Operating systems

Upgrading, migrating or maintaining your Mac, Windows, open source or Android OS is vital for functional IT software systems.

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Extreme Privilege Escalation on Windows 8UEFI Systems

    The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined \"Runtime services\" interface between the operating system and the firmware. This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    The Beast Is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques

    Return-Oriented Programming (ROP) is a powerful exploitation technique used in nearly every exploit today. It maliciously combines short code snippets (gadgets) residing in shared libraries and the executable to bypass Data Execution Prevention (DEP). As a consequence, several new Control-Flow Integrity (CFI) mechanisms and tools have been recently proposed to...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Write Once, Pwn Anywhere

    Modern Windows use mitigation techniques such as DEP and ASLR to mitigate exploitation. The combination of ASLR and DEP has been proven to be a solid shield in most cases. Mitigation bypass is always one of the hottest topics in the security community.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    GRR Find All the Badness, Collect All the Things

    In this webcast, the presenter will introduce GRR capabilities with some use cases and discuss the difficulties of running the tool across different environments. The presenter will explain and demonstrate GRR artifact collection as well as talk about some of the aspects that make artifacts powerful but challenging to implement.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 1

    Microsoft started the first of their new bug-bounty programs, focusing on finding vulnerabilities in IE11 on the upcoming Windows 8.1 OS. Rather than spending time fuzzing for RCEs, the presenter focused on pure logic bugs and the best place to find them was in the sandbox implementation.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exposing Bootkits with BIOS Emulation

    The security features added in modern 64-bit versions of Windows raise the bar for kernel mode rootkits. Loading unsigned drivers, which is what most rootkits will attempt to do, is denied by driver signature enforcement. PatchGuard protects the integrity of the running kernel, preventing them from modifying critical structures and...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Android FakeID Vulnerability Walkthrough

    In this webcast, the presenter will present new Android vulnerability with widespread impact: a flaw in Android application handling, allowing malicious applications to escape the normal application sandbox and get special security privileges without any user notification.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Watch ObserveIT webinar on monitoring privileged users now!

    In this recorded webinar, learn how AIG Israel utilizes User Activity Monitoring to monitor privileged users with access to sensitive servers as well as meet compliance requirements. This webinar will also show you how to meet PCI compliance requirements, monitor third party virtual desktops and more!

    Provided By ObserveIT

  • Webcasts // Oct 2014

    Attacking Microsoft Kerberos: Kicking the Guard Dog of Hades

    In this webcast, the presenter explains about the Kerberos-besides having three heads and guarding the gates of hell-protects services on Microsoft Windows domains. Its use is increasing due to the growing number of attacks targeting NTLM authentication. Attacking Kerberos to access Windows resources represents the next generation of attacks on...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Android Geolocation Using GSM Network

    In this webcast, the presenter will introduce a new forensic technique that allows collecting users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Desktop on the Linux... (and BSD, of Course)

    In this webcast, the presenter will discuss about the graphics subsystem (X11) is network transparent and provides IPC. So let's build the users own IPC system, that's not network transparent (DBus). The presenter also explains look at some of the pearls of strange API design.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Windows Phone 8 Application Security

    In this webcast, the presenter will focus on Windows Phone 8 and applications security. Microsoft is expanding its presence on Smartphone OS market. Windows Phone 8 is a new mobile platform and there is not so much information about security issues out there.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Data-Only Pwning Microsoft Windows Kernel: Exploitation of Kernel Pool Overflows on Microsoft Windows 8.1

    Each new version of Windows OS Microsoft enhances security by adding security mitigation mechanisms - kernel land vulnerabilities are getting more and more valuable these days. For example, the easy way to escape from a sandbox is by using kernel vulnerability. That's why Microsoft struggles to enhance security of Windows...

    Provided By SecurityTube.net

  • Webcasts // Apr 2014

    Customers on CommVault - LWG Consulting Deployment

    Paul Slager from LWG will discuss how he is achieving the following amazing results by leveraging the singular Simpana software solution from CommVault to deliver deeply integrated application-aware backup, archive and replication that spans physical and virtual environments: Reduce backup times by over 400%, recover VMs in under 10 minutes,...

    Provided By CommVault Systems

  • Webcasts // Jan 2014

    Vaccinating Android

    Number of mobile applications is rising and Android still holds large market share. In this webcast, the presenter discusses about some runtime techniques and a tool will be released that offers two approaches to analyze Android applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    What's New in REMnux V4 for Malware Analysis?

    REMnux is a lightweight Linux distribution for assisting malware analysts with reverse-engineering malicious software. Release v4 of this popular distro came out in April 2013. It incorporates several new tools useful for analyzing malware in this Ubuntu-based environment.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Keynote - Copper Droid on the Reconstruction of Android Malware

    In this webcast, the presenter presents the CopperDroid, an automatic VMI-based dynamic analysis system to reconstruct the behavior of Android malware. Based on the key observation that all interesting behaviors are eventually expressed through system calls, CopperDroid presents a novel unified analysis able to capture both low-level OS-specific and high-level...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Metro Down the Tube. Security Testing Windows Store Apps

    In this webcast, the presenter will cover \"Metro\", \"Modern\" or (more correctly) \"Windows Store\" apps and how to perform security reviews on them. Like it or not, this is the direction Microsoft are going in, and it seems likely that this style of centrally controlled, sandboxed application is the future...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Exploiting Symbian

    SymbianOS is one of the major smart phone operating system and has been around for many years still exploitation has not been researched yet. The lack of proper exploitation techniques is mostly due to the fact that until the recent introduction of PIPS/OpenC (a POSIX API port) SymbianOS did not...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Full-Disk-Encryption Crash-Course

    Full-Disk-Encryption (FDE) is an important aspect of data security and everyone should use an appropriate solution to protect their (especially mobile) systems and data. In this webcast, the presenter covers the technology behind Full-Disk-Encryption (FDE) software products.

