RE: Security, Hacking & Social Engineering Presentation.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 31 Oct 2005, STYMA, ROBERT E (ROBERT) wrote:

>
> >
> > The topics I'm going to cover, in no particular order, are:
> >
> >   - Sniffers
> >   - Viruses
> >   - Port Scanning
> >   - Fingerprinting
> >   - Unnecessary open ports
> >   - Bad software configuration (web servers, databases, mail
> > servers...)
> >   - SQL injections
> >   - Buffer Overflows
> >   - Use of google as a information gathering tool.
> >   - Firewalls
> >   - DOS attacks
> >   - Brute force attacks
> >   - Cryptography.
> >   - Cross site scripting
> >   - Man-in-the-middle
> >   - Intrusion Detection Systems
> >   - Honeypots
> >   - Identity Spoofing
> >   - Social Engineering
> >   - Gathering information from trash/rubbish
> >   - Physical security in buildings.  Access to the building, cable
> > sniffing, secure ID's...
> >   -  And more....  ;-)
> >
> With this list of topics,
> How many days long is this presentation going to be?

and why exactly is everyone on this list doing all your work for you?

rday


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux