DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology How to Investigate Threat Alerts in Spiceworks!

1. HOW TO INVESTIGATE THREAT ALERTS IN SPICEWORKS PRESENTED BY TOM D’AQUINO AND BILL SMARTT 2. SpiceHead Benefit: Identify compromised hosts in a monitored network without…

Technology Get Security Visibility in Under 1 Hour with AlienVault

1. “LIVE” PRODUCT DEMO: UNIFIED SECURITY MANAGEMENT IN UNDER 1 HOUR WITH ALIENVAULT ™Tom D’Aquino, Systems Engineers Justin S. Endres, Senior Vice President of Sales…

Technology Virtunoid: Breaking out of KVM

1. Virtunoid: Breaking out of KVM Nelson Elhage DEFCON 19August 8, 2011Nelson Elhage (DEFCON 19) Virtunoid: Breaking out of KVM August 8, 2011 1 / 50 2. KVMThe new hotness…

Technology Getting Started with Firefox

1.Getting Started withAsmaa El-BambyMozilla Campus Rep 2. What is Firefox? • Firefox is a free, open-source, cross platform and graphical web browser for Windows, Linux…

Technology OSDC 2015: Luca Gibelli | Skylable: Storing Massive Amounts of Data, with Minimal Effort

Luca Gibelli www.skylable.com Todayâs presentation â¢The limits of traditional SANs â¢The limits of the S3 protocol â¢Why SX Cluster is better â¢Use cases Find out…

Documents Subgraph vega countermeasure2012

Using and Extending Vega David Mirza, Subgraph Montreal www.subgraph.com Who We Are  Open-source security startup  Based in Montreal  Experienced founders: •Secure…

Documents Imessage privacy

Quarkslab on iMessage Privacy HITB, Kuala Lumpur, oct. 2013 @pod2g ([email protected]) gg ([email protected]) Presentations • Quarkslab is a research company specialized…