Resources for Understanding Technology: Videos | Conferences

Forensic Fails - Shift + Delete Won't Help You Here

Linux Command Line: Processes (6 of 8)

Your Password Complexity Requirements are Worthless

Advanced memory forensics: the cold boot attacks

Linux Command Line: File Permissions (8 of 8)

If You Can Open The Terminal, You Can Capture The Flag - CTF for Everyone

Offensive Anti-Analysis

Knocking my neighbor's kid's cruddy drone offline

Agile is Dead

Reverse Engineering Malware for Newbies

honeyHoax - A Centralised Honeypot

Unexpected Stories - From a Hacker Who Made It Inside the Government

Shameful Secrets of Proprietary Network Protocols

Objective and Game-Based Capture the Flag Competitions

Best Practices Scaling Django

Destroying Evidence Before it's "Evidence"

AWS re:Invent 2015 Keynote

The NSA: Capabilities and Countermeasures

Linux Command Line: Finding Files (4 of 8)

Linux Command Line: File Operations (3 of 8)

Bypassing Local Microsoft Security Policies

Forensic Imager Tools: You don't have the Evidence

An Introduction to Back Dooring Operating Systems for Fun and Trolling

Anti-Forensics and Anti-Anti-Forensics Attacks

High Def Fuzzing: Exploring Vulnerabilities in HDMI CEC

Linux Command Line: Directory Operations (1 of 8)

Linux Command Line: Users (7 of 8)

Don't Be Stupid With Github

Microservices

Linux Command Line: Redirection and Pipes (5 of 8)

Introduction to Attack and Defense CTF Competitions

How Google turned me into my mother: The proxy paradox in security

Netflix: 190 Countries and 5 CORE SREs

In plain sight: The perfect exfiltration

Tyranny of small decisions

Automating Your Browser and Desktop Apps

Red vs. Blue: Modern Active Directory Attacks & Defense

Linux Command Line: File Operations (2 of 8)

Maximum CTF: Getting the Most Out of Capture the Flag