Computer Security

We have found 4 items matching your search query.

fallback-no-image-20

How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper

  • 6,968 Views
  • 0 Likes
  • 20 Comments
New research from the ben-gurion university cyber labs …
fallback-no-image-19

Introduction to Security with Group Policy Objects and Organizational Units in Windows Server 2012

  • 318 Views
  • 0 Likes
  • 19 Comments
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 17, 2013 Length of Class: 26:25 Research Assistance: Tracks Windows Server …
fallback-no-image-18

TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked

  • 338 Views
  • 0 Likes
  • 20 Comments
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research …
fallback-no-image-17

How to Make an ATM Spew Out Money

  • 368 Views
  • 0 Likes
  • 20 Comments
Barnaby Jack, director of security testing at the computer security company IOActive, demonstrates how to hack an ATM to make it dispense money.