FileMood

Download Computer Security Hub

Computer Security Hub

Name

Computer Security Hub

 DOWNLOAD Copy Link

Total Size

11.0 GB

Total Files

340

Hash

6D049854CD2D561AF02DDE929D6E8B3CB783244B

/Penetration Testing/

Building a Virtual Lab with VirtualBox for Penetration Testing and Hacking Tests.mp4

1.4 GB

Using Web Proxy Servers for Hacking.mp4

402.7 MB

Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge.mp4

320.2 MB

Introduction to Phishing Email Hacking Attacks.mp4

220.3 MB

Disposable Email for Hacking and Security.mp4

189.6 MB

Introduction to Hacking.mp4

187.2 MB

Network Mapping.mp4

179.8 MB

Hacking DNS.mp4

169.4 MB

Introduction to Practical Hacking and Penetration Testing.mp4

157.9 MB

Hacking - How to hack usernames and passwords - For Beginners.wmv.mp4

150.1 MB

Step-byStep SQL Injection Attack.mp4

146.3 MB

Hacking - How to hack a WPA_WPA2 Router - For Beginners.mp4

127.4 MB

Beginner Hacking - Episode 1 - Setting up Backtrack in a Virtual Machine.mp4

122.0 MB

Security+ Online Training_ Module 1 - Mitigating Threats.mp4

105.0 MB

BT5QA.mp4

103.7 MB

Cross site scripting attacks (XSS), cookie session ID stealing -Part 1.mp4

95.8 MB

Creating a Phishing Website for Hacking.mp4

94.7 MB

Cross site scripting attacks (XSS), cookie session ID stealing -Part 2.mp4

93.9 MB

Run an exploit and use pivoting with Meterpreter, Metasploit and Backtrack5.mp4

76.2 MB

DEFCON 16_ Nmap_ Scanning the Internet.mp4

62.5 MB

Exploit and maintain access with a Meterpreter backdoor using Metasploit.mp4

60.8 MB

Encrypt data transfers with Stunnel and OpenSSL - Part 3.mp4

59.6 MB

Encrypt data transfers with Stunnel and OpenSSL - Part 2.mp4

46.9 MB

Hacking - WPA_WPA2 Wordlists Q&A.mp4

44.5 MB

Encrypt data transfers with Stunnel and OpenSSL - Part 1.mp4

43.9 MB

Hacking to Acquire Passwords from HTML Forms Password Boxes.mp4

43.0 MB

Use Metasploit to run an exploit and launch Meterpreter- part 1.mp4

37.0 MB

Offensive Security - Advanced Windows Exploitation (AWE) v 1.1.zip

35.5 MB

Basics of ipconfig, ping, tracert, nslookup, and netstat.mp4

33.6 MB

CMD hacking basics.mp4

29.0 MB

Hacking - Collecting Network Information - For Beginners.mp4

26.0 MB

Command Line Basics for Ethical Hacking.mp4

21.9 MB

Getting started w_BackTrack4 VM installation.mp4

20.3 MB

ARP Spoofing - Man-in-the-middle attack.mp4

19.4 MB

Configure Pure-FTPd in BackTrack.mp4

18.6 MB

Hacking - VMware Answering Questions - For Beginners.mp4

18.2 MB

Penetration Testers Open Source Toolkit.pdf

17.8 MB

Use Metasploit to run an exploit and launch Meterpreter- part 2.mp4

15.8 MB

Offensive Security - Wireless Attacks ( WiFu) v2.0.pdf

15.2 MB

AWE-3.pdf

13.0 MB

Hacking With Netcat Basics.mp4.mp4

12.4 MB

AWE-2.pdf

11.2 MB

AWE-1.pdf

11.1 MB

Hacking and Securing iOS Applications.pdf

11.1 MB

Offensive Security - Penetration Testing with BackTrack (Lab Guide)v3.2.pdf

11.0 MB

Ninja Hacking Unconventional Penetration Testing Tactics and Techniques.pdf

