Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Defining Cyberwar

 

Rating :

 

Comments

 
  • pneyzari
    pneyzari at March 05,2017
    A student prior mentioned that before it was about being a good programmer, but now noting the fact that these tools are not only easily accessible, but also plentiful, means that anyone, anywhere, can download and apply should they wish to do so. On top of that, this video itself is the perfect example of how websites such as YouTube can provide tutorials on how to use these tools, so anyone can learn with just a little bit of desire.
  • pneyzari
    pneyzari at March 05,2017
    A student prior mentioned that before it was about being a good programmer, but now noting the fact that these tools are not only easily accessible, but also plentiful, means that anyone, anywhere, can download and apply should they wish to do so. On top of that, this video itself is the perfect example of how websites such as YouTube can provide tutorials on how to use these tools, so anyone can learn with just a little bit of desire.
  • pneyzari
    pneyzari at March 05,2017
    A student prior mentioned that before it was about being a good programmer, but now noting the fact that these tools are not only easily accessible, but also plentiful, means that anyone, anywhere, can download and apply should they wish to do so. On top of that, this video itself is the perfect example of how websites such as YouTube can provide tutorials on how to use these tools, so anyone can learn with just a little bit of desire.
  • bschmid5
    bschmid5 at April 20,2017
    First, the term APT is an acronym for Advanced Persistent Threat (APT) operators. The video does not discuss just who, or what, APT1 happens to be; but, a quick internet search finds that APT1 is a single organization of operators that has conducted a cyber espionage campaign against a broad range of victims since at least 2006. I found a few things interesting regarding the video. Unless the hacker was actually recording his own actions, his system must have been compromised by some law enforcement or cybersecurity organization for them to have been able to record the hackers actions. I also noticed that the hacker was running a Windows XP system. Microsoft support for Windows XP ended in 2014. There is no date associated with this video, but I am surprised to see a Chinese hacker using an OS which is no longer being patched as a platform for their own illicit activities. Finally, the last video segment discusses the hacker retrieving a RAR file from a remote system, but the file name was “all.jpg” which is an attempt at hiding the nature of the file by using a different file extension than .rar – something which was discussed during the class lectures.
  • sstumvoll
    sstumvoll at April 23,2017
    These short videos demonstrate how the hackers are so familiar with the systems that it is second nature to them. The presentation moved very fast so it was difficult to grasp exactly how they operate. But a good presentation on how easy it is for them to use good tools in a bad way.
    • «
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved