Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #1 - Basic Software Cracking

 

Rating :

 

Comments

 
  • mjacob
    mjacob at May 10,2015
    Cool video. Samy Kambar is probably best known for his hack on MySpace back in 2005 where he used to worm to generate over a millon friends on his account.
  • pseagren
    pseagren at June 19,2015
    I enjoy watching videos from DEF CON as most of the guest speakers are very talented and present the information at a reasonable level that can be understood by most people. I really enjoyed the portion covering geolocation and how Google is capturing additional information that most people are not aware of. I believe that privacy is dying due to the growth of social media and technology as a whole. Similar to Google obtaining wifi data, a cellular phone that is simply turned on and not being used, is still trackable due to the fact that it needs to be able to send and retrieve communications, therefore it is always broadcasting information similar to that of a laptop or router. For more information pertaining to a free method of using geolocation of YOUR cell phone within a few miles, see the following link: https://www.youtube.com/watch?v=5JxIr8wVEnk (1:30 seconds into the video)
  • mrgodfrey3
    mrgodfrey3 at July 01,2015
    Until the good guys are as smart or smarter than the hackers then these exploits will continue to be, well, exploited. Great video. Now, what are the service providers doing about this?
  • araut
    araut at July 13,2015
    Networking, protocols, and OSI models might help start a career on cyber security. At advanced level of cyber security, knowledge of coding and programming is very important..
  • hanna88
    hanna88 at November 02,2015
    This guy is incredibly smart. He seems to be fluent in so many different areas of the cyber world--coding, networking, hacking, etc. It was nice that after he explains how to exploit something he offers suggestions on how to protect yourself from the issue--NAT pinning for example. The GeoLocation services stuff doesn't surprise me but now I won't look at that Google car the same way. The pattern in the tech world seems to be that with every new feature or offering, there is some negative side effect or infringement on privacy that comes with it.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved