Exploiting Online Games: Cheating massively distributed systems
|
|
|
- Rodger Bradley
- 9 years ago
- Views:
Transcription
1 Exploiting Online Games: Cheating massively distributed systems Gary McGraw, Ph.D. CTO, Cigital
2 Cigital Founded in 1992 to provide software security and software quality professional services Recognized experts in software security and software quality Widely published in books, white papers, and articles Industry thought leaders Consultants to EA
3 Disclaimer In our research for this book and this presentation we have broken no laws. We expect our readers likewise not to break the law using the techniques we describe.
4 Why online games?
5 Online games are a bellwether Online games (like World of Warcraft) have up to 900,000 simultaneous users on six continents 10,000,000 people subscribe to WoW 16,000,000+ play MMORPGs Clients and servers are massively distributed Time and state errors are rampant MMORPGs push the limits of software technology Modern distributed systems in other domains are evolving toward similar models SOA, Web 2.0 Time and state errors are the XSS of tomorrow
6
7 Online games are big business One game (WoW) has over 10,000,000 subscribers $14 * 10M = 140M * 12 = $1.68B (not to mention buying the client) A healthy middle market exists for pretend stuff Cheating pays off
8 Why pick on World of Warcraft?
9 1995 Dan Farmer fired from Silicon Graphics for releasing SATAN with Wietse Venema FUD: possible attack tool! Isn t this exploit discussion bad? Fall 2004 John Aycock at University of Calgary publicly criticized for malware course FUD: possible bad guy factory 2009 Any system administrator not using a port scanner to check security posture runs the risk of being fired Should we talk about attacking systems?
10 The good news and the bad news Good news The world loves to talk about how stuff breaks This kind of work sparks lots of interest in computer security Bad news The world would rather not focus on how to build stuff that does not break It s harder to build good stuff than to break junky stuff
11 Lawyers, guns, and money
12 Lawyers Game law is set up to counter piracy (not cheating) Cracking a game costs game companies big money Security mechanisms protect against cracking Online components answered this problem wholly The DMCA is now being used to counter cheating as well End User License Agreements (EULAs) and Terms of Use (TOU) lay out license obligations WoW Glider case Ginko Financial disappears Click to agree
13 Egregious EULAs Sony s EULA allows installation of a rootkit on your machine Blizzard s EULA allows monitoring The Warden Microsoft s Frontpage disallows negative comments about Microsoft EULAs for viruses allow (legal) propagation! The Governor Apple s EULA never dies Spyware or security mechanism? Gator s EULA disallows removal of the software
14 Guns
15 Money Exchange rates exist between in-game currency and real money Per capita GDP in some MMO worlds is greater than the per capita GDP of some real countries Economists study game economies Microsoft reports that the market in 2005 was over $6B DFC says the market will double to $12B by 2010 Secondary markets are also thriving In 10/2005 a player paid $100,000 for virtual stuff (an Asteroid Space Resort in Project Entropia) IGE has over 420 employees and project a $7B market by 2009 Connections to thottbot (for better sweat shop work) Chinese sweat shops make economic sense Second Life is set up as a market in virtual stuff (and players own their creations)
16 In China, over a half-million people farm MMO games Some sleep on cots near the computers and work in shifts People choose this job. It can be better than working on your dad s state-owned farm Almost anyone can get this job, even unskilled labor It s easier than making shoes!
