Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

Znajdź zawartość

Wyświetlanie wyników dla tagów 'brksec' .



Więcej opcji wyszukiwania

  • Wyszukaj za pomocą tagów

    Wpisz tagi, oddzielając je przecinkami.
  • Wyszukaj przy użyciu nazwy użytkownika

Typ zawartości


Forum

  • DarkSiders
    • Regulamin
    • Dołącz do Ekipy forum jako
    • Ogłoszenia
    • Propozycje i pytania
    • Szukam
    • Help
    • Poradniki / Tutoriale
    • Wszystko o nas
  • Hydepark
    • Newsy
    • Niezwykłe zjawiska
    • Rozrywka
    • Rozmowy...
    • hakerskie nowinki
    • Hardware
    • Webmasters
    • Grafika
    • Telefony i Komunikacja
    • Sport
    • Kulinaria
    • Forum Lady
    • Ciekawe Strony
  • DSTeam no Limits (serwery bez limitów!)
    • FILMY
    • GRY
    • MUZYKA
    • PROGRAMY
    • Ebooki
  • Download
  • Archiwum

Szukaj wyników w...

Znajdź wyniki, które zawierają...


Data utworzenia

  • Od tej daty

    Do tej daty


Ostatnia aktualizacja

  • Od tej daty

    Do tej daty


Filtruj po ilości...