10.3 MB

The basics of working with Netcat - Part 2.mp4

8.0 MB

AWE-4.pdf

7.9 MB

XSS Attacks - Exploits and Defense.pdf

7.7 MB

Metasploit The Penetration Testers Guide.pdf

7.2 MB

SQL Injection Attacks and Defense.pdf

6.9 MB

How to open BackTrack 5 in VMware Player_.mp4

6.3 MB

hacking a server with netcat (part 2).mp4

5.6 MB

Footprinting.pdf

4.7 MB

Hacking the art of explotation.pdf

4.6 MB

hacking a server with netcat (part 1).mp4

3.3 MB

Firewalls and Internet Security 2nd Edition.pdf

3.2 MB

Coding and Cryptography.pdf

517.7 KB

Password Cracking Techniques.pdf

443.3 KB

Cracking Passwords Guide.pdf

278.4 KB

List of MS-DOS commands.pdf

64.2 KB

Backdoor (Computing).pdf

18.5 KB

How to Use The Command Line.pdf

16.8 KB

REN.pdf

15.8 KB

NET ACCOUNTS, USER, GROUP, LOCALGROUP.pdf

7.2 KB

/Windows Registry/

Windows Registry Tutorial.mp4

286.1 MB

Hacking the Windows Registry.mp4

195.4 MB

What Are Bits, and Are They Important_ (32-Bit vs 64-Bit).mp4

48.9 MB

The Difference Between 32 Bit and 64 Bit.mp4

40.6 MB

/.../Extras and Lectures/

Introduction to Public-Key Cryptography.mp4

228.9 MB

Theory and Practice of Cryptography.mp4

125.2 MB

Lesson 14_ One-way and hash functions (intypedia).mp4

41.3 MB

Lesson 3_ Public-key cipher systems (intypedia).mp4

36.1 MB

Lesson 1_ History of cryptography and its early stages in Europe (intypedia).mp4

30.7 MB

Lesson 2_ Symmetric-key cryptography (intypedia).mp4

30.0 MB

Diffie Hellman Key Exchange.mp4

22.5 MB

How SSL works tutorial - with HTTPS example.mp4

8.5 MB

Security+ Encryption.mp4

7.3 MB

/VBS Scripting/

VBScript Basics » Part 6 _ Input Box.mp4

166.0 MB

VBScript Basics » Part 25 _ Replace Command _ InputBox by Lines.mp4

134.7 MB

VBScript Basics » Part 13 _ Automation_ Internet Explorer _ HTML.mp4

134.0 MB

VBScript Basics » Part 2 _ Message Box - Constants.mp4

124.2 MB

VBScript Basics » Part 5 _ Run Command.mp4

120.2 MB

VBScript Basics » Part 15 _ Copy_Move_Rename Files+Folders.mp4

117.2 MB

VBScript Basics » Part 1 _ Message Box - Numbers.mp4

103.3 MB

VBScript Basics » Part 12 _ Automation_ Internet Explorer _ SendKeys.mp4

102.4 MB

VBScript Basics » Part 3 _ If Then Statments.mp4

101.7 MB

VBScript Basics » Part 28 _ GetFile & GetFolder_ Attributes.mp4

101.4 MB

VBScript Basics » Part 23 _ Replace Command _ By Words.mp4

100.6 MB

VBScript Basics » Part 22 _ OpenTextFile _ Append Files.mp4

100.1 MB

VBScript Basics » Part 7 _ Do Loops.mp4

94.3 MB

VBScript Basics » Part 24 _ Replace Command _ By Lines.mp4

92.2 MB

VBScript Basics » Part 10 _ Script Directory.mp4

88.2 MB

VBScript Basics » Part 8 _ SendKeys.mp4

87.4 MB

VBScript Basics » Part 20 _ OpenTextFile _ Read Files.mp4

81.5 MB

VBScript Basics » Part 16 _ Create Shortcuts.mp4

76.4 MB

VBScript Basics » Part 27 _ GetFile & GetFolder_ Properties.mp4

76.0 MB

VBScript Basics » Part 18 _ Create_Delete Files+Folders.mp4

75.9 MB

VBScript Basics » Part 17 _ Special Folders.mp4

