Cryptography

MIME Object Security Services

MIME Object Security Services (MOSS) is a protocol that uses the multipart/signed and multipart/encrypted framework to apply digital signature and encryption services to MIME objects. (Wikipedia).

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

How To Protect Your Online Privacy With A Threat Model | Tutorial 2022

Privacy tutorial with a threat model methodology. This will help you achieve strong privacy consistently and reliably. Support independent research: https://www.patreon.com/thehatedone Privacy tools are inconsistent. The inventory of recommended countermeasures changes all the time. On t

From playlist Security by compartmentalization - learn to protect your privacy effectively

Video thumbnail

What Is Intrusion Detection System? | Intrusion Detection System (IDS) | Cyber Security |Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=WhatIsIntrusionDetectionSystem&utm_medium=Descriptionff&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecu

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

What do we mean by device security? Why should we care about this?

Keep your smart devices safe! Learn what device security is, and how it protects your phones, tablets, and computers from being accessed and exploited by cybercriminals.

From playlist Internet Safety

Video thumbnail

Infrastructure as Code - Crash Course

What is Infrastructure as Code? Learn in this course and get hands-on practice by implementing three IaC projects. ✏️ Beau Carnes developed this course. ⭐️ Resources ⭐️ 💻 Access code used in the video here: https://github.com/beaucarnes/iac-course 🔗 Installing Pulumi: https://www.pulumi.

From playlist DevOps Courses

Video thumbnail

Application Security Tutorial | Application Security Basics | Cyber Security Tutorial | Simplilearn

In this application tutorial, we will cover application security basics in this cyber security tutorial. We will cover the basic definitions of application security, along with the different types and categories of application security. Next we cover the common application security vulnera

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Authentication, Authorization, Accounting (AAA) - Part 2

Fundamental concepts of authentication protocols are discussed. Radius server is presented. Extensible Authentication protocol is explained.

From playlist Network Security

Video thumbnail

IP Security: Part 1

Fundamental concepts of IPSec are discussed. Authentication Header is explained. ESP & IKE are analyzed.

From playlist Network Security

Video thumbnail

Network Programming with Python Course (build a port scanner, mailing client, chat room, DDOS)

Learn network programming in Python by building four projects. You will learn to build a mailing client, a DDOS script, a port scanner, and a TCP Chat Room. 🎥 This course was developed by Neural Nine. Check out their YouTube channel: https://www.youtube.com/c/NeuralNine ⭐️ Course Content

From playlist Python Tutorials

Video thumbnail

25c3: Attacking NFC mobile phones

Speaker: Collin Mulliner First look at the security of NFC mobile phones Near Field Communication (NFC) based services and mobile phones are starting to appear in the field, therefore it is time to take a look at the security of the services and especially the NFC mobile phones themselve

From playlist 25C3: Nothing to hide

Video thumbnail

Cloud Programming

For the latest information, please visit: http://www.wolfram.com Speaker: Joel Klein Wolfram developers and colleagues discussed the latest in innovative technologies for cloud computing, interactive deployment, mobile devices, and more.

From playlist Wolfram Technology Conference 2015

Video thumbnail

DeepSec 2009: Breaking TOR Sessions with HTML5

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Marco Bonetti Marco Bonetti explains how to break (i.e. "de-anonymise") TOR sessions with HTML5 features. For more information visit: http://bit.ly/DeepSec_2009_informat

From playlist DeepSec 2009

Video thumbnail

Black Hat DC 2010: Internet Explorer turns your personal computer into a public file server 3/7

Clip 3/7 Speakers: Jorge Luis, Alvarez Medina In this presentation we will show how an attacker can read every file of your file system if you are using Internet Explorer. This attack leverages different design features of Internet Explorer entailing security risks that, while low if c

From playlist Black Hat DC 2010

Video thumbnail

IMT3673 - Mobile Programming (Networking) - Part 2

NFC-based communication in Android & Wifi

From playlist Archive - Mobile Development

Video thumbnail

Burlington Ruby Conf 2013 Building Ambitious APIs with Ruby by Dan Gebhardt

With the advent of native and single page web apps, APIs are more important than ever. An application's API often must serve the needs of its own front end(s) as well as any third party applications and scripts that integrate with it. It should be flexible, yet follow strong conventions to

From playlist Burlington Ruby Conf 2013

Video thumbnail

Black Hat DC 2010: Internet Explorer turns your personal computer into a public file server 1/7

Clip 1/7 Speakers: Jorge Luis, Alvarez Medina In this presentation we will show how an attacker can read every file of your file system if you are using Internet Explorer. This attack leverages different design features of Internet Explorer entailing security risks that, while low if c

From playlist Black Hat DC 2010

Video thumbnail

Vaibhav Bhandari & Ali Emami (MicroSoft Health Solutions Group), interviewed at OSCON 2011

Vaibhav Bhandari Program Manager, Microsoft, Health Solutions Group Vaibhav Bhandari is a seasoned software professional with over six years of experience in technical and managerial positions. He has gathered broad experience in Software Development through three product cycles in var

From playlist OSCON 2011

Video thumbnail

Authentication, Authorization, Accounting, (AAA) - Part 1

Fundamental concepts of authentication protocols are discussed. Radius server is presented. Extensible Authentication protocol is explained.

From playlist Network Security

Related pages

Pretty Good Privacy | Encryption | Cryptography | Digital signature