Torrent Info
Title [FreeCourseLab.com] Udemy - The Complete Cyber Security Course End Point Protection!
Category
Size 2.95GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[FreeCourseLab.com].url 126B
1.1 Nathan's Twitter @GotoNathan.html 91B
1.2 Cyber Security Newsletter.html 111B
1.3 Nathan's Blog.html 99B
1. BONUS DISCOUNT COUPONS .html 4.97KB
1. Congratulations!!.mp4 4.30MB
1. Congratulations!!.vtt 662B
1. Goals and Learning Objectives.mp4 6.50MB
1. Goals and Learning Objectives.mp4 9.50MB
1. Goals and Learning Objectives.mp4 2.82MB
1. Goals and Learning Objectives.mp4 7.20MB
1. Goals and Learning Objectives.mp4 5.62MB
1. Goals and Learning Objectives.mp4 5.09MB
1. Goals and Learning Objectives.mp4 5.79MB
1. Goals and Learning Objectives.mp4 7.16MB
1. Goals and Learning Objectives.mp4 7.20MB
1. Goals and Learning Objectives.mp4 7.18MB
1. Goals and Learning Objectives.vtt 782B
1. Goals and Learning Objectives.vtt 1.10KB
1. Goals and Learning Objectives.vtt 350B
1. Goals and Learning Objectives.vtt 837B
1. Goals and Learning Objectives.vtt 770B
1. Goals and Learning Objectives.vtt 671B
1. Goals and Learning Objectives.vtt 795B
1. Goals and Learning Objectives.vtt 920B
1. Goals and Learning Objectives.vtt 939B
1. Goals and Learning Objectives.vtt 861B
1. Welcome to Volume 4.mp4 7.20MB
1. Welcome to Volume 4.vtt 882B
1. What is End Point Protection and why is it important.mp4 34.32MB
1. What is End Point Protection and why is it important.vtt 5.84KB
10.10 Astra Linux - Russian Linux-based secure operating system.html 102B
10.10 JPEG & PNG Strippe.html 117B
10.11 BatchPurifier™.html 112B
10.11 Debian - Good general use OS with a security focus..html 84B
10.12 Doc Scrubber Analyze and scrub hidden and potentially embarrassing data in Word documents..html 105B
10.12 Security-focused operating system From Wikipedia (Most are dead).html 124B
10.13 OpenBSD - Good general use OS with a security focus..html 85B
10.14 Mempo - Looks interesting but nothing happening.html 134B
10.1 Autorunsc - the command-line version of Autoruns.html 123B
10.1 BestCrypt Volume Encryption.html 136B
10.1 ExifTool can Read, Write andor Create files in the following formats.html 116B
10.1 HitmanPro.Alert - Exploit Test Tool Manual.html 118B
10.1 httpsen.wikipedia.orgwikiComparison_of_VoIP_software.html 118B
10.1 httpsossec.github.io.html 85B
10.1 httpswww.intego.commac-security-blogtopicxprotect.html 117B
10.1 Tails - For security, privacy and anonymity. Protection from local forensics..html 84B
10.1 Using OpenPGP subkeys in Debian development.html 92B
10.2 Anatomy of a GPG Key.html 126B
10.2 Autoruns.html 123B
10.2 ExifTool by Phil Harvey.html 107B
10.2 httpsossec.github.iodownloads.html.html 101B
10.2 httpsring.cx.html 77B
10.2 httpsvirustotal.github.ioyara.html 95B
10.2 Palo Alto Traps.html 125B
10.2 Parrot Security OS - Security GNULinux distribution designed with cloud pentesting and IoT security in mind..html 87B
10.2 Symantec Drive Encryption.html 131B
10.3 Are you sure you want to open it alert (File Quarantine Known Malware Detection) in OS X.html 101B
10.3 Configure a Script to Run Once When a New User Logs On.html 121B
10.3 HitmanPro.Alert.html 93B
10.3 httpsgpgtools.org.html 82B
10.3 httpstox.chat.html 78B
10.3 httpswww.ciphershed.org.html 88B
10.3 MAT Metadata Anonymisation Toolkit.html 82B
10.3 Trisquel OS.html 104B
10.4 Hidden Data Detector™.html 119B
10.4 httpsdiskcryptor.net.html 99B
10.4 httpswww.malwarebytes.organtiexploit.html 102B
10.4 Improve the Security of Your OpenPGP Key by Using Subkeys.html 109B
10.4 Qubes OS - Security through isolation and compartmentalization implemented using virtualization.html 86B
10.5 Comparison of disk encryption software From Wikipedia.html 129B
10.5 CREATING THE PERFECT GPG KEYPAIR.html 116B
10.5 Exiv2 is a C++ library and a command line utility to manage image metadata..html 83B
10.5 httpforums.sandboxie.comphpBB3viewtopic.phpf=17&t=19132&start=30#p110120.html 139B
10.5 Subgraph OS - Security, privacy and anonymity..html 100B
10.6 Arch Linux - Good general use OS with a security focus..html 87B
10.6 pdfparanoia.html 99B
10.7 httpwww.verexif.comen.html 87B
10.7 Whonix workstation and gateway. A focus on anonymity and preventing leaks out of the Tor network..html 84B
10.8 ImageOptim.html 84B
10.8 Whonix OS + Qubes OS - security through isolation and compartmentalization. Privacy and anonymity..html 94B
10.9 Hardened Gentoo Linux - With grsecurity and PaX.html 106B
10.9 httpswww.toolsrepo.comprivacyremove-exif-from-image-files.html 123B
10. Host-Based Intrusion Detection - OSSEC.mp4 17.69MB
10. Host-Based Intrusion Detection - OSSEC.vtt 5.53KB
10. Improving OpenPGP Security - Primary and Subkeys - Part 2.mp4 28.70MB
10. Improving OpenPGP Security - Primary and Subkeys - Part 2.vtt 10.51KB
10. Mac - XProtect.mp4 13.50MB
10. Mac - XProtect.vtt 3.33KB
10. Scrubbing EXIF & Metadata Part 2 - Tools.mp4 20.44MB
10. Scrubbing EXIF & Metadata Part 2 - Tools.vtt 6.03KB
10. Security Focused Operating Systems.mp4 9.85MB
10. Security Focused Operating Systems.vtt 5.62KB
10. Video and Voice Messengers - Other.mp4 2.63MB
