Security, Hacking & Social Engineering Presentation.

Robert P. J. Day rpjday at mindspring.com
Mon Oct 31 14:25:26 UTC 2005


On Mon, 31 Oct 2005, STYMA, ROBERT E (ROBERT) wrote:

>
> >
> > The topics I'm going to cover, in no particular order, are:
> >
> >   - Sniffers
> >   - Viruses
> >   - Port Scanning
> >   - Fingerprinting
> >   - Unnecessary open ports
> >   - Bad software configuration (web servers, databases, mail
> > servers...)
> >   - SQL injections
> >   - Buffer Overflows
> >   - Use of google as a information gathering tool.
> >   - Firewalls
> >   - DOS attacks
> >   - Brute force attacks
> >   - Cryptography.
> >   - Cross site scripting
> >   - Man-in-the-middle
> >   - Intrusion Detection Systems
> >   - Honeypots
> >   - Identity Spoofing
> >   - Social Engineering
> >   - Gathering information from trash/rubbish
> >   - Physical security in buildings.  Access to the building, cable
> > sniffing, secure ID's...
> >   -  And more....  ;-)
> >
> With this list of topics,
> How many days long is this presentation going to be?

and why exactly is everyone on this list doing all your work for you?

rday




More information about the fedora-list mailing list