74.1 MB

VBScript Basics » Part 19 _ OpenTextFile _ Open Files.mp4

73.0 MB

VBScript Basics » Part 11 _ Subroutines.mp4

72.0 MB

VBScript Basics » Part 21 _ OpenTextFile _ Write Files.mp4

71.7 MB

VBScript Basics » Part 14 _ File_Folder Exists.mp4

51.7 MB

VBScript Basics » Part 26 _ With Command.mp4

47.7 MB

VBScript Basics » Part 9 _ Len, Left, & Right.mp4

45.4 MB

VBScript Basics » Part 4 _ Vertical & Horizontal Spacing.mp4

42.6 MB

/.../Batch Programming Lessons/

Batch Programing_ Lesson 3 (Create Text Files and Extract from them).mp4

115.5 MB

Batch Programming Lesson 1 (Basics).mp4

82.1 MB

Batch Programing_ Lesson 4 (How to Copy,Move and Rename files + MORE).mp4

76.0 MB

Batch Programming_ Lesson 2 (User Input, Variables).mp4

36.0 MB

Batch Scripting - 10 - Enviroment Variables.mp4

29.1 MB

Batch Scripting - 7 - Variables in Directors.mp4

28.7 MB

Batch Scripting - 8 - If Not Command.mp4

27.9 MB

Batch Scripting - 12 - Upgrade.mp4

26.0 MB

Batch Scripting - 1 - Basic Commands.mp4

22.0 MB

Batch Scripting - 6 - Directors, Del, and Ren.mp4

21.0 MB

Batch Scripting - 9 - Custom Pause and Animation.mp4

20.6 MB

Batch Scripting - 11 - Basic Encryption.mp4

19.0 MB

Batch Scripting - 4 - User Input.mp4

16.7 MB

Batch Scripting - 5 - Variables.mp4

16.2 MB

Batch Scripting - 13 - Blank Lines and Comments_Remarks.mp4

11.1 MB

Batch Scripting - 2 - Start and Color Commands.mp4

10.1 MB

Batch Scripting - 3 - Goto Command, Markers, and Loops.mp4

8.4 MB

Batch Scripting - 14 - Speaking Batch File.mp4

5.9 MB

/Computer Books/

Professional C++ 2nd Edition.pdf

113.7 MB

Windows 8 Hacks.pdf

44.9 MB

Packet Guide To Voice Over IP.pdf

26.4 MB

Hackers handbook to web applications.pdf

14.2 MB

Gray Hat Hacking 2nd Edition.pdf

13.2 MB

The Complete FreeBSD 4th Edition.pdf

12.5 MB

Professional C++.pdf

11.1 MB

How Google Test Software.pdf

10.1 MB

CEH Certified Ethical Hacker Study Guide V413HAV.pdf

9.7 MB

The shellcoders handbook 2nd Edition.pdf

9.2 MB

The Modern Web.pdf

8.6 MB

Absolute FreeBSD 2nd Edition.pdf

8.2 MB

Hacking VoIP Protocols, Attacks and Countermeasures.pdf

6.8 MB

GIS For Web Developers.pdf

4.1 MB

Linux System Administration.pdf

3.9 MB

C++ Programming Language.pdf

3.5 MB

Hacking - Firewalls And Networks How To Hack Into Remote Computers.pdf

3.0 MB

Applied Cryptography.pdf

2.9 MB

Practical C++ Programming 1995.pdf

2.8 MB

ObJ-C Programming Notes.pdf

2.7 MB

An Introduction To Keyloggers, RATS And Malware.pdf

2.3 MB

The Linux Command Line.pdf

2.1 MB

The C Programming Language.pdf

918.2 KB

/.../1 b. Stream Ciphers (week 1)/

5 b. PRG Security Definitions (25 minVid).mp4

28.1 MB

3 b. Attacks on stream ciphers and the one time pad (24 min).mp4

26.7 MB

4 b. Real-world stream ciphers (20 min Vid).mp4

22.9 MB

2 b. Stream ciphers and pseudo random generators (20 min).mp4

22.2 MB

1 b. Information theoretic security and the one time pad (19 min Vid).mp4

21.0 MB

6 b. Semantic Security (16 min Vid).mp4

