Soumettre la recherche
Mettre en ligne
Social Engineering si etica hackingului
•
0 j'aime
•
326 vues
Tudor Damian
Suivre
Signaler
Partager
Signaler
Partager
1 sur 239
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Spargerea parolelor folosind GPU
Spargerea parolelor folosind GPU
Radu Potop
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Agora Group
Proiect 10B - Bocioacă Necula
Proiect 10B - Bocioacă Necula
Andreea Bocioaca
Curs White Hat Hacking #3 - ITSpark
Curs White Hat Hacking #3 - ITSpark
ITSpark Community
Curs White Hat Hacking #1 - ITSpark
Curs White Hat Hacking #1 - ITSpark
ITSpark Community
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
Tudor Damian
Recommandé
Spargerea parolelor folosind GPU
Spargerea parolelor folosind GPU
Radu Potop
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Agora Group
Proiect 10B - Bocioacă Necula
Proiect 10B - Bocioacă Necula
Andreea Bocioaca
Curs White Hat Hacking #3 - ITSpark
Curs White Hat Hacking #3 - ITSpark
ITSpark Community
Curs White Hat Hacking #1 - ITSpark
Curs White Hat Hacking #1 - ITSpark
ITSpark Community
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
Tudor Damian
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Tudor Damian
Microsoft Azure Stack
Microsoft Azure Stack
Tudor Damian
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
IT Risk Management
IT Risk Management
Tudor Damian
IDS Evasion Techniques
IDS Evasion Techniques
Tudor Damian
Social Engineering, or hacking people
Social Engineering, or hacking people
Tudor Damian
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Tudor Damian
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
Tudor Damian
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Tudor Damian
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
Tudor Damian
What's new in Windows 8
What's new in Windows 8
Tudor Damian
Linux on Hyper-V
Linux on Hyper-V
Tudor Damian
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Tudor Damian
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
Tudor Damian
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Tudor Damian
Hosting your virtual private cloud
Hosting your virtual private cloud
Tudor Damian
Linux sub Hyper-V R2
Linux sub Hyper-V R2
Tudor Damian
White Hat Hacking #3
White Hat Hacking #3
Tudor Damian
White Hat Hacking #1
White Hat Hacking #1
Tudor Damian
White Hat Hacking #2
White Hat Hacking #2
Tudor Damian
Contenu connexe
Plus de Tudor Damian
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Tudor Damian
Microsoft Azure Stack
Microsoft Azure Stack
Tudor Damian
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
IT Risk Management
IT Risk Management
Tudor Damian
IDS Evasion Techniques
IDS Evasion Techniques
Tudor Damian
Social Engineering, or hacking people
Social Engineering, or hacking people
Tudor Damian
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Tudor Damian
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
Tudor Damian
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Tudor Damian
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
Tudor Damian
What's new in Windows 8
What's new in Windows 8
Tudor Damian
Linux on Hyper-V
Linux on Hyper-V
Tudor Damian
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Tudor Damian
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
Tudor Damian
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Tudor Damian
Hosting your virtual private cloud
Hosting your virtual private cloud
Tudor Damian
Linux sub Hyper-V R2
Linux sub Hyper-V R2
Tudor Damian
White Hat Hacking #3
White Hat Hacking #3
Tudor Damian
White Hat Hacking #1
White Hat Hacking #1
Tudor Damian
White Hat Hacking #2
White Hat Hacking #2
Tudor Damian
Plus de Tudor Damian
(20)
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Microsoft Azure Stack
Microsoft Azure Stack
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
IT Risk Management
IT Risk Management
IDS Evasion Techniques
IDS Evasion Techniques
Social Engineering, or hacking people
Social Engineering, or hacking people
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
What's new in Windows 8
What's new in Windows 8
Linux on Hyper-V
Linux on Hyper-V
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Hosting your virtual private cloud
Hosting your virtual private cloud
Linux sub Hyper-V R2
Linux sub Hyper-V R2
White Hat Hacking #3
White Hat Hacking #3
White Hat Hacking #1
White Hat Hacking #1
White Hat Hacking #2
White Hat Hacking #2
Social Engineering si etica hackingului
1.
salut.
2.
cine sunt eu?
3.
Tudor Damian, MCSA
IT Solutions Specialist tudor.damian@transcent.ro
4.
Tudy :) tudy@tudy.ro www.tudy.ro
5.
despre ce e
vorba?
6.
social engineering
7.
...sau ”hacking people”
8.
etica hackingului
9.
da, există și
așa ceva :)
10.
bun, hai să
începem
11.
Kevin Mitnick
12.
(probabil) cel mai
cunoscut ”hacker” din lume
13.
atât doar că
nu e hacker! :)
14.
e ”social engineer”
Télécharger maintenant