were among the most talked about gadgets in the NSA ANT catalog after it leaked last year. Concealed in cables and connectors, these devices appear to be designed primarily to provide covert communication channels to malware operating on a host computer.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Deception for the Cyber Defender: To Err Is Human; to Deceive, Divine

    In this webcast, the presenter will discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend the user's assets. This webcast isn't about social engineering or honeypots, but instead carefully analyzes dozens of deception...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Betting Bios Bugs Won't Bite Y'er Butt?

    In this webcast, the presenter will give a quick run through the BIOS vulnerabilities & PoC malware that have been disclosed in the last couple years, and what the users can concrete steps they can take to start performing BIOS vulnerability checking, and integrity checking, to protect themselves or their...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    What Happens When a Security Architect Writes an Application

    An examination of a modern rails application reviewing application security best practices going through specific rails controls for the application, best practices in deploying and how to integrate application controls, local host and network firewall controls into a self monitoring, alerting and automated security system.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Protecting Your ICS/SCADA Networks

    The presenters' SCADA system has DNP3 vulnerability, now what? The presenter shortly summarizes the DNP3 vulnerabilities (and other ICS protocols too). Then the presenter focuses on the different mitigations that an ICS owner can do to mitigate these types of protocol implementation vulnerabilities even if there is no patch or...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Trolling Attackers for Fun and Profit: Intentionally Misleading Attackers

    It is pretty common to see even vendors discuss the idea in their documentation and sales pitches. Even though the idea has been widely accepted, defenders have only focused on two of the proposed courses of action - detect and deny. Few organizations are working to disrupt, degrade, or deceive...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    In URL:robots.txt-What Are You Hiding?

    In this webcast, the presenter will explain about the real world uses of the robots.txt file. The presenter will show what it is and normally used for. Then the presenter will show how the users can leverage this file in their reconnaissance steps of a target. They will also look...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Snort Beyond IDs: Open Source Application and File Control

    In this webcast, the presenter will explain the latest and greatest features in Snort - as well as some older features. The presenter will discuss the new Open AppID standard for open source next generation firewall work like application identification and blocking, and show how easy it is to write...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    OWASP Application Security Verification Standard

    The OWASP Application Security Verification Standard (ASVS) project provides a basis for testing web application technical security controls. Bill will take the users through the ins and outs of the four verification levels and the thirteen verification standard. When the users leave, they'll have a free, comprehensive test plan to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Hacking WPS with Reaver to Crack WPA WPA2 Passwords

    In this webcast, the presenter will teach the users how to get WPA and WPA2 password by exploiting the weakness in WPS. This is an easy verbal step by step guide to follow. Enjoy! If the users are using VMware, Virtual box, or any Virtual application they will need to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Too Many Cooks - Exploiting the Internet-of-TR-069-Things

    In this webcast, the presenter will begin by describing their previous efforts presented this summer (DEF CON 22 & more), where their group revealed critically vulnerable TR-069 server deployments and discussed the incomprehensible asymmetry between the trust instated in this protocol and the measures taken to protect it (or lack...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Necromancy - Reverse Engineering Dead Protocols

    Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this webcast, the presenters will go into the gruesome details of how they dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Manna From Heaven: Improving the State of Wireless Rogue AP Attacks

    The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and ability to capture credentials at a...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Attacking the Internet of Things (Using Time)

    Internet of Things (IoT) devices are often slow and resource constrained. This makes them the perfect target for network-based timing attacks, which allow an attacker to brute-force credentials one character at a time, rather than guessing the entire string at once. The presenter will discuss how timing attacks work, how...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abusing Software Defined Networks

    Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the network with the same degree of control and flexibility as the cloud. And with all the major vendors onboard, it will soon be supporting networks everywhere. But current implementations are full of weaknesses that could...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    You're Leaking Trade Secrets

    Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While the people hear a lot about personal privacy, little is said in regard to organizational privacy.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Bypass Firewalls and Application White Lists and Secure Remote Desktops Under 20 Seconds

    In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is, imagine a scenario, where the person have deployed a malware on a user's workstation, but the target information is on a secure server accessed via two-factor...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Combating Next-Generation Malware with Fast Forward-Secure Logging

    Security analytics is a catchall term for vulnerability assessment and intrusion detection leveraging security logs from a wide array of Security Analytics Sources (SASs), which include firewalls, VPNs, and endpoint instrumentation. Today, nearly all security analytics systems suffer from a lack of even basic data protections. An adversary can eavesdrop...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Run Away if You Can: Persistent Jamming Attacks Against Channel Hopping Wi-Fi Devices in Dense Networks

    Wireless Local Area Networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    On Emulation-Based Network Intrusion Detection Systems

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity. Emulation-based network intrusion detection systems are regarded as a...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Investigating Powershell Attacks

    Over the past two years, the presenters have seen targeted attackers increasingly make use of PowerShell to conduct command-and-control in compromised Windows environments. If the user's organization is running Windows 7 or Server 2008 R2, they've got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by default!).

