In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long. All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share modified works back to the community. We highly encourage people who already know these topic areas to take the provided material and pursue paid and...
Topics: Open Security Training, computer security
G4, also known as G4 TV, is an American television network, originally geared primarily toward young male adult viewers, originally based on the world of video games. The channel now has a focus on male-oriented programming, although video games are still represented by the channel. Launched on April 24, 2002, G4 is headquartered in Los Angeles, California, United States, and owned by G4 Media, which is owned by NBCUniversal/Comcast. On April 22, 2013, the network is scheduled to be re-branded...
3.7M
3.7M
Feb 26, 2005
02/05
by
Internet Archive
Hosted by Stewart Cheifet, Computer Chronicles was the world's most popular television program on personal technology during the height of the personal computer revolution. It was broadcast for twenty years from 1983 - 2002. The program was seen on more than 300 television stations in the United States and in over 100 countries worldwide, with translations into French, Spanish, Chinese, and Arabic. The series had a weekly television broadcast audience of over two million viewers. The series has...
Topic: Moving Images
A museum-quality collection.
Topic: Giant Bomb Archive
666,191
666K
Feb 19, 2007
02/07
by
Carl Malamud
This collection contains videos, texts, and other materials uploaded by Carl Malamud, formerly of the Internet Multicasting Service and now President of Public.Resource.Org.
Topic: Internet Governance
Tweakers.net (often abbreviated as T.net) is a Dutch website featuring news and information about hardware, software and the Internet. The website was founded in 1998 by Femme Taken, a computer enthusiast, under the name World of Tweaking as a student's hobby project to offer a Dutch alternative to hardware review sites like Tom's Hardware Guide. The verb "tweaking" in the title refers to the process of tweaking the hardware of a computer, as a form of optimisation. Thus, the site's...
Topic: tweakers
141,528
142K
Oct 20, 2020
10/20
by
Public Resource
Internet Society Livestreaming archive
Topic: Internet Society
X-Play (previously GameSpot TV and Extended Play) was a TV program about video games, known for its reviews and comedy skits. The program aired on G4 in the United States, G4 Canada in Canada, FUEL TV in Australia, Ego in Israel, GXT in Italy, MTV Россия in Russia and Solar Sports in the Philippines. On October 26, 2012, it was announced that the show (along with Attack of the Show) would cease production after 2012. The show in its final incarnation was hosted by Morgan Webb and Blair...
Welcome to the General Index The General Index consists of 3 tables derived from 107,233,728 journal articles. A table of n-grams, ranging from unigrams to 5-grams, is extracted using SpaCy. Each of the 355,279,820,087 rows of the n-gram table consists of an n-gram coupled with a journal article id. A second table is constructed using Yake and consists of 19,740,906,314 rows, each with a keywords and an article id. A third table associates an article id with metadata. The metadata, readme,...
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
Topics: Access to Knowledge, Text and Data Mining, Temples of Knowledge, General Index
Attack of the Show! (AOTS) was an American live television program shown weeknights on G4, G4 Canada and Fuel TV in Australia. At the end of its run, the program was hosted by Candace Bailey and Sara Underwood. Attack of the Show! reviewed new technological items, parodies, pop culture, and general daily news, and gives previews of video games, movies, and digital media. On October 26, 2012, G4 announced that the show would be canceled after 2012. on December 19th 2012 the final Live episode...
Lectures from the National Programme on Technology Enhanced Learning (NPTEL) - https://nptel.ac.in
Topics: video, lectures, india, nptel, mooc, course, education
PyVideo.org is an index of Python related media.
Topics: pyvideo, python
94,349
94K
movies
eye 94,349
favorite 47
comment 16
A profile on computer pioneer Gary Kildall and the important contributions he made to the PC industry including the true story on how IBM ended up using MS-DOS rather than CP/M. Kildall developed CP/M, the first personal computer operating system. He was also a co-host on the early Computer Chronicles series. Includes comments by Gordon Eubanks, Symantec; Tom Rolander, DRI; Tim Bajarin, Creative Strategies; Lee Lorenzen, DRI; Jacqui Morby, TA Associates; Alan Cooper, CP/M applications...
favoritefavoritefavoritefavoritefavorite ( 16 reviews )
Topics: Episode year: 2001, Episode year: 1995, Operating systems: CP/M, the first operating system,...