17 Bugs, bots, and kung fu
18 Two kinds of cheating Exploits - actual game bugs, which are exploited to Teleport Duplicate items or gold See stuff you re not supposed to see Bots Both AFK and non-afk Only performing legal inputs, but in an automated fashion
19 Botting Botting happens because Grinding is really boring Players are farming Running the game to farm a resource, possibly running multiple accounts at once Farming bots are common Aimbots are a different story FPS hacks PvP combat bots help too For use in RPG combat How botting happens MACRO s & Scripts (most common) Memory read & write DLL Injection Debugging
20 Inject keystrokes and mouse movement Sample pixels and read memory locations Take over the GUI Must dedicate the computer to this Error prone Screen and controls must be preconfigured exactly as required ACTool, AutoHotKey, AutoIt3.0, LTool-0.3, xautomation Example: WoW_Agro Macro (in chapter 2) MACROs
21
22 Read & Write memory data Coordinates Speed Direction Use with a MACRO Read data directly (instead of sampling pixels) Build fresh sploits Map hacks Teleporting Speed hacks Process manipulation
23 Thread hijacking Hijack main system thread Eliminates thread safety issues Call internal functions within game client directly Minimize the game program Runs itself Doesn t have errors in sampling Eliminates need for MACRO altogether
24 Thread hijacking Used in a few WoW botting programs WoW.EXE MAIN THREAD INJECTED DLL RenderWorld(..) DETOUR PATCH Loops hundreds of times per second
25 Techniques for cheating Over the game (control the GUI) keystrokes mouse dropping pixel sampling In the game (manipulating objects) memory manipulation finding objects (automatically) Under the game 3D teleporting DLL injection be the graphics card Outside the game sniffing crypto cracking kernel fu
26 Total conversion and mod ing Replace graphics with new graphics Replace client logic
27 Advanced game hacking fu See Hacking World of Warcraft: An exercise in advanced rootkit development Greg Hoglund s presentation from Black Hat GregSlidesWoWHack.rar
28 State of the art Combine injected payload with cloaking and thread hijacking to FORCE in-game events Spell casting Movement Chat Acquire and clear targets Loot inventory
29 super MAIN THREAD RenderWorld(..) HARDWARE BP uncloak INJECTED CODE PAGE MAIN THREAD branch CastSpellByID(.. ) ScriptExecute(.. ) ClearTarget(.. ) complete MSG MAIN THREAD RenderWorld(..) restore recloak
30 Classic arms race
31 Breaking stuff is important Learning how to think like an attacker is essential Do not shy away from discussing attacks Engineers learn from stories of failure Attacking class projects is also useful!
32 Solving the problem: Software Security
33 Three pillars of software security Risk management framework Touchpoints Knowledge
34 Software security touchpoints
35 Using BSIMM BSIMM released March 2009 under creative commons steal the data if you want BSIMM is a yardstick Use it to see where you stand Use it to figure out what your peers do BSIMM is growing More BSIMM victims (9+17 and counting) BSIMM Europe BSIMM Begin Statistics Correlations
36 Where to Learn More
37 informit & Justice League No-nonsense monthly security column by Gary McGraw In-depth thought leadership blog from the Cigital Principals Scott Matsumoto Gary McGraw Sammy Migues Craig Miller John Steven
38 IEEE Security & Privacy Magazine + 2 Podcasts Building Security In Software Security Best Practices column edited by John Steven
39 Exploiting Online Games: the book Cheating massively distributed systems Sploits, hacks, mods Key lessons for other software Part of the Addison-Wesley Software Security Series AVAILABLE NOW
40 Cigital s Software Security Group invents and delivers software security See the Addison-Wesley Software Security series Send [email protected] For more If we're going to improve our security practices, frank discussions like the ones in this book are the only way forward. -Ed Felten Princeton
Attack Trends 2011. software security? Gary McGraw, Ph.D. Chief Technology Officer, Cigital. 2011 Cigital
Attack Trends 2011 -orwhy software security? Gary McGraw, Ph.D. Chief Technology Officer, Cigital Cigital n n Founded in 1992 to provide software security and software quality professional services Recognized
Cyber Security: Software Risk Management for Utilities
Cyber Security: Software Risk Management for Utilities Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized
Software Security Touchpoint: Architectural Risk Analysis
Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized
Scaling a Software Security Initiative: Lessons from the BSIMM
Scaling a Software Security Initiative: Lessons from the BSIMM GARY MCGRAW, PH.D. SEPTEMBER 29, 2014 @cigitalgem Gary McGraw, PH.D. Chief Technology Officer, Cigital Email: [email protected] Cigital Providing
Royal Holloway University of London