10. Video and Voice Messengers - Other.vtt 1.19KB
10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4 6.76MB
10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.vtt 3.57KB
10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.mp4 11.24MB
10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.vtt 79.95MB
10. Windows - Malware Seek & Destroy - Autoruns.mp4 48.30MB
10. Windows - Malware Seek & Destroy - Autoruns.vtt 11.31KB
11.1 Device Guard deployment guide.html 131B
11.1 How to Remove The Hidden Personal Information Microsoft Office Adds to Your Documents.html 179B
11.1 httpbammv.github.iosguilindex.html.html 100B
11.1 Malwarebytes for Mac.html 94B
11.1 Processmonitor.html 124B
11.1 Using GPG with Smart Cards.html 113B
11.1 VeraCrypt - Beginner's Tutorial.html 130B
11.2 Burp proxy.html 100B
11.2 How to turn off geotagging for photos iphone ipad.html 133B
11.2 IOMMU A Detailed view.html 164B
11.2 Patrick Wardle, Synack How to practically create elegant, bad@ss OS X malware..html 104B
11.2 Smartcard The OpenPGP card.html 91B
11.3 httpsdevelopers.yubico.comyubikey-neo-managerReleases.html 120B
11.3 httpswww.intego.com.html 84B
11.3 httpwww.xplico.org.html 83B
11.3 Microsoft future security strategy - black hat talk.html 158B
11.3 The views of Iraq you weren’t supposed to see.html 108B
11.4 Device Guard and Credential Guard hardware readiness tool.html 123B
11.4 History of Mac Malware.html 123B
11.4 httpshop.kernelconcepts.de.html 91B
11.4 ImageMagick®.html 104B
11.4 OWASP Zed Attack Proxy Project.html 123B
11.5 How To Turn off Geotagging in Android.html 121B
11.5 httpsmitmproxy.org.html 83B
11.5 httpwww.thesafemac.com.html 87B
11.5 What's new in Windows 10, versions 1507 and 1511.html 131B
11.5 YUBIKEY NEO AND OPENPGP.html 112B
11.6 httpswww.av-comparatives.orgwp-contentuploads201607avc_mac_2016_en.pdf --- NEW version.html 139B
11.6 httpwww.netresec.compage=NetworkMiner.html 103B
11. Improving OpenPGP Security - SmartcardsYubikey - Part 3.mp4 22.15MB
11. Improving OpenPGP Security - SmartcardsYubikey - Part 3.vtt 8.42KB
11. Mac - The Best of Anti-Virus and End-Point-Protection.mp4 6.52MB
11. Mac - The Best of Anti-Virus and End-Point-Protection.vtt 2.80KB
11. Monitoring for Security Drift.mp4 2.55MB
11. Monitoring for Security Drift.vtt 1.37KB
11. Network Analysis - Sguil, Xplico & NetworkMiner.mp4 8.86MB
11. Network Analysis - Sguil, Xplico & NetworkMiner.vtt 3.41KB
11. Scrubbing EXIF & Metadata Part 3 - Guidance.mp4 8.41MB
11. Scrubbing EXIF & Metadata Part 3 - Guidance.vtt 5.26KB
11. Windows, Mac & Linux - Setting up VeraCrypt.mp4 29.81MB
11. Windows, Mac & Linux - Setting up VeraCrypt.vtt 12.10KB
11. Windows 10 - Device Guard.mp4 27.85MB
11. Windows 10 - Device Guard.vtt 12.02KB
11. Windows - Malware Seek & Destroy - Process Monitor.mp4 76.21MB
11. Windows - Malware Seek & Destroy - Process Monitor.vtt 10.82KB
12.1 Email Privacy Tester.html 92B
12.1 httpsrootkit.nlprojectsrootkit_hunter.html.html 108B
12.1 httpwww.cyanogenmod.org.html 89B
12.1 httpwww.unhide-forensics.info.html 94B
12.1 Use FileVault to encrypt the startup disk on your Mac - Apple.html 101B
12.1 Windows Defender Application Guard for Microsoft Edge.html 104B
12.1 Windows FIMS.html 124B
12.2 #BadWinmail Demo.html 121B
12.2 Afick - httpafick.sourceforge.net.html 90B
12.2 httpswhois.domaintools.com.html 90B
12.2 httpwww.clamav.net.html 83B
12.2 Introducing Windows Defender Application Guard for Microsoft Edge.html 161B
12.2 ObscuraCam Secure Smart Camera.html 106B
12.2 OS X Security and Privacy Guide - full disk encryption.html 138B
12.3 Associating cameras with users and objects in a social networking system US 20150124107 A1.html 105B
12.3 httpwww.chkrootkit.org.html 87B
12.3 Report - Infiltrate the Vault Security Analysis and Decryption of Lion Full Disk Encryption.html 97B
12.3 Samhain - httpwww.la-samhna.desamhain.html 93B
12.3 Thunderbird - Remote Content in Messages.html 124B
12.4 Camera Fingerprint - Matlab implementation.html 115B
12.4 Fight Spam and Protect Your Privacy by Disabling Remote Content in Apple Mail.html 122B
12.4 Osiris - httpslaunchpad.netosiris.html 89B
12.4 Report - Linux Security Review.html 140B
12.5 #BadWinmail The Enterprise Killer Attack Vector in Microsoft Outlook.html 149B
12.5 AIDE (Advanced Intrusion Detection Environment) - httpaide.sourceforge.net -.html 91B
12.5 Linux malware From Wikipedia.html 104B
12.5 Paper - Sensor Noise Camera Identification Countering Counter-Forensics.html 118B
12.6 ADaudit.html 160B
12.6 httpswww.rfxn.comprojectslinux-malware-detect.html 112B
12.7 What to include in FIM.html 121B
12.8 Solar Winds.html 119B
12. Email Tracking & Exploits.mp4 26.77MB
12. Email Tracking & Exploits.vtt 10.90KB
12. File Integrity Monitoring (FIM) and Checking Part 1.mp4 7.75MB
12. File Integrity Monitoring (FIM) and Checking Part 1.vtt 3.59KB
12. Linux - The Best of Anti-Virus and End-Point-Protection.mp4 6.17MB
12. Linux - The Best of Anti-Virus and End-Point-Protection.vtt 3.02KB
12. Mac - Filevault2.mp4 13.17MB
12. Mac - Filevault2.vtt 2.81KB
12. Sensor Noise Camera Identification.mp4 9.01MB
12. Sensor Noise Camera Identification.vtt 4.91KB
