Learn the countermeasures, defenses, and Firebox tricks that render bots “Dead On Arrival” for your network.
Botnets Part 2
Learn how a bot herder uses his bot army for attacks such as Distributed Denial of Service, getting command line control of victims, installing spyware, and more.
Password Cracking 201: Rainbow Tables
“Rainbow tables” enable malicious hackers to break the encryption protecting password files.