Security, Hacking & Social Engineering Presentation.
Robert P. J. Day
rpjday at mindspring.com
Mon Oct 31 14:25:26 UTC 2005
On Mon, 31 Oct 2005, STYMA, ROBERT E (ROBERT) wrote:
>
> >
> > The topics I'm going to cover, in no particular order, are:
> >
> > - Sniffers
> > - Viruses
> > - Port Scanning
> > - Fingerprinting
> > - Unnecessary open ports
> > - Bad software configuration (web servers, databases, mail
> > servers...)
> > - SQL injections
> > - Buffer Overflows
> > - Use of google as a information gathering tool.
> > - Firewalls
> > - DOS attacks
> > - Brute force attacks
> > - Cryptography.
> > - Cross site scripting
> > - Man-in-the-middle
> > - Intrusion Detection Systems
> > - Honeypots
> > - Identity Spoofing
> > - Social Engineering
> > - Gathering information from trash/rubbish
> > - Physical security in buildings. Access to the building, cable
> > sniffing, secure ID's...
> > - And more.... ;-)
> >
> With this list of topics,
> How many days long is this presentation going to be?
and why exactly is everyone on this list doing all your work for you?
rday
More information about the fedora-list
mailing list