12. Windows - Defender Application Guard for Microsoft Edge.mp4 9.08MB
12. Windows - Defender Application Guard for Microsoft Edge.vtt 2.79KB
12. Windows - Malware Seek & Destroy - Network Connections.mp4 23.96MB
12. Windows - Malware Seek & Destroy - Network Connections.vtt 9.43KB
13.10 httpwww.mytrashmail.com.html 88B
13.11 httpsmailinator.com.html 84B
13.1 httpscisofy.comlynis.html 86B
13.1 httpwww.dispostable.com.html 88B
13.1 networx.html 106B
13.1 Startup key combinations for Mac.html 101B
13.1 virustotal.com email-submissions.html 123B
13.2 Apple Technical White Paper - Best Practices for Deploying FileVault 2.html 108B
13.2 httpseljefe.immunityinc.com.html 92B
13.2 httpswww.guerrillamail.com.html 92B
13.2 httpvirscan.org.html 80B
13.3 DeepSleep - Hibernate your Mac.html 97B
13.3 httpswww.herdprotect.comdownloads.aspx.html 103B
13.3 httpwww.tempinbox.com.html 85B
13.3 Tripwire Open Source vs OSSEC Which Is Right For You.html 147B
13.4 httpsvirusscan.jotti.org.html 89B
13.4 httpswww.trash-mail.comen.html 91B
13.4 httpswww.tripwire.com.html 86B
13.4 Report - Infiltrate the Vault Security Analysis and Decryption of Lion Full Disk Encryption.html 97B
13.5 httpsanonbox.net.html 81B
13.5 httpslinux-audit.com.html 85B
13.5 httpswww.metascan-online.com#!scan-file.html 105B
13.5 Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9.html 123B
13.6 httpgetairmail.com.html 83B
13.6 httpsalternativeto.netsoftwarevirustotal.html 107B
13.6 httpsgithub.comTripwiretripwire-open-source.html 109B
13.6 pmset -- manipulate power management settings - Man Page.html 158B
13.7 How To Use Tripwire to Detect Server Intrusions on an Ubuntu VPS.html 174B
13.7 httpwww.surfright.nlenhitmanpro.html 97B
13.7 Send Anonymous Emails 20 Sites To Keep Your Identity Hidden.html 116B
13.8 httpdontmail.net.html 81B
13.8 httpswww.eset.comusonline-scanner.html 100B
13.9 httpwww.migmail.net.html 84B
13.9 httpwww.threattracksecurity.comresourcessandbox-malware-analysis.aspx.html 135B
13. Email Anonymity & Pseudonymity.mp4 15.90MB
13. Email Anonymity & Pseudonymity.vtt 6.59KB
13. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe.mp4 6.26MB
13. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe.vtt 3.10KB
13. Linux - Access Control Models.mp4 13.35MB
13. Linux - Access Control Models.vtt 7.90KB
13. Mac - Setting up Filevault2.mp4 19.73MB
13. Mac - Setting up Filevault2.vtt 8.82KB
13. Malware Seek & Destroy - Networkx.mp4 5.42MB
13. Malware Seek & Destroy - Networkx.vtt 2.67KB
13. Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4 9.96MB
13. Online and Second Opinion - Anti-Virus and End-Point-Protection.vtt 3.23KB
14.1 AppArmor How To Use.html 102B
14.1 httpsaddons.mozilla.orgen-usthunderbirdaddontorbirdy.html 121B
14.1 httpssourceforge.netprojectsnstsource=recommended.html 117B
14.1 httpwww.sysdig.org.html 82B
14.1 Two factor authentication with Yubikey for harddisk encryption with LUKS.html 167B
14.1 Zero-day vulnerabilities reportedly found in Kaspersky and FireEye security products.html 135B
14.2 AppArmor From Wikipedia.html 99B
14.2 httpnst.sourceforge.netnst.html 92B
14.2 httpstrac.torproject.orgprojectstorwikitorbirdy.html 115B
14.2 Sysdig User Guide.html 116B
14.2 Tavis Ormandy @taviso.html 95B
14.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html 163B
14.3 'Ridiculous' Bug in Popular Antivirus Allows Hackers to Steal all Your Passwords.html 125B
14.3 Plain dm-crypt.html 149B
14.4 AVG can sell your browsing and search history to advertisers.html 146B
14.4 LUKS support for storing keys in TPM NVRAM.html 99B
14.6 High-severity bugs in 25 SymantecNorton products imperil millions.html 174B
14.7 MalwareBytes multiple security issues.html 132B
14. Is Anti-Virus and End-Point-Protection Dangerous.mp4 13.32MB
14. Is Anti-Virus and End-Point-Protection Dangerous.vtt 7.33KB
14. Linux - Malware Seek & Destroy - Sysdig.mp4 29.64MB
14. Linux - Malware Seek & Destroy - Sysdig.vtt 11.01KB
14. Linux - Security frameworks - AppArmor.mp4 4.40MB
14. Linux - Security frameworks - AppArmor.vtt 2.19KB
14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4 13.75MB
14. Linux Whole Disk Encryption - Dm-crypt and LUKS.vtt 6.38KB
14. Network Security Toolkit (NST).mp4 4.80MB
14. Network Security Toolkit (NST).vtt 2.42KB
14. TorBirdy.mp4 21.52MB
14. TorBirdy.vtt 7.29KB
15.10 httpswww.whonix.orgwikiNymservers.html 99B
15.11 httpspackages.debian.orgstablemailmixmaster.html 110B
15.12 DEF CON 21 - Tom Ritter - De Anonymizing Alt Anonymous Messages.html 104B
15.13 Yardbird's Effective Usenet Tradecraft DEC 1ST, 2013 Survival in an Extremely Adversarial Environment.html 138B
15.14 httpsgithub.comcryptodotismixgui.html 98B
15.15 httpswww.whonix.orgwikiMixmaster.html 98B
15.1 httpis-not-my.name.html 84B
15.1 httpssecurityonion.net.html 87B
15.1 httpwww.sysdig.org.html 82B
15.1 Security-Enhanced Linux From Wikipedia.html 114B
15.1 The Debian Administrator's Handbook.html 132B
15.2 Arch - dm-cryptEncrypting an entire system.html 134B
15.2 httpremailer.paranoici.org.html 92B
15.2 httpsgithub.comdraiossysdigwikisysdig-quick-reference-guide#wiki-basic-command-list.html 151B
15.2 SELinux Project Wiki.html 101B
15.3 Cryptsetup & LUKS.html 101B
15.3 httpswww.quicksilvermail.net.html 93B
15.3 httpwww.sysdig.orgwikisysdig-examples.html 104B
15.3 SELinux on Debian.html 98B
15.4 Arch - Disk encryption.html 113B
15.4 httpmixmaster.sourceforge.net.html 94B
15.5 de-anonymizing alt.anonymous.messages.html 106B
15.5 zuluCrypt.html 102B
15.6 httpmixminion.net.html 82B
15.7 httpsgroups.google.comforum#!forumalt.anonymous.messages.html 123B
15.8 httpsdizum.comremailer.html.html 92B
15.9 httpslabs.riseup.netcodeissues8225.html 101B
15. Linux - Security frameworks - SElinux.mp4 6.68MB
15. Linux - Security frameworks - SElinux.vtt 3.35KB
15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4 43.66MB
15. Linux - Seek & Destroy Malware and Hackers - Csysdig.vtt 11.78KB
15. Linux - Setting up DMCryptLUKS.mp4 13.20MB
15. Linux - Setting up DMCryptLUKS.vtt 5.14KB
15. Remailers.mp4 19.53MB
15. Remailers.vtt 7.52KB
15. Security Onion.mp4 5.79MB
15. Security Onion.vtt 1.67KB
16.10 httpsmailinabox.email.html 86B
16.11 httpssecure.runbox.com.html 87B
16.12 httpswww.openmailbox.org.html 89B
16.13 httpsruggedinbox.com.html 85B
16.14 httpsposteo.deen.html 81B
16.15 httpswww.eff.orgissuesmandatory-data-retention.html 112B
16.16 httpswww.tutanota.com.html 86B
16.17 httpsneomailbox.net.html 83B
16.18 Email Privacy Tester.html 93B
16.19 httpswww.startmail.com.html 87B
16.1 Arch - Encrypted boot partition (GRUB).html 170B
16.1 Debian grsecurity kernel APT repository (unofficial).html 124B
16.1 httpsruggedinbox.com.html 86B
16.1 httpswww.alienvault.comproductsossim.html 102B
16.1 httpwww.unhide-forensics.info.html 94B
16.20 CHOOSING PRIVATE & SECURE EMAIL WHAT TO LOOK FOR.html 122B
16.21 httpswww.reddit.comrprivacycomments1k2aqoin_the_wake_of_the_lavabit_shutdown_were_looking.html 159B
16.2 grsecurity.net.html 96B
16.2 httpswww.cryptoheaven.com.html 90B
16.2 Two factor authentication with Yubikey for harddisk encryption with LUKS.html 167B
16.3 Google gives Gmail a major security boost in bid to stop spy snooping.html 176B
16.3 GrsecurityConfiguring and Installing grsecurity.html 139B
16.3 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html 163B
16.4 httpscountermail.com.html 85B
16.4 Which is better, grsecurity, AppArmor or SELinux.html 95B
16.5 Hardening Debian for the Desktop Using Grsecurity.html 109B
16.5 httpskolabnow.com.html 82B
16.6 httpsen.wikipedia.orgwikiComparison_of_webmail_providers.html 122B
16.6 Which distributions maintain a kernel package with grsecurity support.html 178B
16.7 Arch Linux kernel and modules with grsecurity.html 125B
16.7 httpwww.prxbx.comemail - Privacy-Conscious Email Services.html 89B
16.8 httpsmailbox.orgen.html 84B
16.8 Linux Kernel Security (SELinux vs AppArmor vs Grsecurity).html 129B
16.9 httpsalpinelinux.org.html 85B
16.9 httpswww.google.comlanding2step.html 98B
16. Choosing an Email Provider.mp4 37.38MB
16. Choosing an Email Provider.vtt 15.02KB
16. Linux - Encrypting the boot partition with Grub2.mp4 11.71MB
16. Linux - Encrypting the boot partition with Grub2.vtt 4.15KB
16. Linux - Security frameworks - Grsecurity.mp4 12.79MB
16. Linux - Security frameworks - Grsecurity.vtt 1.72KB
16. Linux - Seek & Destroy Malware and Hackers - debsums & unhide.mp4 4.70MB
16. Linux - Seek & Destroy Malware and Hackers - debsums & unhide.vtt 2.05KB
16. Security Information and Event Management Software (SIEM).mp4 6.16MB
16. Security Information and Event Management Software (SIEM).vtt 3.48KB
17.1 httpspond.imperialviolet.org.html 93B
17.1 httptomoyo.osdn.jp.html 83B
17.1 Report - Ten Reasons to Buy Self-Encrypting Drives.html 201B
17.2 httpsbitmessage.orgwikiMain_Page.html 98B
17.2 httpspax.grsecurity.net.html 88B
17.3 httpsen.wikipedia.orgwikiI2P.html 94B
17.3 Yama is a Linux Security Module.html 168B
17.4 httpschreuders.orgFBAC-LSM.html 92B
17.4 httpswww.confidantmail.org.html 91B
17.5 httpsthetinhat.comtutorialsmessagingi2p-bote-thunderbird.html.html 128B
17.5 httpswww.rsbac.org.html 84B
17.6 httpsbitmessage.orgbitmessage.pdf.html 98B
17.7 httpretroshare.sourceforge.net.html 95B
17. Email Alternatives.mp4 7.42MB
17. Email Alternatives.vtt 3.31KB
17. Linux & Mac OS X - Malware Seek & Destroy - netstat.mp4 15.29MB
17. Linux & Mac OS X - Malware Seek & Destroy - netstat.vtt 2.25KB
17. Linux - Security frameworks - PaX and more.mp4 3.86MB
17. Linux - Security frameworks - PaX and more.vtt 1.74KB
17. Self Encrypting Drives (SEDs).mp4 3.16MB
17. Self Encrypting Drives (SEDs).vtt 1.93KB
18.1 TRESOR Runs Encryption Securely Outside RAM.html 107B
18.2 Security Requirements and Precautions.html 150B
18. Defense Against Disk Decryption Attacks.mp4 20.86MB
18. Defense Against Disk Decryption Attacks.vtt 8.86KB
18. Linux & Mac - File permissions, POSIX and ACLs.mp4 19.04MB
18. Linux & Mac - File permissions, POSIX and ACLs.vtt 8.72KB
18. Linux & Mac OS X - Malware Seek & Destroy - lsof.mp4 22.23MB
18. Linux & Mac OS X - Malware Seek & Destroy - lsof.vtt 8.54KB
19.1 How can I ensure only “whitelisted” applications run on OS X.html 167B
19.1 httprkhunter.sourceforge.net.html 93B
19.1 httpswww.aescrypt.com.html 86B