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Detecting BGP Hijacks in 2014

    In this webcast, the presenter will raise awareness of routing security issues by providing a tutorial on the BGP routing protocol and on the detection of specific routing events called IP prefixes hijacks. They hope that the security community that attends NSC will find interest in network-related issues.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Security Analysis of a Full-Body Scanner

    Advanced imaging technologies are a new class of people screening systems used at airports and other sensitive environments to detect metallic as well as nonmetallic contraband. The presenter presents the first independent security evaluation of such a system, the Rapiscan secure 1000 full-body scanner, which was widely deployed at airport...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Google Apps Engine Security

    In this webcast, the presenter will not explain about theory or trolling on \"Is-cloud-good-or-wrong\", but will present real-world attacks, including arbitrary code execution to escape the Python sandbox in the Google datacenters and exploration of the GAE platform outside of the Python sandbox.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Probabilistic Spying on Encrypted Tunnels

    At the network layer, encrypted tunnels are typically seen as black boxes. Network traffic however, leaks side channel information that can often be analyzed to determine what the tunnel is being used for and the type of content being sent over it. Probabilistic algorithms will be explored that can analyze...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Wins Again Why TLS Keeps Failing to Protect HTTP

    SSL has been around for decades and yet it keeps happening: new attacks are being discovered against TLS at a steady rate. The past year has seen its share of rogue CA certificates and critical vulnerabilities in TLS libraries that the people have come to expect. In this webcast, the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Devil Does Not Exist-The Role of Deception in Cyber

    While it might be convenient to think of cyber-adversaries as ones and zeros, the reality is that systems are attacked and defended by human beings. As a result, it is important to understand the role deception plays in network operations.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    When the Lights Go Out Hacking Cisco Energywise

    Energy Management Protocols (EMPs) are used in a variety of devices and environments. Their purpose is always the same: controlling and measuring the energy consumption of connected devices. However, most EMPs are designed and implemented for embedded, non-IP environments, such as HDMI or home automation networks.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    APT Attribution and DNS Profiling

    Advanced Persistent Threat (APT) attacks are highly organized and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns. In order to maintain the Command and Control (C2) network redundant, APT attacks are generally embedded with multiple DNS names.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Sponsored By Alert Logic

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Sponsored By HP & Intel® Xeon® Processor

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Sponsored By Centrify

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // Nov 2014

    APT Attribution and DNS Profiling

    Advanced Persistent Threat (APT) attacks are highly organized and are launched for prolonged periods. APT attacks exhibit discernible attributes or patterns. In order to maintain the Command and Control (C2) network redundant, APT attacks are generally embedded with multiple DNS names.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Bitcoin Transaction Malleability Theory in Practice

    A mysterious vulnerability from 2011 almost made the Bitcoin network collapse. Silk Road, MTGox and potentially many more trading websites claim to be prone to \"Transaction malleability\". In this webinar, the presenter will shed some light and show in practice how to exploit this vulnerability.

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Aug 2011

    Rethinking the Corporate Network

    Today's corporate networks face unprecedented levels of stress as they try to handle new devices, applications, and technologies. New demands, such as smartphones, tablets, cloud-based services, and virtualization have dramatically changed the way corporate networks need to be designed to deliver a high-quality user experience. But these changes...

    Provided By Alcatel-Lucent Enterprise

  • Webcasts // Nov 2011

    Webcast: Ubuntu Cloud

    After years of development and fine tuning, the cloud vision of true computing elasticity is finally a reality. The question now is how organizations can best take advantage of the latest cloud technologies to optimize their IT, scale infrastructure and services in near-real time, and make the most of new...

    Provided By Canonical Ltd.

  • Webcasts // Mar 2011

    Public Sector Cloud - the Big Debate

    Webinar featuring John Suffolk, who as Government CIO, initiated the G-Cloud programme; David Wilde, CIO, Westminster City Council on bringing cloud innovation into local government;Andy Macleod, Head of Strategy and Policy at Cisco on role of the supplier - chaired by leading industry advisor, Dr Richard Sykes.

    Provided By Cisco Systems, Inc.

  • Webcasts // Jun 2013

    On-demand Webcast - HP Application Performance Monitoring (APM) for Mobile Applications and Services

    For many companies mobile applications are today a viable mean to generate customer revenue, loyalty and satisfaction. As the new business channel delivers business value, it means that companies should be able to proactively monitor, manage and improve the end user experience of these mobile application services. Join us to...

    Provided By HP US

  • Webcasts // Jun 2013

    DBI Frameworks Applied to Computer Security

    In this webcast, the presenter will show how Dynamic Binary Instrumentation (DBI) works, and what for it can be applied in computer security. As proof of concepts, it will be shown how DBI can be useful for detecting vulnerabilities (e.g., buffer overflow or taint analysis) in Windows executables.