Cheating and Virtual Crimes in Massively Multiplayer Online Games Rahul Joshi Technical Report RHUL-MA-2008-06 15 January 2008 Royal Holloway University of London Department of Mathematics Roal Holloway,
Software Security Testing: Seeking security in an insecure world
Software Security Testing: Seeking security in an insecure world Gary McGraw, Ph.D. CTO, Cigital http://www.cigital.com Software security is getting harder The Trinity of Trouble Connectivity The Internet
Malware: Malicious Code
Malware: Malicious Code UIC 594/Kent Law: Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations 2007, 2008 Robert H. Sloan Malicious code: Viruses Most famous type of
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Operating System Security
Operating System Security Klaus Schütz Windows OS Security Microsoft Redmond Before I start My VP love(d) me A frustrated friend 1 Agenda Evolution of Threats Client vs. Server Security Operating System
Viruses, Worms, and Trojan Horses
Viruses, Worms, and Trojan Horses Be a Power Reader Make Personal Connections As you read this article, think to yourself, How can I apply this knowledge? How will what I m learning be useful to me? You
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
Automated Software Testing by: Eli Janssen
1. What is automated testing? Automated Software Testing by: Eli Janssen Automated testing is, much like the name implies, getting the computer to do the remedial work of ensuring that inputs yield expected
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
7 Reasons Why Your Business Should Adopt ACT365
7 Reasons Why Your Business Should Adopt ACT365 By David Moran ACA ACT Marketing Director Introduction The past ten years have seen companies moving online for services like email, payroll, accounting
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
From Lab to Factory: The Big Data Management Workbook
Executive Summary From Lab to Factory: The Big Data Management Workbook How to Operationalize Big Data Experiments in a Repeatable Way and Avoid Failures Executive Summary Businesses looking to uncover
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Social Media Tips for Small Businesses
Social Media Tips for Small Businesses By Jenn Renner, Marketing & Distribution Manager, Gold Pages Publishing, Inc. When it comes to Social Media Marketing, now is the time to up your game. Here s a few
These Retail Specific Programs Are Guaranteed To Be A Hit With Your Group!
These Retail Specific Programs Are Guaranteed To Be A Hit With Your Group! NEW! Marketing Program: Power Promotions - Drive More Traffic, Build Customer Loyalty and Make More Money With Promotions and
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
TesT AuTomATion Best Practices
Test Automation Best Pr actices 2 Which test Cases should be automated? A test case or use case scenario is a simulated situation in which a user performs determinate actions when using a particular app.
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Demand, Supply, and Market Equilibrium
3 Demand, Supply, and Market Equilibrium The price of vanilla is bouncing. A kilogram (2.2 pounds) of vanilla beans sold for $50 in 2000, but by 2003 the price had risen to $500 per kilogram. The price
PRODUCTION. 1The Surplus
1The Surplus 2 The US economy produces an amazing number of different products: thousands of different foods, countless movies, dozens of different type cars, hundreds of entertainment products, dozens
10 reasons why you need social science
10 reasons why you need social science We know that Britain s social scientists are world leaders in their fields, but why do we need them? And if they weren t around to analyse what s going on, would
Currency and Exchange Rates
Grade Five Currency and Exchange Rates Overview Students share the book The Story of Money, by Betsy Maestro, to learn about exchange and barter, the functions of money, currency, and spending money. Students
Saving Money. Grade One. Overview. Prerequisite Skills. Lesson Objectives. Materials List
Grade One Saving Money Overview Students share the book A Chair for My Mother, by Vera B. Williams, to learn about counting and saving money. They complete worksheets on coin counting and saving. Prerequisite
Netsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826-5222 F: +1 (519) 826-5228 Netsweeper Whitepaper The Evolution of Web Security June 2010
Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 [email protected]
Why Your Business Needs a Website: Ten Reasons Contact Us: 727.542.3592 [email protected] Reason 1: Does Your Competition Have a Website? As the owner of a small business, you understand
Introduction to Penetration Testing Graham Weston
Introduction to Penetration Testing Graham Weston March 2014 Agenda Introduction and background Why do penetration testing? Aims and objectives Approaches Types of penetration test What can be penetration