17.6 MB

7 b. Stream ciphers are semantically secure (11 min Vid).mp4

12.3 MB

1 a. Information theoretic security and the one time pad.pptx

1.6 MB

5 a. PRG Security Definitions.pptx

1.4 MB

2 a. Stream ciphers and pseudo random generators.pptx

1.2 MB

3 a. Attacks on stream ciphers and the one time pad.pptx

1.1 MB

4 a. Real-world stream ciphers.pptx

750.1 KB

7 a. Stream ciphers are semantically secure.pptx

493.0 KB

6 a. Semantic Security.pptx

275.4 KB

/.../2 b. Using Block Ciphers (week 2)/

3 b. Security for many-time key (23 min).mp4

26.1 MB

4 b. Modes of operation many time key (CBC) (16 min).mp4

18.8 MB

1 b. Review PRPs and PRFs (12 min).mp4

13.3 MB

5 b. Modes of operation many time key (CTR) (10 min).mp4

10.9 MB

2 b. Modes of operation one time key (8 min).mp4

8.4 MB

1 a. Review PRPs and PRFs.pptx

425.3 KB

2 a. Modes of operation one time key.pptx

408.9 KB

4 a. Modes of operation many time key (CBC).pptx

375.0 KB

3 a. Security for many-time key.pptx

325.7 KB

5 a. Modes of operation many time key (CTR).pptx

229.2 KB

/.../2 a. Block Ciphers (week 2)/

2 b. The Data Encryption Standard (22 min Vid).mp4

25.7 MB

3 b. Exhaustive search attacks (20 min Vid).mp4

23.0 MB

1 b. What are block ciphers (17 min Vid).mp4

19.6 MB

4 b. More attacks on block ciphers (16 min Vid).mp4

18.6 MB

5 b. The AES block cipher (14 min Vid).mp4

15.2 MB

6 b. Block ciphers from PRGs (12 min Vid).mp4

13.5 MB

2 a. The Data Encryption Standard.pptx

828.6 KB

3 a. Exhaustive search attacks.pptx

637.0 KB

4 a. More attacks on block ciphers.pptx

536.8 KB

5 a. The AES block cipher.pptx

445.5 KB

6 a. Block ciphers from PRGs.pptx

282.4 KB

1 a. What are block ciphers.pptx

229.7 KB

/.../6 a. Public Key Encryption from trapdoor permutations (week 6)/

11 - 4 - PKCS 1 (23 min).mp4

24.5 MB

11 - 3 - The RSA trapdoor permutation (18 min).mp4

20.8 MB

11 - 5 - Is RSA a one-way function (17 min).mp4

19.4 MB

11 - 1 - Definitions and security (16 min).mp4

18.1 MB

11 - 6 - RSA in practice (14 min).mp4

16.4 MB

11 - 2 - Constructions (11 min) .mp4

11.8 MB

11.1-pubkey-trapdoor.pptx

359.8 KB

11.4-pubkey-trapdoor.pptx

209.4 KB

11.3-pubkey-trapdoor.pptx

204.3 KB

11.2-pubkey-trapdoor.pptx

191.4 KB

11.6-pubkey-trapdoor.pptx

189.6 KB

11.5-pubkey-trapdoor.pptx

186.1 KB

/.../4 a. Authenticated Encryption (week 4)/

4 b. Constructions from ciphers and MACs (21 min).mp4

24.0 MB

5 b. Case study TLS (18 min).mp4

19.9 MB

6 b. CBC padding attacks (14 min).mp4

15.7 MB

1 b. Active attacks on CPA-secure encryption (13 min).mp4

14.7 MB

3 b. Chosen ciphertext attacks (12 min).mp4

13.7 MB

7 b. Attacking non-atomic decryption (10 min).mp4

11.6 MB

2 b. Definitions (6 min).mp4

5.9 MB

1 a. Active attacks on CPA-secure encryption.pptx

561.0 KB

6 a. CBC padding attacks.pptx

390.1 KB

5 a. Case study TLS.pptx

359.5 KB

3 a. Chosen ciphertext attacks.pptx

268.2 KB

4 a. Constructions from ciphers and MACs.pptx

252.2 KB