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network

    In this webcast, the presenter will show how to create the dropper, implant bots, master controller, and launch new payloads on the victim box through the use of Splinter the RAT, an open-source red-team collaboration framework they developed and released to the community to show the ease at which RATs...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Code Insecurity or Code in Security

    In this webcast, the presenter explains about what constitutes insecure code and the associated attacks that stem from such code. The presenter also demonstrated to reinforce the applicable attacks ranging from injection to reversing. This way, the presenter not only teaches about \"What not to do?\" but also, \"Why this...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Secrets of DNS

    DNS is a weird and fantastic protocol that lets any system on even the most secure networks talk to an evil system without ever sending it a packet. Who wouldn't love that? Every pentester needs to know how to leverage the DNS infrastructure to find vulnerabilities-exploit vulnerabilities- and even set...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    The Wireless World of the Internet of Things

    In this webcast, the presenter explains about the Internet of Things (IoT), which brings all the hardware are home together. Most of these devices are controlled through wireless command and control network. But what kind of wireless? And what is the security is in place? The speaker covers the wireless...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    How to Secure and Sys Admin Windows Like a Boss

    In this webcast, the presenter looked at some of the specifics of how to secure a windows network from 6000 hostile users with domain creds. Those users are still there, still hostile and still hell bent on breaking their stuff. The presenter will recap the security measures they have in...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Mirage - Next Gen Honeyports

    In this webcast, the presenter explains about Honeyports. Honeyports are a great way for defenders to not only see what the attackers are doing, but to quickly, and automatically, deploy countermeasures. Does the people's business cringe when they talk about auto shun on the firewall? Mirage takes honeyports to the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Shameful Secrets of Proprietary Network Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting New Actionable Insights by Analyzing Web Application Firewall Triggers

    ModSecurity web application firewall was first released more than a decade ago, available as open source software that gives the ability to protect web applications. Over the years ModSecurity has matured significantly, and is the most widely deployed WAF, protecting millions of websites. In this webcast, the presenter will show...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Implications of Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security of MICA-Based Wireless Sensor Networks

    In this webcast, the presenter mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Shameful Secrets of Proprietary Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all. Binary TCP connections, unlike anything, impossible to be adapted by a well-known local proxy....

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Pentesting Layers 2 and 3

    Lower level network protocols have been around for decades and haven't changed much in that time. A number of tools to exploit weaknesses in those protocols have been released over the years, and those haven't changed much either. In this webcast, the presenter will focus on layer 2 and layer...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Modsecurity Apache Module Primer

    In this webcast, the presenter explains about the basics of ModSecurity and how to use it effectively to secure web applications. ModSecurity is an Apache web server module that provides a web application firewall engine.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Reverse Engineering Secure HTTP API's with an SSL Proxy

    In this webcast, the presenter will explain a common (but insecure) method of securing HTTP APIs with SSL. As the presenter will demonstrate, properly configured SSL will protect a protocol from eavesdropping (man-in-the-middle attack) but will not protect that protocol from the end user himself.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Practical Attack Against Virtual Desktop Infrastructure (VDI) Solutions

    The secure BYOD hype is growing and Virtual Desktop Infrastructure (VDI) is considered the alternative solution for secure containers. In a nutshell, VDI solutions provide a remote workstation offering so that no data is stored locally. The presenter decided to examine the architecture and see for themselves whether VDI delivers...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Catching Malware En Masse DNS and IP Style

    The Internet is constantly growing, providing a myriad of new services both legitimate and malicious. Criminals take advantage of the scalable, distributed, and rather easily accessible naming, hosting and routing infrastructures of the Internet. As a result, the battle against malware is raging on multiple fronts: the endpoint, the network...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to SecureShare

    A peer-to-peer, end-to-end encrypted social networking framework. End-to-end encryption and decentralized social interaction is always a hassle. The presenter goal is to give developers an easy to use framework that hides the complexity of decentralized message passing, a distributed social graph and naturally embedded encryption.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jul 2012

    On-demand Webcast: Protect and empower BYOD email

    Modern business is no longer tied to the desktop or the office. From Apple to BlackBerry, Android to Windows Phone, the rise of mobile devices has enabled people to access their business email, contacts and documents while on the go. But with the consumerization of IT and the Bring Your...

    Provided By Mimecast

  • Webcasts // Jan 2014

    Improving Security by Avoiding Traffic and Still Get What You Want in Data Transfers

    Critical infrastructure systems are frequently constructed with components never designed for use in today's networked environment. While security conscious enterprises have extensive security mechanisms, these do not immediately transfer to many of the users' critical infrastructure networks. In this webcast, the presenter examines how to use the computer science concept...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Demystiphying and Fingerprinting the 802.15.4/Zigbee PHY

    In this webcast, the presenter explains about the methods of producing such IEEE 802.15.4 frames with commodity digital radio chips widely used in building inexpensive 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they fingerprint; however, their methods don't require a...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Privacy in the Social Semantic Web

    However, many people have privacy concerns with such applications but the advantages and features often outweigh them. Instead of arguing against such services, the speaker proposes an alternative architecture based on the eXtensible Messaging and Presence Protocol (XMPP). Within a social network, members can link with each other in order...

    Provided By SecurityTube.net