Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Analysis of Shamoon Virus

 

Rating :

 

Comments

 
  • 428Mach1
    428Mach1 at July 06,2015
    A great (and quick) introduction to the framework of Metasploit. I`d already bought the book. This video saves some time reading the intro. It seems like a powerful tool but I wonder if hacking a network and dropping a payload is as easy (or simple) as I infer it to be. Will watch subsequent videos to see how to do the (ethical) hacking. Anyone spent the $5,000 for the "V-* version" ?
  • araut
    araut at July 20,2015
    Just like any other videos from eli the computer guy, simple explanation of metasploit and key terms. This was more of a brief introduction to a metasploit .
  • jhilldog77
    jhilldog77 at September 17,2015
    When I hear about tools like Metasploit, I remind myself that computers do not infect themselves - they need a human to click on a file or make a mistake. Adobe Products including Flash, Internet Explorer and Windows OS present the most vulnerabilities on our computers today. LINUX or MAC OS anyone?
  • jhilldog77
    jhilldog77 at September 17,2015
    ..and JAVA! 3 billion devices run on JAVA, always keep it up to date (or don't use)
  • haygaff
    haygaff at September 17,2015
    This is my first video for Eli the Computer Guy. Pretty good. He pace of speech and explanation of terms and also how to use Metasploit is very clear..to the point. I can see how he could make an entire video series on this one tool. Maybe he should consider that concept. Take a tool and create several video series with deep details on how to use a tool. I do remember licenses and costs for tools being expensive. With 5K for each user each year, the free version will be what I practice or play around with for educational purposes. I also can appreciate that Metasploit is a framework.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved