1. Debian installation without X window In this video I want to show you how to install a debian system without a graphical user interface. You don’t have to do this on your own because it is only for one example for the display variable in the next lesson. But if you want to do […]
1. KDE, Gnome, Xfce, X11, XDMCP, VNC, Spice, RDP A graphical desktop is a combination of X Server, x Client, display Manager, window manager and other graphical elements and programs. If you come from the Windows world, you know that there is only one graphical desktop interface on linux. There are many different ones that […]
16. Malware Countermeasures 1 So now we’ve discussed different ways of cloaking the malware to get it into your system and different mechanisms for tricking people to do it. But let’s talk now about some countermeasures. There are a number of tools and really actions that can be performed to both detect and hopefully prevent […]
12. Executable Wrappers So the next thing we want to talk about are the various ways of getting somebody infected by a Trojan component. So I’m just going to create a little scenario here. The scenario I’m going to create is that the Remote Access Trojan comes naturally as a server. That’s the malicious code […]
8. Malware Capabilities Now, the next thing we want to talk about is malware capabilities and some of the things that malware might do. If it’s installed on your system, whether it’s known to you or perhaps not known to you, naturally it can give remote access to someone that you don’t even know that […]
5. Defining Malware: Spyware Now we get into more of a controversial type of malware known as spyware. And spyware actually appeared back in the late 1990s when several researchers, one that I can recall is Steve Gibson that actually looked at information being passed back to vendors. And he got to looking into it […]
1. Introduction to Malware and How The Internet Makes Money In this section we’ll talk about malware. We’ll start off by how the actual internet makes its money. We’ll define malware, Trojans and backdoors. We’ll define things like viruses and worms as well as spyware, loss prevention and other types of creepy things. We’ll discuss […]
23. RootKits – Frightening Demo Okay, so here we are back at our XP Attacker Machine. And the reason I’m using XP is because the root kit that I want to demonstrate for you, which is one of the very few GUI based rootkits only works with XP Service Pack One and below. And so, […]
21. Virtually Complete Secrecy, TOR Okay, we finished up talking about something referred to as anonymity. Now we’re going to talk about something referred to as anonymous and secure. And the utility I’m talking about is called Tor. Now, Tor stands for the onion router because it has many different layers. As a matter of […]
19. Anonymizers – JAP Okay guys, the next thing we’re going to talk about is a free tool called Jap that gives us Internet anonymity. It does not offer any encryption and I’m going to go ahead and move right into the demo on this. Now while we’re right here and available, I want to […]