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Chapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 1 Basic Introduction to Computers Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define
AR State PIRC/ Center for Effective Parenting
Helping Young Children Learn to Read What Parents Can Do Reading is one of the basic building blocks for your child s learning and school success. It is a skill on which most other learning is built. Children
White Paper - Crypto Virus. A guide to protecting your IT
White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra
Student Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Korea s experience of massive DDoS attacks from Botnet
Korea s experience of massive DDoS attacks from Botnet April 12, 2011 Heung Youl YOUM Ph.D. SoonChunHyang University, Korea President, KIISC, Korea Vice-chairman, ITU-T SG 17 1 Table of Contents Overview
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Topic 1 Lesson 1: Importance of network security
Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you
THE LITTLE BIG BOOK OF BADNESS
THE LITTLE BIG BOOK OF BADNESS How to stay safe on the Internet a guidebook for students and parents USE THIS BOOK TO FIND OUT HOW YOU AND YOUR COMPUTER CAN STAY AWAY FROM BAD THINGS 2 CONTENTS Why you
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.
2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program. Entry Name HFA Submission Contact Phone Email Qualified Entries must be received by
Massive multiplayer online games
Server-Side Bot Detection in Massive Multiplayer Online Games One of the greatest threats that massive multiplayer online games face today is a form of cheating called botting. The authors propose an automated
Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?
LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams
Barter vs. Money. Grade One. Overview. Prerequisite Skills. Lesson Objectives. Materials List
Grade One Barter vs. Money Overview Students share the book Sheep in a Shop, by Nancy Shaw, to learn about choice, making decisions, trade, and the barter system. They complete worksheets on comparing
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
Lessons Learned in Software Testing
Lessons Learned in Software Testing An excellent book covering a range of testing topics Practical rather than academic In the next few lectures, we ll discuss some of the key lessons from this book, and
LESSON 1 BEING A HACKER
LESSON 1 BEING A HACKER License for Use Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool
Introduction: 1. Daily 360 Website Scanning for Malware
Introduction: SiteLock scans your website to find and fix any existing malware and vulnerabilities followed by using the protective TrueShield firewall to keep the harmful traffic away for good. Moreover
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
GOD S BIG STORY Week 1: Creation God Saw That It Was Good 1. LEADER PREPARATION
This includes: 1. Leader Preparation 2. Lesson Guide GOD S BIG STORY Week 1: Creation God Saw That It Was Good 1. LEADER PREPARATION LESSON OVERVIEW Exploring the first two chapters of Genesis provides
Ten Ways Small Businesses Can Minimize Computer Headaches And Lower Their IT Costs Without Sacrificing Performance
Ten Ways Small Businesses Can Minimize Computer Headaches And Lower Their IT Costs Without Sacrificing Performance Introduction Small businesses have unique needs and constraints that they must consider
Dedicated server executable Log file of this server. (Located in your Windows user folder)
WORLD IN CONFLICT DEDICATED SERVER MANUAL By AE Massive Entertainment Version 1.1 Last update MARCH 26, 2008 FILE REFERENCE Files relevant for use of the dedicated server: wic_ds.exe wic_ds_debugx.txt
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
The Economics of. Software as a Service (SaaS) VS. Software as a Product. By Scott Sehlhorst
The Economics of Software as a Service (SaaS) VS. Software as a Product By Scott Sehlhorst There are numerous ways of selling software these days. Software as a Service (SaaS) has been in the consumer
Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.
Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Our aim is to address the students apprehensions and anxieties regarding their career prospects in Ethical
Easy Casino Profits. Congratulations!!
Easy Casino Profits The Easy Way To Beat The Online Casinos Everytime! www.easycasinoprofits.com Disclaimer The authors of this ebook do not promote illegal, underage gambling or gambling to those living
Evaluating the Perceptions of People towards Online Security
Section 2 Information Systems Security & Web Technologies and Security Evaluating the Perceptions of People towards Online Security Abstract N.K.Jayakumar and A.D.Phippen Network Research Group, University
Click on a link below for additional information.