Computing sciences educational videos
Topics: computer science, computer information systems, information technology
175,314
175K
Jul 30, 2005
07/05
by
Jason Scott (TEXTFILES.COM)
The BBS Documentary Video Collection is a varied set of video items collected by Jason Scott, curator of TEXTFILES.COM. These are recordings about and from the era of the domination of ASCII and Dial-up Bulletin Board Systems (roughly the 1970s through the 1990s, with examples far before and after that). Over 250 hours of interviews were conducted for a project called "BBS: The Documentary" (website at bbsdocumentary.com ). The questions centered around the history of Dial-up BBSes...
454,255
454K
Jul 21, 2006
07/06
by
Christian Einfeldt
Welcome to the The Digital Tipping Point (DTP) collection. The DTP crew describes their project as a Point-of-View (POV) documentary film about the rapidly growing global shift to open source software, and the effects that massive wave of technological change will have on literacy, art, and culture around the world. The DTP crew says their project will be the first feature length documentary about free open source software to be built in an open source fashion out of video submitted to the...
1.8M
1.8M
Feb 26, 2005
02/05
by
Internet Archive
Net Cafe was the world's most widely distributed television series covering the Internet revolution during the height of the dot com boom. The series was broadcast throughout the United States and in more than one hundred other countries for six years, from 1996 through 2002. It was hosted by Stewart Cheifet, Jane Wither, and Andrew deVries. The weekly program went behind the scenes of the World Wide Web to meet the people and explore the culture of the new "wired" generation. The...
Topic: Moving Images
Tekzilla Daily Tip, formerly 'Tekzilla Daily', is a daily Videocast made by the cast and crew of Tekzilla, originally starring Patrick Norton and now starring Veronica Belmont with Norton occasionally filling in for Belmont. Episodes are generally 1 minute to 3 minutes long. Tips are usually broken down and include various categories; Windows, Mac OS, Firefox, iTunes and occasionally other.
Magician and scam artist Brian Brushwood teams with sidekick Justin Robert Young for a weekly irreverent fun fest featuring unusual guests, bizarre games, and strange and wonderful tales.
Click here to see available docket information and document downloads for this case. If you need the complete docket, you should consult PACER directly. AMERICAN SOCIETY FOR TESTING AND MATERIALS et al v. PUBLIC.RESOURCE.ORG, INC. Assigned to: Judge Tanya S. Chutkan Case: 1:14-cv-00857-TSC Cause: 17:501 Copyright Infringement Date Filed: 08/06/2013 Jury Demand: Defendant Nature of Suit: 820 Copyright Jurisdiction: Federal Question
31,590
32K
Sep 2, 2020
09/20
by
Makani Technologies LLC
Makani spent 13 years designing and building kites to harness energy from the wind with the goal of creating a new way to bring wind power to more people around the globe. Founded by kitesurfers in 2006, the team started testing their airborne wind power concept with soft kites and iterated through eight models of rigid kite, culminating in the M600 energy kite, a prototype utility-scale system. The videos and photos in this collection are intended for technical audiences actively involved in...
Topic: wind power, airborne wind energy, makani
11,810
12K
Mar 11, 2013
03/13
by
G4TV.com
movies
eye 11,810
favorite 4
comment 0
There are no greater fans than the fans of adult movies and we have gone all over the country to see what the fans will go through and what they expect when they finally get to meet these lovely ladies that they lust after on their computers.
Topic: G4TV.com videos
38,899
39K
movies
eye 38,899
favorite 2
comment 0
11,246
11K
May 6, 2020
05/20
by
WGBH
movies
eye 11,246
favorite 29
comment 0
Title: The KGB, the Computer and Me Summary: In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between ... Directed by: Robin Bates Production Company: WGBH Release Date: TV Movie 3 October 1990 In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent...
