Programming Assignment Unit 1
Programming Assignment Unit 1
Completion requirements
Solution
21
views
FBI Crime Investigation Action Movie In English
FBI Crime Investigation Action Movie In English Part 1
12
views
What is PII and PSI
Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.
It includes, name,home address, email,phone date of birth etc
What is PSI? Personal Sensitive information.
They are data that must be guarded from unauthorized access and unwarranted disclosure in order to maintain the information security of an individual or organization.
It includes, credit cards, Social security number, national identification number, medical records,finger biometric etc.
29
views
1
comment
Welcome to Silicon Valley Part 2.
We want to bring you behind the scenes, show you what really happens in Silicon Valley’s backstage and give you the insider perspective on how it feels to start a company here. Welcome to Silicon Valley
10
views
Welcome to Silicon Valley Part 1
We want to bring you behind the scenes, show you what really happens in Silicon Valley’s backstage and give you the insider perspective on how it feels to start a company here. Welcome to Silicon Valley! More info here
3
views
Blind Spot
Jaimie Alexander (Thor) stars in the new NBC drama about a woman with amnesia - and a mysterious array of tattoos all across her body.
3
views
Nmap Basic Command
There are a number of reasons why security pros prefer Nmap over other scanning tools.
First, Nmap helps you to quickly map out a network without sophisticated commands or configurations. It also supports simple commands (for example, to check if a host is up) and complex scripting through the Nmap scripting engine.
11
views
Navigating moodle of the University Of The People.
How to navigate the University of the people campus moodle Part
This particular video focus on class disussion section. Later I will make videos how to naviagte other sections.
41
views
2
comments
Fake authentication
The fake authentication attack allows you to perform the two types of WEP authentication (Open System and Shared Key) plus associate with the access point (AP). This is only useful when you need an associated MAC address in various aireplay-ng attacks and there is currently no associated client. It should be noted that the fake authentication attack does NOT generate any ARP packets.
11
views
Simple sniffing and cracking(Scanning Wireless networks )
The first thing to do is looking out for a potential target. The aircrack-ng suite contains airodump-ng for this - but other programs like Kismet can be used too. Prior to looking for networks, you must put your wireless card into what is called “monitor mode”. Monitor mode is a special mode that allows your computer to listen to every wireless packet. This monitor mode also allows you to optionally inject packets into a network. Injection will be covered later in this tutorial.
27
views
Creating/inspecting key pair, encrypting/decrypting and sign/verify using OpenSSL
OpenSSL is a commercial-grade utility toolkit for Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It’s also a general-purpose cryptography library. OpenSSL is licensed under an Apache-style license, which means that you’re free to get it and use it for commercial and non-commercial purposes (subject to some simple license conditions).
39
views