See actual malicious code and understand how it works. Corey Nachreiner explains botnet architecture for beginners, then builds a bot client.
Rootkits Part Three
Topics chosen by user vote. Kernel mode rootkits; leading techniques and tools for detecting rootkits; how your Firebox helps stop rootkits from entering your network.
Bud Has Mail
Bud’s latest misadventure teaches him what can go wrong when he clicks on a malicious email. Even non-technical users can learn from Bud how to handle email more safely
How Password Crackers Work
This video demonstrates an automated tool that hackers use when decrypting password files.
Rootkits Part 2
Corey explains inline function hooking, what kinds of Windows functions are susceptible to hooking, and how rootkits use hooking for backdoor access to your network.
Botnets Part 2
Learn how a bot herder uses his bot army for attacks such as Distributed Denial of Service, getting command line control of victims, installing spyware, and more.
Internet Explorer VML Exploit Revealed
Network security analyst Corey Nachreiner, CISSP, demonstrates how a zero-day security vulnerability in Internet Explorer can be exploited.
What Is a Sidejacking Attack?
Corey Nachreiner, CISSP, demonstrates how someone sitting near you at a wireless hotspot can steal your credentials for any Web account you log into…
Password Cracking 201: Rainbow Tables
“Rainbow tables” enable malicious hackers to break the encryption protecting password files.
Fortune 200 Firm Achieves Global Email Protection
Eaton Corporation, a global company with more than 70000 employees needed a complete messaging security solution to handle more than 200 million incoming emails every month. Watch and see how WatchGuard XCS provided an easy to manage, reliable solution that exceeded their performance requirements and offered powerful reporting and management tools out of the box.