Data Centers

Is your data center converged, virtualized, cloud-enabled, and software-defined? Or full of legacy and high-TCO equipment? Find out how to build an infrastructure that keeps you ahead of the competition.

  • Modsecurity Apache Module Primer

    Webcasts // Jan 2014 // provided by SecurityTube.net

    In this webcast, the presenter explains about the basics of ModSecurity and how to use it effectively to secure web applications. ModSecurity is an Apache web server module that provides a web application firewall engine.

    Watch Now
  • Hardware Hacking with Microcontrollers: A Panel Discussion

    Webcasts // Jan 2014 // provided by SecurityTube.net

    Microcontrollers and embedded systems come in many shapes, sizes and flavors. From tiny 6-pin devices with only a few bytes of RAM (ala the DEF CON 14 Badge) to 32- bit, eight core multiprocessor systems (ala DEF CON 20 Badge) each has their own strengths and weaknesses.

    Watch Now
  • Introduction to Processor Design

    Webcasts // Jan 2014 // provided by SecurityTube.net

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Watch Now
  • Introduction to ARM

    Webcasts // Jan 2014 // provided by SecurityTube.net

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Watch Now
  • Page Fault Liberation Army

    Webcasts // Jan 2014 // provided by SecurityTube.net

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Watch Now
  • A Syscall to ARMs

    Webcasts // Jan 2014 // provided by SecurityTube.net

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Watch Now
  • All Your Baseband Are Belong to Us

    Webcasts // Jan 2014 // provided by SecurityTube.net

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Watch Now
  • Page Fault Liberation Army or Gained in Translation

    Webcasts // Jan 2014 // provided by SecurityTube.net

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Watch Now
  • An Introduction to Firmware Analysis

    Webcasts // Jan 2014 // provided by SecurityTube.net

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Watch Now
  • General Notes About Exploiting Windows X64

    Webcasts // Jan 2014 // provided by SecurityTube.net

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Watch Now