Тестовая запись
MyTags YouTube Download является одним из наиболее удобных сайтов в Интернете для загрузки YouTube видео, одного видео, а также целые коллекции каналы пользователей, все видео из личных плейлистов; Создать плейлист; Видео из категории Фильмы; Видео из категории Музыка; видео из YouTube диаграмм; Скачать видео в оригинальном качестве YouTube не конвертировать их в AVI, MP4, WMV; Многопотоковые загрузки; Скачать видео YouTube, которые требуют разрешения через Firefox, Internet Explorer и Google Chrome; Free YouTube Download не содержит вирусов и шпионских программ. Это абсолютно бесплатный веб-сайт.
DEFCON 19: Bosses love Excel, Hackers too. (w speaker) 38:04
DEFCON 19: Bosses love Excel, Hackers too. (w speaker)
Defcon 21 - All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio 1:33:03
Defcon 21 - All Your RFz Are Belong to Me - Hacking the Wireless World
DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars 31:28
DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars
DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker) 40:47
DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin
DEFCON 17: Search And Seizure Explained - They Took My Laptop! 49:41
DEFCON 17: Search And Seizure Explained - They Took My Laptop!
DEFCON 19: The Dark Side of Crime-fighting, Security, and Professional Intelligence 51:21
DEFCON 19: The Dark Side of Crime-fighting, Security, and Professional
Defcon 21 - The Secret Life of SIM Cards 42:36
Defcon 21 - The Secret Life of SIM Cards
DEFCON 20: Owning Bad Guys {And Mafia} With Javascript Botnets 39:36
DEFCON 20: Owning Bad Guys {And Mafia} With Javascript Botnets
DEFCON 19: The Art of Trolling (w speaker) 41:32
DEFCON 19: The Art of Trolling (w speaker)
DEFCON 17: Making Fun of Your Malware 42:26
DEFCON 17: Making Fun of Your Malware
DEFCON 20: Bypassing Endpoint Security for $20 or Less 43:54
DEFCON 20: Bypassing Endpoint Security for $20 or Less
DEFCON 17: Cracking 400,000 Passwords, or How to Explain to Your Roommate why Power Bill is a High 49:00
DEFCON 17: Cracking 400,000 Passwords, or How to Explain to Your Roomm
DEFCON 19: The History and the Evolution of Computer Viruses 49:45
DEFCON 19: The History and the Evolution of Computer Viruses
DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit 50:43
DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit
DEFCON 19: Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes 38:10
DEFCON 19: Safe to Armed in Seconds: A Study of Epic Fails of Popular
DEFCON 14: Secrets of the Hollywood Hacker! 57:58
DEFCON 14: Secrets of the Hollywood Hacker!
DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit ( w speaker) 50:43
DEFCON 19: Hacking MMORPGs for Fun and Mostly Profit ( w speaker)
DEFCON 19: Cipherspaces/Darknets: An Overview Of Attack Strategies (w speaker) 51:38
DEFCON 19: Cipherspaces/Darknets: An Overview Of Attack Strategies (w
Defcon 21 - Forensic Fails - Shift + Delete Won't Help You Here 47:10
Defcon 21 - Forensic Fails - Shift + Delete Won't Help You Here
DEFCON 14: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights 51:30
DEFCON 14: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights

Defcon 19: Paul Roberts, Aaron Barr, Joshua Corman and Jericho - "Whoever Fights Monsters..

You need to have the Flash Player installed and a browser with JavaScript support.

Скачать видео Defcon 19: Paul Roberts, Aaron Barr, Joshua Corman and Jericho - "Whoever Fights Monsters.. на мобильный



Описание Видео


This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net "Whoever fights monsters should see to it that in the process he does not become a monster." - Friedrich Nietzsche. Aaron Barr returns for the first time in what's sure to be a gritty and frank (and heated) panel. How can we conduct ourselves without losing ourselves? How far is too far - or not far enough? IT security has finally gotten the attention of the mainstream media, Pentagon generals and public policy authors in the Beltway, and is now in mortal danger of losing (the rest of) its soul. We've convinced the world that the threat is real - omnipresent and omnipotent. But recent events suggest that in their efforts to combat a faceless enemy, IT security firms and their employees risk becoming indistinguishable from the folks with the Black Hats. The Anonymous attacks and data spilled from both private- and public sector firms raise important questions that this panel will try to answer. among them: how to respond to chaotic actors like Anonymous and LulzSec, what the U.S. gains (and loses) by making "APTs" the new "Commies" and cyber the forefront of the next Cold War and APTs the new commies. Aaron, Josh and Jericho will debate whether we in the security community can fight our "monsters" without sacrificing the civil liberties and the freedoms we enjoy here at home. Paul Roberts , Editor, Threatpost.com - Paul is an editor at Threatpost.com, Kaspersky Lab's security news blog. Paul is a thought leader with a decade of experience as a technology reporter and analyst covering information technology security. Before joining Threatpost, Paul was a Senior Analyst in the Enterprise Security Practice at The 451 Group, an industry analyst firm. As a reporter and editor, he has worked for leading technology publications including InfoWorld, eWeek and The IDG News Service. Paul's writing has appeared in The Boston Globe, Salon.com and Fortune Small Business. He has been interviewed on issues relating to technology and security for publications ranging from The Wall Street Journal, to NPR's Marketplace to the Oprah Show. When he's not writing about security, Paul runs the occasional marathon and edits bloggingbelmont.com, a citizen powered blog in Belmont, Massachusetts, where he lives with his wife and three daughters. Facebook: facebook.com/pfroberts Twitter: @paulfroberts Aaron Barr has spent the last 20 years in the intelligence and federal space of the cyber security community in positions ranging from intelligence analyst, UNIX system administrator and technical director. With degrees in Field Biology and computer security, his path would have drastically changed in 1997 had the Navy accepted his request to extend his educational program towards a degree in Mycology. Alas the Navy had no open billets for mushroom experts. He separated from the Navy in 2001 and chartered a course in IT and IT security in the defense industry. An agitator/collaborator, not afraid to express an opinion, but open to adopt better ones, he is enthusiastic and passionate about technology and its positive and negative effects on society, including security. An analyst at heart and by trade, he is focused on security as an intelligence problem. Joshua Corman Research Director, Enterprise Security Practice, The 451 Group - Joshua Corman is the Research Director of the 451 Group's enterprise security practice. Corman has more than a decade of experience with security and networking software, most recently serving as Principal Security Strategist for IBM Internet Security Systems. Corman's research cuts across sectors to the core challenges of the industry, and drives evolutionary strategies toward emerging technologies and shifting economics. Corman is a candid and highly coveted speaker and has spoken at leading industry events such as RSA, Interop, ISACA, and SANS. His efforts to educate and challenge the industry recently lead NetworkWorld magazine to recognize him as a top Influencer of IT for 2009. Corman also serves on the Faculty

Defcon 19: Paul Roberts, Aaron Barr, Joshua Corman and Jericho - "Whoever Fights Monsters..

Видео теги