7 a. Attacking non-atomic decryption.pptx

243.0 KB

2 a. Definitions.pptx

227.6 KB

/.../3 a. Message Integrity (week 3)/

3 b. CBC-MAC and NMAC (20 min).mp4

23.4 MB

5 b. PMAC and the Carter-Wegman MAC (16 min).mp4

17.9 MB

1 b. Message Authentication Codes (16 min).mp4

17.4 MB

2 b. MACs Based On PRFs (10 min).mp4

11.7 MB

4 b. MAC padding (9 min).mp4

9.8 MB

3. CBC-MAC and NMAC.pptx

333.3 KB

2. MACs Based On PRFs.pptx

290.4 KB

1. Message Authentication Codes.pptx

286.7 KB

4. MAC padding.pptx

255.3 KB

5. PMAC and the Carter-Wegman MAC.pptx

246.5 KB

/.../4 b. Odds and ends (week 4)/

8 - 3 - Deterministic EncryptionSIV and wide PRP (21 min).mp4

23.1 MB

8 - 2 - Deterministic Encryption (15 min).mp4

16.4 MB

8 - 4 - Tweakable encryption (15 min).mp4

16.3 MB

8 - 1 - Key Derivation (14 min).mp4

15.3 MB

8 - 5 - Format preserving encryption (13 min).mp4

13.9 MB

08.3-odds-and-ends.pptx

525.3 KB

08.4-odds-and-ends.pptx

460.7 KB

08.2-odds-and-ends.pptx

270.4 KB

08.5-odds-and-ends.pptx

245.0 KB

08.1-odds-and-ends.pptx

210.8 KB

/

vlc-2.0.7-win32.exe

22.9 MB

/.../6 b. Public key encryption from Diffie-Hellman (week 6)/

12 - 1 - The ElGamal Public-key System (23 min).mp4

22.4 MB

12 - 2 - ElGamal Security (14 min).mp4

15.2 MB

12 - 4 - A Unifying Theme (12 min).mp4

13.6 MB

12 - 3 - ElGamal Variants With Better Security (11 min).mp4

11.8 MB

12 - 5 - Farewell (for now) (6 min).mp4

6.0 MB

12.1-pubkey-dh.pptx

316.3 KB

12.2-pubkey-dh.pptx

198.8 KB

12.4-pubkey-dh.pptx

195.7 KB

12.3-pubkey-dh.pptx

190.7 KB

12.5-pubkey-dh.pptx

184.6 KB

/.../5 b. Intro. Number Theory (week 5)/

10 - 5 - Intractable problems (19 min).mp4

22.2 MB

10 - 2 - Fermat and Euler (18 min).mp4

21.0 MB

10 - 3 - Modular eth roots (17 min).mp4

20.0 MB

10 - 1 - Notation (15 min).mp4

16.5 MB

10 - 4 - Arithmetic algorithms (13 min).mp4

14.6 MB

10.1-numth-annotated.pptx

534.3 KB

10.3-numth-annotated.pptx

475.2 KB

10.5-numth-annotated.pptx

240.1 KB

10.4-numth-annotated.pptx

229.5 KB

10.2-numth-annotated.pptx

210.7 KB

/.../5 a. Basic key exchange (week 5)/

9 - 3 - The Diffie-Hellman protocol (19 min).mp4

22.0 MB

9 - 2 - Merkle Puzzles (11 min).mp4

13.0 MB

9 - 1 - Trusted 3rd parties (11 min).mp4

12.8 MB

9 - 4 - Public-key encryption (11 min).mp4

12.4 MB

09.3-basic-key-exchange-annotated.pptx

752.8 KB

09.1-basic-key-exchange-annotated.pptx

616.9 KB

09.4-basic-key-exchange-annotated.pptx

489.9 KB

09.2-basic-key-exchange-annotated.pptx

215.3 KB

/Cryptography Courses/1 a. Course Overview/

3 b. History of cryptography (19 min Vid).mp4

21.5 MB

4 b. Discrete probability (Crash course) (18 min Vid).mp4

20.8 MB

2 b.What is cryptography (15 min Vid).mp4

17.8 MB

5 b. Discrete probability (crash course, cont.) (14 min Vid).mp4

15.3 MB

1 b. Course Overview (11 min Vid).mp4

12.3 MB

3 a. History of cryptography.pptx

1.6 MB

2 a. What is cryptography.pptx

1.1 MB

1 a. Course Overview.pptx

300.2 KB