Dołączył

  • Od tej daty

    Do tej daty


Grupa podstawowa


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Gadu Gadu


Skąd


Interests


Interests


Polecający

Znaleziono 4 wyniki

  1. BRKSEC-2049 - Tracking Down the Cyber Criminals Revealing Malicious Infrastructures with OpenDNS Cisco Live 2016 English | Size: 710.91 MB Category: Cisco Cyber Criminals are increasingly exploiting the Internet services to build agile and resilient infrastructures, and consequently to protect themselves from being exposed and taken over. The Internet is an open system, the information to expose those infrastructures is available somewhere. The challenge is that fragments of data broken up and spread across the web are not immediately visible. Connecting the dots, being able to analyze a diverse set of information made of billions of pieces of discrete data gathered from across the Internet, and collected from multiple sources (DNS queries, BGP anomalies, ASN reputation, network prefixes/IP fluctuations), allows us to build the maps that reveal where the malicious infrastructure are hidden and where the attacks are staged. This turns the table of traditional security with a new approach where the defender takes the upper hand on the attacker, being able to pivot through the criminal infrastructure. This session will explain how the correlation of Internet data on multiple levels (DNS, BGP, ASN, Prefixes/IPs) can be used to build and deliver a new model of security that is pervasive and predictive, and that allows us to expose the attackers' infrastructure. In particular, the first part will focus on the detection models that can be built and applied (such as co-occurrences, NLPRank, and Spike Detectors), and how the different detectors can be integrated to expose malicious infrastructures and advanced persistent threats. The second part will provide a practical use case on how this innovative approach can be used to pivot through the attackers' infrastructure and protect organizations from advanced threats Finally, the infrastructure as art, an example will be provided on how the information obtained through the DNS analysis can be represented on a multi-dimensional space and visualized with a 3D engine. This Session is targeted at Security Analysts and Security Administrators that want to get familiar with the OpenDNS Technology and how to use it in their networks. Download link: http://rapidgator.net/file/d1e8f2f4eae8beab8a2c1e465579f83d/c7rbj.BRKSEC2049.rar.html http://nitroflare.com/view/BE8361BFA8BE550/c7rbj.BRKSEC2049.rar https://uploadgig.com/file/download/9096D6d83d21E199/c7rbj.BRKSEC2049.rar http://uploaded.net/file/9jd3wbs7/c7rbj.BRKSEC2049.rar Links are Interchangeable - No Password - Single Extraction
  2. BRKSEC-3009 - DDoS Attacks End-to-End Mitigation Cisco Live 2016 English | Size: 730.29 MB Category: Cisco In 2016, DDoS attacks exist under diverse forms and intensity, making them more difficult to tackle than ever. Very large amplification DDoS can saturate your network infrastructure while slow pace attacks can consume all your services resources. Cisco is partnering with two major actors of this field offering a tight integration in our routing and security portfolio: Arbor Peakflow SP TMS in the ASR9000 VSM and Radware DefensePro in the FirePower 9300. In this session you'll learn through concrete examples where these solutions can be used ideally in your SP infrastructure, DataCenters Download link: http://uploaded.net/file/pnfz0wo2/dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part1.rar]dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part1.rar http://uploaded.net/file/g1cx5gov/dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part2.rar]dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part2.rar http://rapidgator.net/file/66add9cab5b4f01762d06e7b01433019/dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part1.rar.html]dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part1.rar.html http://rapidgator.net/file/934c6883f8889f9b74decdb7602c1f98/dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part2.rar.html]dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part2.rar.html http://nitroflare.com/view/94CED3F91525524/dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part1.rar]dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part1.rar http://nitroflare.com/view/F3D86FAEF93D434/dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part2.rar]dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part2.rar https://www.bigfile.to/file/ywgsYXsEK5T6/dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part1.rar]dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part1.rar https://www.bigfile.to/file/78X8c6A68fDx/dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part2.rar]dak0i.BRKSEC3009..DDoS.Attacks.EndtoEnd.Mitigation.Cisco.Live.2016.part2.rar Links are Interchangeable - No Password - Single Extraction
  3. BRKSEC-3005 - Cryptographic Protocols and Algorithms Cisco Live 2016 English | Size: 639.03 MB Category: Cisco This session will review the state of the protocol suites and algorithms in use today. This includes state of the art encryption, signature, key generation and pseudo random bit string generators. In particular, AES-GCM, Elliptic Curves and other suite-B algorithms will be covered. Recommendations and the future of crypto algorithms in face of quantum cryptography will be discussed. This Session is targeted at security and network administrators as well as security architects that want to learn more about crypto technologies. Download link: http://uploaded.net/file/ppqhgamn/8afjd.BRKSEC3005..Cryptographic.Protocols.and.Algorithms.Cisco.Live.2016.rar]8afjd.BRKSEC3005..Cryptographic.Protocols.and.Algorithms.Cisco.Live.2016.rar http://rapidgator.net/file/9ae4fa63d411fdffd89bc52c226aa853/8afjd.BRKSEC3005..Cryptographic.Protocols.and.Algorithms.Cisco.Live.2016.rar.html]8afjd.BRKSEC3005..Cryptographic.Protocols.and.Algorithms.Cisco.Live.2016.rar.html http://nitroflare.com/view/A11984D84EF061A/8afjd.BRKSEC3005..Cryptographic.Protocols.and.Algorithms.Cisco.Live.2016.rar]8afjd.BRKSEC3005..Cryptographic.Protocols.and.Algorithms.Cisco.Live.2016.rar https://www.bigfile.to/file/7BHesnRH9qdp/8afjd.BRKSEC3005..Cryptographic.Protocols.and.Algorithms.Cisco.Live.2016.rar]8afjd.BRKSEC3005..Cryptographic.Protocols.and.Algorithms.Cisco.Live.2016.rar Links are Interchangeable - No Password - Single Extraction
  4. BRKSEC-2139 - Advanced Malware Protection English | Size: 612.99 MB Category: Cisco There is no question that the threat landscape has changed. Security professionals have moved from defending against LOVELETTER and SQL Slammer to Zeus and CryptoLocker. The stimulating force behind these threats have gone from mostly security researchers with intellectual curiosity to patient, funded, and highly motivated individuals with well-defined targets. Viruses, Worms, Spyware, Adware, and the like are all connected pieces of Crimeware infrastructure designed to ensure that breaches are difficult to catch, allow for continuous access, while remaining hidden in plain sight. Cisco Advanced Malware Protection [AMP] is designed to provide both defense and insight Before, During, and After these breach attempts. If you have struggled with point of exposure, or the extent of breach, this session will show how Cisco AMP helps to detect infections, understand scope, and initiate remediation for protected systems no matter where they are at any moment. Download link: http://uploaded.net/file/1vlh4k4y/fwjk8.BRKSEC2139..Advanced.Malware.Protection.rar]fwjk8.BRKSEC2139..Advanced.Malware.Protection.rar http://rapidgator.net/file/82a182e84da30b6772429a9b4fb95e95/fwjk8.BRKSEC2139..Advanced.Malware.Protection.rar.html]fwjk8.BRKSEC2139..Advanced.Malware.Protection.rar.html http://nitroflare.com/view/92BE0E741585464/fwjk8.BRKSEC2139..Advanced.Malware.Protection.rar]fwjk8.BRKSEC2139..Advanced.Malware.Protection.rar https://www.bigfile.to/file/VaMpT9ytf74u/fwjk8.BRKSEC2139..Advanced.Malware.Protection.rar]fwjk8.BRKSEC2139..Advanced.Malware.Protection.rar Links are Interchangeable - No Password - Single Extraction
×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.