19.2 httprkhunter.cvs.sourceforge.netviewvcrkhunterrkhunterfilesFAQ.html 131B
19.2 httpswww.gnupg.org.html 83B
19.3 httpwww.peazip.org.html 84B
19.4 httpwww.kekaosx.comen.html 87B
19. File Encryption.mp4 11.12MB
19. File Encryption.vtt 4.42KB
19. Linux - Malware Seek & Destroy - rkhunter.mp4 17.22MB
19. Linux - Malware Seek & Destroy - rkhunter.vtt 6.70KB
19. Mac - Application control - Parental controls.mp4 8.01MB
19. Mac - Application control - Parental controls.vtt 3.30KB
2.1 av-test.org - The best antivirus software for Windows Home User.html 111B
2.1 httpswww.eff.orgsecure-messaging-scorecard.html 107B
2.1 httpswww.stationx.netcertificate-request.html 106B
2.1 httpwww.malwareremoval.com.html 114B
2.1 Is STARTTLS more safe than TLSSSL.html 136B
2.1 Magic Quadrant for Endpoint Protection Platforms.html 120B
2.1 Nathan's Security Blog.html 99B
2.1 OS X Yosemite Securely erasing your deleted files.html 127B
2.1 the-backdoor-factory.html 115B
2.2 httpswww.checktls.com.html 85B
2.2 httpswww.securemessagingapps.com.html 97B
2.2 httpwww.bleepingcomputer.com.html 172B
2.2 httpwww.fileshredder.org.html 89B
2.2 kaspersky compare.html 95B
2.2 Nathan's Twitter.html 91B
2.3 FUD Crypting Service (035 100% FUD) - Video.html 104B
2.3 httpsen.wikipedia.orgwikiComparison_of_instant_messaging_clients.html 130B
2.3 httpwww.filehippo.comdownload_recuva.html 101B
2.4 httperaser.heidi.ie.html 84B
2. A Complete Failure to Detect Threats.mp4 11.44MB
2. A Complete Failure to Detect Threats.vtt 6.21KB
2. An Introduction to Hardening.mp4 8.91MB
2. An Introduction to Hardening.vtt 6.30KB
2. An Introduction to Instant Messengers.mp4 25.19MB
2. An Introduction to Instant Messengers.vtt 3.40KB
2. Certificate Of Completion for CPEs.mp4 2.21MB
2. Certificate Of Completion for CPEs.vtt 1.12KB
2. Clients, Protocols and Authentication.mp4 38.19MB
2. Clients, Protocols and Authentication.vtt 13.37KB
2. Disk Encryption – What is it good for.mp4 21.72MB
2. Disk Encryption – What is it good for.vtt 8.40KB
2. Goals and Learning Objectives - Volume 4.mp4 25.39MB
2. Goals and Learning Objectives - Volume 4.vtt 3.96KB
2. Introduction to Malware and Hacker Hunting.mp4 16.35MB
2. Introduction to Malware and Hacker Hunting.vtt 10.67KB
2. Introduction to the Instructor!.mp4 17.13MB
2. Introduction to the Instructor!.vtt 1.86KB
2. Is Anti-Virus dead - The Threat Landscape.mp4 11.33MB
2. Is Anti-Virus dead - The Threat Landscape.vtt 4.41KB
2. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).mp4 10.65MB
2. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).vtt 5.33KB
2. Secure File Deletion - Mechanical drives.mp4 19.69MB
2. Secure File Deletion - Mechanical drives.vtt 8.85KB
2. What is application and execution control.mp4 20.96MB
2. What is application and execution control.vtt 10.38KB
20.1 Arch - Plain dm-crypt.html 149B
20.1 Gatekeeper Exposed - Video.html 104B
20.1 httpwww.nongnu.orgtiger.html 89B
20.2 httpsobjective-see.comproductsostiarius.html.html 110B
20.2 httpwww.clamav.net.html 83B
20.2 Key disclosure law From Wikipedia.html 109B
20.3 httpswww.rfxn.comprojectslinux-malware-detect.html 112B
20.3 httpsxkcd.com538 - Cartoon.html 82B
20.3 Researchers slip malware onto Apple's App Store, again.html 139B
20.4 Appeals Court Upholds Constitutional Right Against Forced Decryption.html 164B
20.4 Gatekeeper Exposed.html 132B
20.4 httpwww.2daygeek.cominstall-linux-malware-detect-lmd-on-ubuntu-centos-debian-fedora-mint-rhel-opensuse.html 168B
20.5 OS X About Gatekeeper.html 101B
20.5 Report - Linux Security Review.html 140B
20.5 veracrypt - Plausible Deniability.html 130B
20.6 httpwww.chkrootkit.org.html 87B
20.6 veracrypt - Hidden Volume.html 122B
20.7 Linux malware From Wikipedia.html 104B
20. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD.mp4 6.18MB
20. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD.vtt 2.25KB
20. Mac - Application control - Gatekeeper.mp4 10.20MB
20. Mac - Application control - Gatekeeper.vtt 6.44KB
20. Mandatory Key Disclosure & Plausible Deniability.mp4 20.54MB
20. Mandatory Key Disclosure & Plausible Deniability.vtt 8.57KB
21.1 httpsdeveloper.apple.comlibrarycontentreleasenotesMacOSXWhatsNewInOSXArticlesMacOSX10_11.html.html 164B
21.2 About System Integrity Protection on your Mac.html 101B
21.3 El Capitan's System Integrity Protection will shift utilities' functions.html 191B
21.4 httpsdeveloper.apple.comvideosplaywwdc2015706 - Video.html 114B
21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.mp4 9.21MB
21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.vtt 3.41KB
21. Mac - Application control - System Integrity Protection.mp4 12.03MB
21. Mac - Application control - System Integrity Protection.vtt 6.27KB
21. Nesting Crypto Systems & Obfuscation.mp4 8.88MB
21. Nesting Crypto Systems & Obfuscation.vtt 3.88KB
22.1 Darkmarket.html 251B
22.1 httpsfedoraproject.orgwikiSysVinit_to_Systemd_Cheatsheet.html 122B
22.1 httpsgithub.comgooglesanta.html 92B
22.2 Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court.html 107B
22.2 How to bypass Google’s Santa LOCKDOWN mode.html 137B
22.2 httpswww.debian.orgdocmanualsdebian-referencech03.en.html.html 125B