5 a. Discrete probability (crash course, cont.).pptx

212.5 KB

4 a. Discrete probability (Crash course).pptx

189.8 KB

/Networking/

Windows command line networking (nslookup).mp4

19.4 MB

Windows command line networking (route).mp4

18.3 MB

Windows command line networking (netstat).mp4

17.1 MB

Windows command line networking (ipconfig).mp4

16.1 MB

Windows command line networking (tracert).mp4

11.2 MB

Windows command line networking (arp, getmac).mp4

9.5 MB

Windows command line networking (ping).mp4

6.4 MB

/.../3 b. Collision Resistance (week 3)/

2 b. Generic birthday attack (16 min).mp4

16.9 MB

3 b. The Merkle-Damgard Paradigm (12 min).mp4

13.2 MB

1 b. Introduction (11 min).mp4

12.5 MB

6 b.Timing attacks on MAC verification (9 min).mp4

9.8 MB

4 b. Constructing compression functions (8 min).mp4

9.2 MB

5 b. HMAC (7 min).mp4

8.2 MB

3. The Merkle-Damgard Paradigm.pptx

837.4 KB

2. Generic birthday attack.pptx

527.1 KB

6. Timing attacks on MAC verification.pptx

333.5 KB

5. HMAC.pptx

249.2 KB

4. Constructing compression functions.pptx

245.9 KB

1. Introduction.pptx

209.3 KB

/Batch File Programming/

Batch File Programming.pdf

4.0 MB

Batch file Wikipedia Info.pdf

205.1 KB

Batch File Informal Programming.pdf

59.9 KB

/Information Packets/

Cryptosystem.pdf

2.4 MB

Rootkit.pdf

642.2 KB

Portable Document Format.pdf

472.9 KB

IPv6.pdf

288.9 KB

Transport Layer Security.pdf

272.6 KB

User Datagram Protocol.pdf

243.8 KB

Cryptographic hash function.pdf

213.6 KB

Transport layer.pdf

167.6 KB

Internet Group Management Protocol.pdf

167.5 KB

Network Time Protocol.pdf

149.7 KB

ICMPv6.pdf

142.3 KB

IPsec.pdf

141.1 KB

Mobile IP.pdf

130.8 KB

Shell script.pdf

123.6 KB

Tunneling protocol.pdf

90.6 KB

IPv6 packet.pdf

84.2 KB

Neighbor Discovery Protocol.pdf

83.7 KB

Client–server model.pdf

79.0 KB

Obfuscated TCP.pdf

62.5 KB

tcpcrypt.pdf

59.6 KB

Tcpcrypt - Encrypting the internet.pdf

53.1 KB

Domain Name System.pdf

42.5 KB

NETSH (Network Shell).pdf

16.7 KB

IF.pdf

15.1 KB

Secure Deletion.pdf

14.2 KB

CALL.pdf

13.5 KB

ISO image.pdf

12.2 KB

Begin Mod Commands.pdf

11.1 KB

DEL.pdf

9.7 KB

CIPHER.pdf

9.5 KB

FIND.pdf

8.4 KB

MOVE.pdf

7.6 KB

NSLOOKUP (TCP IP).pdf

7.3 KB

Choosing a Password.pdf

6.7 KB

GOTO.pdf

6.7 KB

Back Orifice.pdf

6.3 KB

Avoid SMS Text Messages If You Can.pdf

4.9 KB

/Cryptography Courses/

08.3-odds-and-ends.pptx

525.3 KB

5 a. The AES block cipher.pptx

445.5 KB

12.2-pubkey-dh.pptx

198.8 KB

/Cryptography Courses/Encryption/

Encrypting Files and Folders With EFS (Windows) 8.docx

210.6 KB

File and Disk Encryption.docx

16.3 KB

Learn to Encrypt Your Internet Communications.docx

13.6 KB

Encrypt Your Data.docx

12.3 KB

Encryption Basics.pdf

6.9 KB

/Telnet/

Linux Unix Command - Telnet.pdf

36.3 KB

Telnet.pdf

17.1 KB

/.../Batch File Scripts/

Shutdown PC.bat

0.1 KB

Clean PC Disk Space.bat

0.1 KB

Restart PC.bat

0.1 KB

 

Total files 340


Copyright © 2024 FileMood.com