Topic: Documentary
1M
1.0M
movies
eye 1M
favorite 53
comment 1
Like most new communications technologies, sex drove the early days of the Internet. This program looks at the explosion of online sex sites. Featured guests include Danni Ashe, the cover girl for the online sex industry. Sites covered include nervelink.com, danni.com, one-and-only.com, salon.com, and askisadora.com. Hosts are Jane Wither, Andrew deVries, and Stewart Cheifet. Shot on location at the CyberSmith internet cafe in Palo Alto, California. Originally broadcast in 1998. Episode #220.
favoritefavorite ( 1 reviews )
Topics: sex, porn, erotica, danni ashe, 220
1,143
1.1K
Oct 25, 2012
10/12
by
TWiT
movies
eye 1,143
favorite 0
comment 0
An inside look at The Life and Times of Tim, some random chats, and more. Guest: Steve Dildarian of HBO's The Life & Times of Tim. links: http://www.hbo.com/the-life-and-times-of-tim/ http://chatroulette.com/ http://www.hbo.com/the-life-and-times-of-tim/characters/index.html
Topics: twit, nsfw, Brian Brushwood, Justin Robert Young, Steve Dildarian
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
10,102
10K
Aug 6, 2013
08/13
by
DEF CON Communications
movies
eye 10,102
favorite 8
comment 0
DEFCON is the world's largest hacking conference, held in Las Vegas, Nevada. In 2012 it was held for the 20th time. The conference has strict no-filming policies, but for DEFCON 20, a documentary crew was allowed full access to the event. The film follows the four days of the conference, the events and people (attendees and staff), and covers history and philosophy behind DEFCON's success and unique experience.
Topics: defcon, hackers, convention, documentary
6,886
6.9K
Jun 3, 2019
06/19
by
National Programme on Technology Enhanced Learning
movies
eye 6,886
favorite 1
comment 0
Lectures from the National Programme on Technology Enhanced Learning - Mechanical Engineering - Cryogenic Engineering
How to Run Kali as a Windows Subsystem for Linux Full Tutorial: http://bit.ly/KaliAsWSL Subscribe to Null Byte: https://goo.gl/J6wEnH Microsoft's Windows Subsystem for Linux (WSL) is a great way to utilize Kali on your Windows computer without the need for a virtual machine. However, it is slightly limited right to what you can do, since security restrictions prevent the use of raw sockets, so tools like Nmap won't work and you won't be able to set your Wi-Fi adapter into promiscuous mode (or...
Topics: Youtube, video, Science & Technology, hacking, wonderhowto, wonder how to, hack, hacker,...
More than 1,100 brilliant scientists and engineers push the boundaries of computing in multiple research areas and include contributions to Kinect for Xbox 360, work to develop an HIV vaccine, and advancing education techniques in rural communities.
133,303
133K
Jan 2, 2014
01/14
by
Revision 3
THE TOTALLY RAD SHOW. Hosted by Alex Albrecht, Dan Trachtenberg and Jeff Cannata. The Totally Rad Show is the summer blockbuster of geek news shows. Every week, hosts Alex Albrecht, Dan Trachtenberg, and Jeff Cannata rip into the world of movies, video games, tv, comics, and more and pull out what's rad.
10,050
10K
movies
eye 10,050
favorite 3
comment 1
The introduction of the Macintosh in the mid 1980's opened up a whole new world of desktop graphics capability. This program looks at several early graphics applications for the Mac including More II, Power Point 2.0, Persuasion 2.0, and Macromind Director. Originally broadcast in 1989. Copyright Stewart Cheifet Productions 1989.
favoritefavorite ( 1 reviews )
Topics: graphics, powerpoint, presenations
8,398
8.4K
movies
eye 8,398
favorite 1
comment 0
If a picture is worth a thousand words, then graphics should be an important tool for business. Thanks to more sophisticated computers and display technology, the use of corporate graphics work boomed in the late 1980's. This program looks at several new products for doing presentation graphics on a PC including Harvard Graphics 2.12, Draw Partner, Freelance Plus 3.01, Graph Plus 1.3, Storyboard Plus 2.0, GEM Presentation 1.1, AutoDesk Animator, and Xerox Presents. Originally broadcast in 1989.
