Soumettre la recherche
Mettre en ligne
SYDO - Secure Your Data by Obscurity
•
Télécharger en tant que PPT, PDF
•
0 j'aime
•
492 vues
Avădănei Andrei
Suivre
Technologie
Signaler
Partager
Signaler
Partager
1 sur 16
Télécharger maintenant
Recommandé
SYDO - Secure Your Data by Obscurity
SYDO - Secure Your Data by Obscurity
DefCamp
Managing Secrets in Production
Managing Secrets in Production
Erik Osterman
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Hacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databases
sunil kumar
WordPress Security Master Plan
WordPress Security Master Plan
ServerGuy
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
Recommandé
SYDO - Secure Your Data by Obscurity
SYDO - Secure Your Data by Obscurity
DefCamp
Managing Secrets in Production
Managing Secrets in Production
Erik Osterman
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Hacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databases
sunil kumar
WordPress Security Master Plan
WordPress Security Master Plan
ServerGuy
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
CiNPA Security SIG
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
Blockchain @ Descon 2016
Blockchain @ Descon 2016
P-e-t-a-r
Sql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Karen Lopez
Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
Enumerating Windows Users
Enumerating Windows Users
UTD Computer Security Group
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
How you can become a hacker with no security experience
How you can become a hacker with no security experience
Avădănei Andrei
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Avădănei Andrei
Contenu connexe
Similaire à SYDO - Secure Your Data by Obscurity
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
CiNPA Security SIG
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
Blockchain @ Descon 2016
Blockchain @ Descon 2016
P-e-t-a-r
Sql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Karen Lopez
Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
Enumerating Windows Users
Enumerating Windows Users
UTD Computer Security Group
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
Similaire à SYDO - Secure Your Data by Obscurity
(20)
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Cloud computing security
Cloud computing security
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
Pentesting Android Apps
Pentesting Android Apps
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Blockchain @ Descon 2016
Blockchain @ Descon 2016
Sql server security in an insecure world
Sql server security in an insecure world
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Scada Strangelove - 29c3
Scada Strangelove - 29c3
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
Enumerating Windows Users
Enumerating Windows Users
cyber-security-reference-architecture
cyber-security-reference-architecture
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Plus de Avădănei Andrei
How you can become a hacker with no security experience
How you can become a hacker with no security experience
Avădănei Andrei
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Avădănei Andrei
Wordpress Plugins Scanner
Wordpress Plugins Scanner
Avădănei Andrei
DefCamp 2012 @Bucharest
DefCamp 2012 @Bucharest
Avădănei Andrei
A journey through an INFOSEC labyrinth
A journey through an INFOSEC labyrinth
Avădănei Andrei
Polish the Wheel
Polish the Wheel
Avădănei Andrei
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Avădănei Andrei
SmartFender
SmartFender
Avădănei Andrei
Xss is more than a simple threat
Xss is more than a simple threat
Avădănei Andrei
Arta de a susţine o prezentare
Arta de a susţine o prezentare
Avădănei Andrei
Spaghetti Code vs MVC
Spaghetti Code vs MVC
Avădănei Andrei
Plus de Avădănei Andrei
(11)
How you can become a hacker with no security experience
How you can become a hacker with no security experience
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Wordpress Plugins Scanner
Wordpress Plugins Scanner
DefCamp 2012 @Bucharest
DefCamp 2012 @Bucharest
A journey through an INFOSEC labyrinth
A journey through an INFOSEC labyrinth
Polish the Wheel
Polish the Wheel
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
SmartFender
SmartFender
Xss is more than a simple threat
Xss is more than a simple threat
Arta de a susţine o prezentare
Arta de a susţine o prezentare
Spaghetti Code vs MVC
Spaghetti Code vs MVC
Dernier
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Dernier
(20)
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
SYDO - Secure Your Data by Obscurity
1.
SYDO – Secure
Your Data by Obscurity Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
2.
Let's make some
research :-)
3.
4.
5.
We should be
more careful!
6.
But we are
lazy...
7.
8.
How it works?
9.
10.
11.
Demo
12.
13.
14.
15.
Questions?
16.
Télécharger maintenant