22.3 KINGPIN How One Hacker Took Over the Billion-Dollar Cybercrime Underground.html 84B
22. Case Studies in Disk Decryption.mp4 5.87MB
22. Case Studies in Disk Decryption.vtt 3.18KB
22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.mp4 27.60MB
22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.vtt 9.61KB
22. Mac - Application control - Santa.mp4 7.04MB
22. Mac - Application control - Santa.vtt 4.44KB
23.1 httpscampaigns.f-secure.comxfence.html 99B
23.1 httpswww.debian.orgdocmanualsdebian-referencech03.en.html.html 125B
23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.mp4 5.22MB
23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.vtt 2.95KB
23. Mac - Application control - Xfence (Previously Little Flocker).mp4 20.39MB
23. Mac - Application control - Xfence (Previously Little Flocker).vtt 7.93KB
24.1 httpsobjective-see.comproductsoversight.html.html 110B
24.1 httpsobjective-see.comproductstaskexplorer.html.html 113B
24.2 httpsobjective-see.comproductsransomwhere.html.html 112B
24.3 FREE TOOL PROTECTS MAC USERS FROM WEBCAM SURVEILLANCE.html 145B
24.4 httpsobjective-see.comproductsdhs.html.html 104B
24. Mac - Malware Seek & Destroy - Task Explorer.mp4 15.03MB
24. Mac - Malware Seek & Destroy - Task Explorer.vtt 5.91KB
24. Mac - Other Stuff!.mp4 3.70MB
24. Mac - Other Stuff!.vtt 1.63KB
25.10 httpsattivonetworks.com.html 88B
25.1 httpbufferzonesecurity.com.html 91B
25.1 httpsobjective-see.comproductsblockblock.html.html 111B
25.2 httpsobjective-see.comproductskextviewr.html.html 110B
25.2 httpwww.faronics.comen-ukproductsdeep-freezestandard.html 121B
25.3 httpsobjective-see.comproductsknockknock.html.html 111B
25.3 httpswww.invincea.com.html 86B
25.4 httpswww.cylance.com.html 101B
25.5 httpswww.illusivenetworks.com.html 94B
25.6 httpscanary.tools.html 82B
25.7 httpwww.deepinstinct.com.html 89B
25.8 httpswww.bromium.com.html 85B
25.9 httpjavelin-networks.com.html 89B
25. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.mp4 20.46MB
25. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.vtt 8.50KB
25. The New Normal For End-Point-Protection Technology.mp4 22.42MB
25. The New Normal For End-Point-Protection Technology.vtt 9.28KB
26.1 httpinnetworktech.comwp-contentuploads201602Magic-Quadrant-for-Endpoint-Protection-Platforms.pdf.html 165B
26.1 httpsgithub.comfacebookosquery.html 96B
26.2 httpsosquery.io.html 80B
26.3 httpsgithub.comfacebookosqueryblobmastertoolsdeploymentosquery.example.conf.html 146B
26.4 httpsosquery.readthedocs.ioenstabledeploymentyara.html 118B
26.5 httpsosquery.readthedocs.ioenstabledeploymentfile-integrity-monitoring.html 139B
26.6 httpsosquery.readthedocs.ioenstable.html 102B
26.7 httpsgithub.comgooglegrr.html 90B
26.8 httpsgithub.comherokuwindmill.html 95B
26.9 httpsvirustotal.github.ioyara.html 95B
26. Cylance.mp4 9.54MB
26. Cylance.vtt 5.67KB
26. Mac, Linux & Windows - OSquery.mp4 42.29MB
26. Mac, Linux & Windows - OSquery.vtt 17.10KB
27.1 Summary of Attacks Against BIOS and Secure Boot and related CHIPSEC modules at DEFCON 22.html 104B
27.2 httpblog.trendmicro.comtrendlabs-security-intelligencehacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems.html 194B
27.3 Powerful backdoorrootkit found preinstalled on 3 million Android phones.html 173B
27.4 httpsnsa.gov1.infodninsa-ant-catalogfirewalls.html 113B
27.5 httpswww.theguardian.comtechnology2016feb09internet-of-things-smart-home-devices-government-surveillance-james-clapper.html 186B
27.6 httpsen.wikipedia.orgwikiOpen-source_hardware.html 111B
27.7 httpwww.kaspersky.comaboutnewsvirus2015Equation-Group-The-Crown-Creator-of-Cyber-Espionage.html 159B
27.8 hacker presentation on Hacking the Extensible Firmware Interface.html 153B
27. Firmware Rootkits – Seek and Destroy Part 1.mp4 15.95MB
27. Firmware Rootkits – Seek and Destroy Part 1.vtt 8.61KB
28.10 Putting the spotlight on firmware malware.html 141B
28.1 httpswww.virustotal.com.html 87B
28.2 httpspypi.python.orgpypiuefi_firmware.html 103B
28.3 Virustotal output example.html 170B
28.4 darwindumper.html 104B
28.5 httpsgithub.comchipsecchipsecblobmasterchipsec-manual.pdf.html 126B
28.6 httpsflashrom.orgFlashrom.html 90B
28.7 US-13-Butterworth-BIOS-Security-Code.zip.html 137B
28.8 UEFI Innovations for Platform Security.html 128B
28.9 httpsgithub.comchipsecchipsec.html 95B
28. Firmware Rootkits – Seek and Destroy Part 2.mp4 8.89MB
28. Firmware Rootkits – Seek and Destroy Part 2.vtt 4.54KB
29.1 httphorizondatasys.com.html 87B
29.2 httpsbombich.com - Carboncopy.html 81B
29.3 httpclonezilla.org.html 83B
29.4 Acronis True Image.html 90B
29.5 httpwww.macrium.comreflectfree.aspx.html 100B
29.6 httpwww.runtime.orgdriveimage-xml.htm.html 102B
29.7 terabyteunlimited - Image for Windows & Linux.html 107B
29. End-Point-Protection Recovery and Remediation Technology.mp4 10.50MB
29. End-Point-Protection Recovery and Remediation Technology.vtt 3.32KB
3.1 farbar recovery scan tool.html 128B
3.1 honeynet.orgproject.html 93B
3.1 How to Use Signal on iOS.html 109B
3.1 httpsbenchmarks.cisecurity.orgdownloadsmultiform.html 115B
3.1 N.S.A. Able to Foil Basic Safeguards of Privacy on Web.html 152B
