Webcasts

TechRepublic's Resource Library offers the web's largest collection of free vendor-supplied webcasts, webinars and audiocasts from leading IT vendors. Explore an array of technology and business topics, such as cloud computing, Big Data, enterprise software, security and collaboration.

  • The Anatomy of a Workstation

    Webcasts · Jun 2018 · Provided By Intel & Lenovo

    What's inside that workstation? Here we break down the specification piece by piece and share how to find out the right solution to fix your organizations needs. Get to know more and figure out what works best for the 3D modeling workflow. Including the newest powerful processors, how much...

    Register Now
  • Happy, Secure, and Reliable

    Webcasts · Nov 2017 · Provided By Dell & Intel®

    How to empower your workforce and IT. Access this short webcast to hear how new workforce trends have created a paradox between employees desire for greater flexibility and IT's need to control cost and data. Luckily, with a reliable partner like Dell, you can take advantage of our entire Lifecycle...

    Watch Now
  • On the Go--Mobilizing the Government Workforce (webcast)

    Webcasts · Aug 2017 · Provided By Dell & Intel®

    As smartphones, tablets and other connected devices continue to dominate the daily lives of citizens, government agencies across the country are struggling how to bring their workforce to the same level of connectivity. While some agencies chart courses forward, some end up lagging behind because of security, privacy and productivity...

    Watch Now
  • Adventures in Mobile Telephone Security

    Webcasts · May 2015 · Provided By SecurityTube.net

    In this webcast, the presenter will explain about the risks are described and will demonstrate just how far a motivated amateur can legally go with some basic equipment, a little imagination and some directed effort. This includes running the users own base station, fuzzing the handset's baseband processor, capturing traffic...

    Watch Now
  • Hardware Level Attacks

    Webcasts · Apr 2015 · Provided By SecurityTube.net

    A running computer program is not a mathematical abstraction, but a physical process taking place somewhere in the real world. This makes all programs and the devices they run on vulnerable to a variety of physical attacks that are often overlooked or dismissed as impractical.

    Watch Now
  • The Inception Framework: An APT Campaign in the Cloud, Mobile, and Embedded Systems

    Webcasts · Apr 2015 · Provided By SecurityTube.net

    Many of the indicators falsified by these attackers have been used as trusted information when attributing other know threats which should call into question the legitimacy of such claims. This webcast will walk through the discovery and processes they used to peel back the layers behind this sophisticated framework.

    Watch Now
  • Bad USB Weaponized

    Webcasts · Apr 2015 · Provided By SecurityTube.net

    Explore the world of bad USB. How to build, deploy, and optimize the bad USB platform? Command and control structure. Hijinks with bad USB will include results achieved during deployment, systems owned, shells acquired, data acquired and coupling with social engineering and security awareness and training.

    Watch Now
  • My 4G WiFi Modem Sucks

    Webcasts · Apr 2015 · Provided By SecurityTube.net

    In this webcast, the presenter will essentially cover the techniques and tools used to find and exploit a number of vulnerabilities on the Telstra ZTE MF91 4G WiFi modem. Exploits include authentication bypass, recovery of credentials, and modification of core functionality, unexpected (and insecure) device behavior and unauthenticated factory reset.

    Watch Now
  • Breaking Mobile Social Networks for Automated User Location Tracking

    Webcasts · Apr 2015 · Provided By SecurityTube.net

    Location-Based Social Networks (LBSNs) feature location-based friend discovery services attracting hundreds of millions of active users world-wide. While leading LBSN providers claim the well-protection of their users' location privacy, in this webcast, the presenter will show for the first time through real world attacks that these claims do not hold...

    Watch Now
  • Network Attached Shell: N.A.S.ty Systems That Store Network Accessible Shells

    Webcasts · Apr 2015 · Provided By SecurityTube.net

    In this webcast, the presenter focus on "How to", and the implications of compromising network based storage systems, but will conclude that the absence of security in not only storage hardware, but networking hardware in general, has left data unprotected and millions of networks vulnerable to exploitation.

    Watch Now