Topics: graphics, presentations, business
Deth Veggie has been a close friend for over a decade, and his position in the Cult of the Dead Cow came around in the early years of knowing him. Founded in 1985, the group went from textfile-writing to world-wide media mavens to security pundits. Along the way, they found themselves in a great and unique position as "hacker celebrities". As the image grew somewhere out of control, I knew many of the members as friends, and saw both sides of the story. This interview has a unique...
favoritefavorite ( 1 reviews )
How to Phish for WiFi Passwords on Kali with Wifiphisher Full Tutorial: http://bit.ly/WiFiPhish Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While there are plenty of tools available to hackers to crack passwords, several of which we've covered, sometimes a less direct approach is best. Social engineering attacks can be very successful assuming your target is tech illiterate. On this episode of Cyber Weapons Lab, we'll show you Wifiphisher, a tool...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
SeaGL (the Seattle GNU/Linux conference ) is a free—as in freedom and tea—grassroots technical summit dedicated to spreading awareness and knowledge about free / libre / open source software, hardware, and culture. SeaGL strives to be welcoming, enjoyable, and informative for professional technologists, newcomers, enthusiasts, and all other users of free software, regardless of their background knowledge; providing a space to bridge these experiences and strengthen the free software...
Topics: Free Software, Software Freedom, Open Source, Open Source Software, FLOSS, FOSS, OSS, GNU/Linux,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
6,402
6.4K
movies
eye 6,402
favorite 5
comment 0
Hackers - Freedom Downtime - Kevin Mitnick Interview (2003).avi
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
As a former Department of Justice prosecutor, Katie Haun set up the first-ever “cryptocurrency task force” for the U.S. government. She also led the investigations into the Mt. Gox hack and the corrupt agents on the Silk Road task force -- the first cases of the U.S. government using the bitcoin blockchain to fight fraud, not just against criminals but against their own. Haun -- Coinbase board member, Stanford lecturer, and now general partner on a16z crypto -- shares that story in this...
Topics: Youtube, video, Science & Technology, crypto, Silk Road, payments, unbanked, hyperinflation
Kim Zetter, Journalist, Author, Speaker, Freelance journalist Gary Brown, Professor of Cyber Security, Marine Corps University Oren Falkowitz, CEO and Co-Founder, Area 1 Security Roy Katmor, Co-Founder and CEO, enSilo Samples of malware in the wild hint how digital weapons today may be more powerful and stealthy than Stuxnet. Cyberwar experts will explore the current state of the art and future of digital weaponry. https://www.rsaconference.com/events/us17 Source:...
Topics: Youtube, video, Science & Technology, Cyber Warfare, Zero Day Vulnerability, Hackers &...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
7,733
7.7K
movies
eye 7,733
favorite 3
comment 0
**Machine Learning** is about *using the right features, to build the right models, to achieve the right tasks* [[Flach, 2012]][0] However, to come up with a definition of what actually means **right** for the problem at the hand, it is required to analyse huge amounts of data, and to evaluate the performance of different algorithms on these data. However, deriving a working machine learning solution for a given problem is far from being a *waterfall* process. It is an iterative process where...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Greetings, and welcome to the Florilegium: A Special Index to Plant Science! A florilegium in ancient times was a chapbook, a commonplace book you carried with. When you read a manuscript, you would jot down quotes and observations. The name means "to gather flowers." You can learn more about the name of this collection from the Wikipedia. This collection consists of a scan of journal articles, looking for plant names from two lists. The first is a list of 1,828 names from the...
Topic: TDM Today
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...