Transcript
  • 00:01    |    
    Initial credits
  • 00:20    |    
    Introduction
    • Examples of privacy invasion
      • E-mail accounts
      • Internet searching
      • Instant messaging software
      • Antivirus software
      • Computer programs
      • Internet
    • Methodology of the presentation
  • 07:3.5    |    
    How to become a computer security expert?
    • Know a programming language
    • Become a networking guru
    • Know the basics of Unix
    • Have a hacking attitude
  • 08:27.5    |    
    Difference between hacking and cracking
    • Hackers
    • Crackers
  • 09:30    |    
    Facts and figures of cyber crime
  • 10:01    |    
    Top 6 corporate attacks
  • 10:14    |    
    Privacy attacks
    • Mumbai lady case
    • National Aeronautics and Space Administration (NASA) case
    • Individual and corporate concern
    • Internet capacity to make difficult and criminal operations
  • 14:37    |    
    Trojans
    • Definition
    • Main functions
    • Demonstrating how to install and use a Netbus trojan
      • IP address
      • Connection to target computer
      • Trojans options
        • Open CD-ROOM
        • Show image
        • Swap mouse
        • Message manager
        • Screen dump
        • Control mouse
        • Exit windows
        • Send text
        • Keyword recording
        • Example
        • Sound system
        • Go to URL
        • Key manager
        • File manager
    • Trojans availability
    • Popular trojans
    • Installation of a trojan on the victim's computer
      • Physical access
      • EXE binders
  • 32:33.5    |    
    E-mail forging attacks
    • Definition
    • Demonstrating how to send fraudulent e-mail
      • Results
      • Attached files
      • Replies
    • E-mail forging problems
  • 40:12    |    
    Other cyber crime examples
    • Steganography
      • Definition
      • S-Tools software
      • Demonstrating how steganography works
        • Creation of a photograph with a hidden message
        • Opening the message
    • Credit card numbers theft
    • Reading clipboard information
    • Password attacks
      • IP address
      • E-mail software
      • Kind of password
      • Connections
      • User name
      • Brute force technique
      • Complicated passwords
    • Free software registration
      • Microsoft Windows CD-Key Generator software
      • Conversion of a trial version software
      • Cracks search engines
  • 56:07    |    
    Top 6 security practices
    • Firewall
      • Zonealarm
      • Checkpoint
      • Functions of a firewall
      • Inutility of Windows built-in firewall
    • Antivirus
    • Weekly update
    • Antispyware
    • Spysweeper or Prevx
    • What antivirus do you recommend?
    • Operative system patch updates
    • Strong password
    • Example
    • Key scrambler
    • Other optional countermeasures
      • Anonymous surfing
        • Anonymizer.com
        • Cooltunnel.com
        • Pop-up blockers
        • Advantages of Russian websites
      • Wi-Fi networks
        • Data sniffing
        • Enabled WEP or WPA
      • Security policies
        • Restrict user and file access
        • Restrict applications on network
      • Security audits
      • Nessus
  • 01:14:27    |    
    Question and answer period
    • Is it possible to hack into mobile phones?
    • What are the countermeasures for trojans and e-mail forging?
    • How do you prevent SQL injection?
    • What are the risks for patching an unregistered operation system?
    • Do Microsoft share information with other software companies about non-licenced programs installed on a computer?
    • What is the difference between Nessus and Ethereal?
  • 01:22:11    |    
    Final words
  • 01:22:40    |    
    Final credits


Hacked! Network Security

12 de marzo de 2008   | Vistas: 192
New Media

The following conference presents Internet security issues in an entertaining and educational way by the use of interactive demonstrations about the installation and mechanism of hacking programs. It is not necessary to be an expert to know how to use these programs in order to attack individuals and organizations by sending Trojans, forging e-mail messages and stealing passwords. Fortunately, the practice of some important countermeasures, like installing security applications and updating software, will help us to protect ourselves from these criminal attacks.



Conferencista

Ankit Fadia is a digital intelligence consultant who is known as a computer security guru and cyber terrorism expert because…


IDEAS DE LA LIBERTAD

Nuestra misión es la enseñanza y difusión de los principios éticos, jurídicos y económicos de una sociedad de personas libres y responsables.

Universidad Francisco Marroquín