    Provided By SecurityTube.net

  • Webcasts // Oct 2013

    3 Steps to Automating Windows Migrations and Application Compatibility

    The most compelling IT task facing many organizations today is the need to migrate from Windows XP. This doesn’t need to be a complex and time consuming task – automation tools and best practices can dramatically simplify system deployments. Register today for this informative live event, where you’ll learn...

    Provided By Dell Kace

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Provided By Dell & Microsoft

  • Webcasts // Sep 2013

    Windows Upgrade: Key Processes And Resources Revealed

    Despite the end of Windows XP support, many organizations still heavily rely on Windows XP with legacy applications, though a timely change is a very good thing! View this webinar by Dell and discover how you can: Accelerate your migration to modern Windows Automate the migration...

    Provided By Dell & Microsoft

  • Webcasts // Jun 2013

    Analysis of a Windows Kernel Vulnerability

    In this webcast, the presenter explains the technical details of this exploit. It is not about \"Duqu\" nor Russian exploit kits. The vulnerability itself only allows the attacker to perform an \"OR\" operation on a value of their choice, at a memory location of their choice.

    Provided By SecurityTube.net

  • Webcasts // Sep 2012

    Let's Go Further: Build Concurrent Software Using the Go Programming Language

    In this webcast, the presenter will explain about building concurrent software using the Go programming language. Go is an open source programming environment that makes it easy to build simple, reliable, and efficient software. One of Go's key design goals is code adaptability; that it should be easy to take...

    Provided By Oleksiy Kovyrin

  • Webcasts // Sep 2012

    C 2012: Lightning Talk #8 - Astyanax Hector's Smart-Ass Son

    In this webcast, the presenter explains about publisher subscriber use cases with the problems faced while writing high transfer latency and must resent entire object on failure and on the reading side they faced heap pressure and hot spots. The presenter explains the solution by providing Astyanax Netflix open sourced...

    Provided By Oleksiy Kovyrin

  • Webcasts // Sep 2012

    C 2012: Lightning Talk #3 - How to Scale MongoDB

    In this webcast, the presenter will explains about MongoDB which is a scalable, high-performance, open source NoSQL database. The presenter explains about how to scale MongoDB along with Cassandra.

    Provided By Oleksiy Kovyrin

  • Webcasts // Sep 2012

    C 2012: Lightning Talk #1 - From Data to Insights

    In this webcast, the presenters will explains BIRT the most capable open source data visualization and reporting technology. The presenter also explains about Cassandra another cool data source that can work and connect virtually to any data source.

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    Google I/O 2012 - Getting Direct Feedback From Your YouTube Community

    Do the user want to hear from (and see!) their site's community? In this webcast, the presenter will be sharing a new way to solicit videos from their users. Come and learn about how it was developed and see an example of it put to use as part of the...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    New Developments in Link Emulation and Packet Scheduling in FreeBSD, Linux, and Windows

    In this webcast, the presenters will give an overview of some recent activity done at the Universita di Pisa on link emulation and packet scheduling. They will cover two main topics: dummynet and fast packet scheduling algorithms.

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2012

    Mastering Active Directory Migrations: Controlling Critical Issues

    Learn how the right combination of tools and processes can help to protect your core network operating system during the critical process of Active Directory migration.

    Provided By Dell Software

  • Webcasts // Jun 2012

    Bring-Your-Own-Device Solutions Overview

    In this webcast, the presenter explains about how Citrix Bring-Your-Own-Device (BYOD) solutions enable IT to embrace consumerization, empower employees and simplify IT. Find out how Citrix BYOD solutions free people to access their desktops, applications and files from their own personal laptops, tablets and Smartphone's, while IT is able to...

    Provided By Citrix Systems

  • Webcasts // Jan 2012

    How Citrix AppDNA Software Accelerates and Automates Application Migrations

    Automate application testing, application remediation and application preparation with the Citrix AppDNA application management platform. In this webcast, the presenter explains how AppDNA software works and why it is an essential asset for Windows 7 and Internet Explorer 8/9 deployments, application virtualization projects, desktop virtualization initiatives and Windows Server 2008...

    Provided By Citrix Systems

  • Webcasts // Jan 2012

    IT Consumerization - An Overview

    In this webcast, the presenter going to give an overview about IT Consumerization. Consumerization, the migration of consumer technology into the enterprise, is one of the most important and controversial issues facing CIOs today.

    Provided By Dell

  • Webcasts // Jan 2012

    Storage Foundation and High Availability for Linux

    In this webcast, the presenter explains about how standardization and a single, powerful set of tools that span operating systems and storage infrastructures can provide a foundation for standardized backup, disaster recovery and other data management and protection services.

    Provided By Symantec

  • Webcasts // Jan 2012

    What Makes OpenVOS Open?

    In this webcast, the presenter discusses about the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the worlds most reliable operating system. VOS is now OPEN.

    Provided By Stratus Technologies

  • Webcasts // Nov 2011

    Multnomah County: Moving on From "Old & Clunky"

    In this webcast, the presenter discusses why he's excited to move from the county's "Old and clunky" intranet and onto an open-source platform, and how this change will help him do his job.

    Provided By UBM TechWeb

  • Webcasts // Nov 2011

    Tekzilla Daily Tip #562: Windows: Monitor Network Activity

    Do the users' miss XP and Vista's blinking network icon? In this webcast, the presenter will explain how to bring it back to Windows 7 with the help of the free tool called network activity indicator.

    Provided By Oleksiy Kovyrin