Corey Nachreiner, CISSP, shows what happens when a Windows XP computer browses the kind of malicious Web site that takes over your PC the instant you visit.
Rootkits Part 1
Corey defines rootkits, then demonstrates a real rootkit found in the wild. See what investigative processes it hides from, how an attacker configures it, and more.
Botnet Source Code for Overachievers
For IT professionals who crave depth. This screen-capture video supplement to “Understanding Threats: Malware Analysis: Botnets, Part 1” examines bot source code line by line.
Internet Explorer VML Exploit Revealed
Network security analyst Corey Nachreiner, CISSP, demonstrates how a zero-day security vulnerability in Internet Explorer can be exploited.
Password Cracking 201: Rainbow Tables
“Rainbow tables” enable malicious hackers to break the encryption protecting password files.
How to Use Social Networks at Schools
Facebook , Twitter, email and other online social networks play a major part in the lives of today’s youth. Students as young as kindergarten have cell phones that can access the Internet and students expect to have access to this online world at all times. Technology, especially social network sites, can distract students from classroom activities; however they can also be used for educational purposes . Finding the right balance between acceptable use and what is unacceptable use in schools can be a difficult task for school administrators
Virtualizing Oracle test and Development with Gale Technologies and NetApp
NetApp and Gale Technologies – Virtualizing Oracle test and Development on VMware
NewScale Orchestration of Cisco NetApp VMware IVA Solutions
NewScale Orchestration of Cisco NetApp VMware IVA Solutions
Cisco netApp VMware IVA Management of Stateless Systems
Cisco netApp VMware IVA Management of Stateless Systems
Kemp Technologies LoadMaster Demo
Intelligent, high-performance yet affordable Application Delivery Controllers and Server Load Balancer appliances.