Click on a link below for additional information. WHAT IS A BARBIE GIRL DEVICE? HOW DO I CONNECT HER?... 3 HOW MANY DIFFERENT BARBIE GIRL DEVICES ARE THERE?... 3 ONCE I REGISTER MY BARBIE GIRL DEVICE ONLINE,
Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.
Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion
Topic 4: Different approaches to GDP
Topic 4: Different approaches to GDP PRINCIPLES OF MACROECONOMICS Dr. Fidel Gonzalez Department of Economics and Intl. Business Sam Houston State University Three different approaches to measure the GDP
Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions
Attack Intelligence Research Center Monthly Threat Report MalWeb Evolution and Predictions A l a d d i n. c o m / e S a f e Overview Web security has been struggling for a long time with its own definition.
Technical Description Web Security Contest
Technical Description Web Security Contest 1 P a g e Table of Contents 1. INTRODUCTION... 3 2. COMPETENCY SPECIFICATION... 3 3. OBJECTIVES... 4 4. RULES & REGULATIONS... 4 4.1. Teams... 4 4.2. Competition...
7 AGGREGATE SUPPLY AND AGGREGATE DEMAND* Chapter. Key Concepts
Chapter 7 AGGREGATE SUPPLY AND AGGREGATE DEMAND* Key Concepts Aggregate Supply The aggregate production function shows that the quantity of real GDP (Y ) supplied depends on the quantity of labor (L ),
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Ubuntu Linux Reza Ghaffaripour May 2008
Ubuntu Linux Reza Ghaffaripour May 2008 Table of Contents What is Ubuntu... 3 How to get Ubuntu... 3 Ubuntu Features... 3 Linux Advantages... 4 Cost... 4 Security... 4 Choice... 4 Software... 4 Hardware...
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Banquet with Simon. (Luke 7:36-50) Keep these tips in mind as you welcome kids to the workshop and explore the story together.
BIBLE SKILLS & GAMES LEADER GUIDE Banquet with Simon (Luke 7:36-50) Lower Elementary Workshop Focus: Big or small Jesus forgives it all! Keep these tips in mind as you welcome kids to the workshop and
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
x64 Servers: Do you want 64 or 32 bit apps with that server?
TMurgent Technologies x64 Servers: Do you want 64 or 32 bit apps with that server? White Paper by Tim Mangan TMurgent Technologies February, 2006 Introduction New servers based on what is generally called
A Study on the Security aspects of Network System Using Penetration Testing
A Study on the Security aspects of Network System Using Penetration Testing 1 Shwetabh Suman, 2 Vedant Rastogi 1,2 Institute of Engineering and Technology, Alwar, India 1 [email protected] 2 [email protected]
Software, Shareware and Opensource CSCU9B2
Software, Shareware and Opensource CSCU9B2 1 Contents Commercial software vs Freeware vs Open Source software Licences GNU GPL Open source Common software examples Sources, Safety and Risks 2 Pay, Try,
You are granted free resale rights of this ebook. You can resell this ebook for as
You are granted free resale rights of this ebook. You can resell this ebook for as much as you want and keep 100% of the profits! You can also give it away to as many people as you wish. The only restriction
Locked Shields 2013. Kaur Kasak 24 Sept 2013
Locked Shields 2013 Kaur Kasak 24 Sept 2013 Disclaimer: This briefing is a product of the CCD COE. It does not represent the opinions or policies of NATO and is designed to provide an independent position.
hp calculators HP 17bII+ Net Present Value and Internal Rate of Return Cash Flow Zero A Series of Cash Flows What Net Present Value Is
HP 17bII+ Net Present Value and Internal Rate of Return Cash Flow Zero A Series of Cash Flows What Net Present Value Is Present Value and Net Present Value Getting the Present Value And Now For the Internal