3.1 Recovering Evidence from SSD Drives in 2014 Understanding TRIM, Garbage Collection and Exclusions.html 204B
3.1 The Current State of SMTP STARTTLS Deployment.html 173B
3.1 White Paper - Malicious Code Detection Technologies.html 139B
3.1 Windows Permission Identifier.html 115B
3.2 AccessEnum.html 125B
3.2 Further reading on quantum computing and its effect of cryptography - NIST Reports.html 152B
3.2 Google - Email encryption in transit.html 114B
3.2 httpscybermap.kaspersky.com.html 92B
3.2 httpswhispersystems.org.html 88B
3.2 httpwww.geekstogo.comforumtopic335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool.html 156B
3.2 SSD and eMMC Forensics 2016.html 135B
3.2 The United States Government Configuration Baseline (USGCB).html 102B
3.3 Free online fake mailer with attachments, encryption, HTML editor and advanced settings.html 78B
3.3 How to Change File Permissions on Windows 7.html 120B
3.3 httpsbenchmarks.cisecurity.orgmembershipacademic-institutions.html 128B
3.3 iOS - Signal.html 101B
3.3 Paper - Malicious Code Detection Technologies.html 172B
3.3 Security of Data on Disk - Video.html 104B
3.4 Andoird - Signal.html 133B
3.4 httpsbenchmarks.cisecurity.orgdownloadsaudit-toolsdocumentsCIS-CATUsersGuide_000.pdf.html 152B
3.4 httpswww.parsemail.org.html 87B
3.4 Paper - Reliably Erasing Data From Flash-Based Solid State Drives.html 129B
3.5 EXTRA BITS - Data Security and Flash Memory.html 104B
3.5 SIGNAL AUDIT REVEALS PROTOCOL CRYPTOGRAPHICALLY SOUND.html 145B
3.5 STIG viewer.html 120B
3.6 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html 104B
3.6 How to Use Signal for Android.html 113B
3.7 CIS Benchmarks. - (Center For Internet Security).html 116B
3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4 16.78MB
3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.vtt 5.87KB
3. Email Weaknesses.mp4 30.78MB
3. Email Weaknesses.vtt 13.81KB
3. End Point Detection and Response (EDR).mp4 13.80MB
3. End Point Detection and Response (EDR).vtt 6.99KB
3. Hardening Standards.mp4 41.53MB
3. Hardening Standards.vtt 10.73KB
3. Instant Messenger - Signal.mp4 5.88MB
3. Instant Messenger - Signal.vtt 2.78KB
3. Is Anti-Virus dead - Protection Methods.mp4 36.61MB
3. Is Anti-Virus dead - Protection Methods.vtt 11.66KB
3. Qubes OS.mp4 56.31MB
3. Qubes OS.vtt 20.10KB
3. Rethinking Honeypots.mp4 8.90MB
3. Rethinking Honeypots.vtt 5.87KB
3. Secure File Deletion - Solid Sate Drives.mp4 12.10MB
3. Secure File Deletion - Solid Sate Drives.vtt 7.05KB
3. Security Quick Win!.mp4 44.62MB
3. Security Quick Win!.vtt 20.75KB
3. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum.mp4 16.27MB
3. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum.vtt 6.66KB
3. Windows - Farbar Recovery Scanner.mp4 38.06MB
3. Windows - Farbar Recovery Scanner.vtt 11.16KB
30.10 httpspydio.com.html 79B
30.11 httpswww.qnap.comen.html 85B
30.12 httpssyncthing.net.html 83B
30.13 How To Set Up a Tahoe-LAFS Distributed Filesystem on Ubuntu 14.04 Servers.html 120B
30.14 httpswww.syncany.org.html 85B
30.15 httpswww.sparkleshare.org.html 90B
30.16 httpswww.boxcryptor.comen.html 90B
30.1 httpwww.drobostore.com.html 87B
30.2 How To Install and Configure Seafile on an Ubuntu 12.04 VPS.html 169B
30.3 httpsowncloud.orgproviders.html 92B
30.4 httpswww.tahoe-lafs.orgtractahoe-lafs.html 103B
30.5 httpswww.turnkeylinux.orgowncloud.html 98B
30.6 httpsleastauthority.comproduct_s4.html 99B
30.7 How To Use the ownCloud One-Click Install Application.html 163B
30.8 httpswww.seafile.comenhome.html 93B
30.9 How To Host a File Sharing Server with Pydio on Ubuntu 14.04.html 170B
30. Encrypted Backup and Cloud Storage.mp4 14.13MB
30. Encrypted Backup and Cloud Storage.vtt 6.89KB
4.10 Choose the Right BitLocker Countermeasure.html 118B
4.10 httpsoval.cisecurity.orgrepositorydownload.html 108B
4.10 Roguekiller.html 104B
4.11 Evil Maid goes after TrueCrypt!.html 145B
4.11 HitmanPro.html 97B
4.12 Passware Kit Enterprise - Hard Disk Decryption.html 107B
4.1 How to Install and Use ChatSecure.html 121B
4.1 httpswww.debian.orgsecurityoval.html 98B
4.1 httpswww.stationx.netcanarytokens.html 99B
4.1 Inception.html 96B
4.1 Kaspersky.html 118B
4.1 rfc4880.txt OpenPGP Message Format.html 97B
4.1 The cost of ransomware attacks $1 billion this year.html 141B
4.1 User Account Control (UAC).html 122B
4.2 httpschatsecure.org.html 84B
4.2 httpswww.open-scap.org.html 87B
4.2 Intel® Virtualization Technology for Directed IO (VT-d) Enhancing Intel platforms for efficient virtualization of IO devices.html 224B
4.2 superantispyware.html 93B
4.2 Symantec Desktop Email Encryption.html 159B
4.2 Windows 7 – How to Configure UAC (User Account Control).html 117B
4.3 httpswww.open-scap.orgdownload.html 96B
4.3 Malwarebytes.html 103B
4.3 The GNU Privacy Guard.html 83B
4.3 User Account Control From Wikipedia.html 111B
4.3 Wikipedia - Disk encryption.html 106B
4.4 An Introduction to Cryptography.html 122B
4.4 How User Account Control works.html 153B
4.4 httpcsrc.nist.govpublicationsPubsSPs.html.html 107B
4.4 httpswww.microsoft.comen-ussecuritypc-securitymalware-removal.aspx.html 134B
4.4 Security Pitfalls in Cryptography.html 135B
4.5 httpsscap.nist.gov.html 83B
4.5 httpwww.bleepingcomputer.comdownloadrkill.html 108B
4.5 Inception over firewire attack - video.html 104B
4.6 httpswww.open-scap.orgresourcesdocumentationcustomizing-scap-security-guide-for-your-use-case.html 161B
4.6 httpwww.bleepingcomputer.comdownloadwindowsanti-rootkit.html 123B
4.6 Windowsscope.html 204B
4.7 httpschocolatey.org.html 84B
4.7 httpswww.open-scap.orgfeaturesvulnerability-assessment.html 121B
4.7 Report - Cold Boot Attack on DDR2 and DDR3 RAM.html 149B
4.8 httpbrew.sh.html 76B
4.8 httpswww.open-scap.orgfeaturessecurity-compliance.html 116B
4.8 nullcon Goa 2015 Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video.html 104B
4.9 AdwCleaner.html 103B
4.9 Cold Boot Attack Demo - Video.html 104B
4.9 httpsstatic.open-scap.orgopenscap-1.2oscap_user_manual.html#_how_to_evaluate_disa_stig.html 152B
4. Automated Malware Removal Tools.mp4 39.97MB
4. Automated Malware Removal Tools.vtt 13.02KB
4. CanaryTokens.mp4 70.27MB
4. CanaryTokens.vtt 21.91KB
4. Disk Encryption Attacks - Physical.mp4 38.32MB
4. Disk Encryption Attacks - Physical.vtt 11.68KB
4. Effective Network Isolation.mp4 28.05MB
4. Effective Network Isolation.vtt 12.70KB
4. End-Point-Protection How it works together in layers.mp4 12.86MB
4. End-Point-Protection How it works together in layers.vtt 8.29KB
4. Evidence Elimination & Anti-Forensics - An Introduction.mp4 8.28MB
4. Evidence Elimination & Anti-Forensics - An Introduction.vtt 5.59KB
4. Instant Messengers - Chatsecure.mp4 4.00MB
4. Instant Messengers - Chatsecure.vtt 1.63KB
4. OpenSCAP.mp4 31.26MB
4. OpenSCAP.vtt 13.63KB
4. PGP, GPG & Privacy.mp4 12.99MB
4. PGP, GPG & Privacy.vtt 5.93KB
4. Ransomware.mp4 8.50MB
4. Ransomware.vtt 5.11KB
4. Target Audience.mp4 7.32MB
4. Target Audience.vtt 2.41KB
4. Windows - Application control - User Account Control (UAC).mp4 15.36MB
4. Windows - Application control - User Account Control (UAC).vtt 4.86KB
5.10 httpsrufus.akeo.ie.html 83B
5.10 OpenPGP public-key cryptography.html 158B
5.11 gpg4usb project.html 84B
5.11 Hitman pro kickstart.html 101B
5.12 httpwww.pendrivelinux.comuniversal-usb-installer-easy-as-1-2-3.html 128B
5.12 Mymail-Crypt for Gmail - PGP extension for chrome.html 158B
5.13 httpsunetbootin.github.io.html 91B
5.14 httpsremnux.org.html 80B
5.14 httpswww.mailvelope.com.html 88B
5.15 httpsfalconfour.wordpress.comtagf4ubcd.html 105B
5.15 Secure Mail for Gmail chrome extension.html 166B
5.16 httpwww.system-rescue-cd.orgDownload.html 101B
5.16 WebPG for Mozilla - An extension which provides PGP functions to Firefox, Thunderbird and Seamonkey.html 122B
5.1 bitdefender.html 126B
5.1 httpscanary.tools.html 82B
5.1 httpscrypto.cat.html 80B
5.1 httpwindowsmatters.com20150110gandalfs-windows-7-pe-x86.html 124B
5.1 httpwww.openvas.orgabout.html.html 94B
5.1 httpwww.winapp2.com.html 84B
5.1 Secure Mobile Apps.html 95B
5.1 Security Pitfalls in Cryptography.html 135B
5.1 Use Software Restriction Policies to block viruses and malware.html 166B
5.2 Application Whitelisting using Software Restriction Policies (version 1.1).html 139B
5.2 httpsgithub.comthinkstopencanary.html 98B
5.2 httpslinux-audit.com.html 85B
5.2 httpswww.piriform.comccleaner.html 95B
5.2 httpwww.technorms.com8098create-windows-7-live-cd.html 115B
5.2 iPGMail.html 114B
5.2 List of AV Testing Labs.html 116B
5.3 GPG Suite.html 82B
5.3 httpbleachbit.sourceforge.netdocumentationwinapp2_ini.html 119B
5.3 httpdocs.opencanary.orgenlatestindex.html.html 108B
5.3 httpscisofy.comlynis.html 86B
5.3 httpwww.av-comparatives.org.html 92B
5.3 Ironkey w700.html 107B
5.3 Use a Software Restriction Policy (or Parental Controls) to stop exploit payloads and Trojan Horse programs from running.html 89B
5.4 Android - OpenKeychain Easy PGP.html 138B
5.4 httpbleachbit.sourceforge.net.html 102B
5.4 httpsdigital-forensics.sans.orgcommunitydownloads.html 115B
5.4 httpswww.tenable.comproductsnessusnessus-professionalevaluate.html 129B
5.5 How to Use PGP for Linux.html 108B
5.5 httpswww.qualys.comformsfreescan.html 99B
5.5 Kaspersky Rescue Disk 10.html 111B
5.6 How to Use PGP for Mac OS X.html 111B
5.6 httpgetintopc.comsoftwaresoperating-systemswindows-7-live-cd-free-download.html 142B
5.6 httpswww.tenable.comproductsnessus-home.html 105B
5.7 httptrinityhome.orgHomeindex.phpcontent=TRINITY_RESCUE_KIT_DOWNLOAD.html 134B
5.7 The best PGP tutorial for Mac OS X, ever.html 129B
5.8 How to Use PGP for Windows.html 113B
5.8 httpwww.hirensbootcd.orgdownload.html 98B
5.9 Decrypt or verify a text created using OpenPGP Applet.html 149B
5.9 httpsen.wikipedia.orgwikiWindows_To_Go.html 104B
5. Anti-Virus and End-Point-Protection Testing.mp4 12.90MB
5. Anti-Virus and End-Point-Protection Testing.vtt 6.26KB
5. Baseline Auditing.mp4 12.42MB
5. Baseline Auditing.vtt 3.86KB
5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4 7.19MB
5. Disk Encryption Attacks - Containers, Volumes and Partitions.vtt 2.53KB
5. Evidence Elimination - CCleaner and Bleachit.mp4 18.27MB
5. Evidence Elimination - CCleaner and Bleachit.vtt 7.89KB
5. Instant Messengers - Cryptocat.mp4 1.46MB
5. Instant Messengers - Cryptocat.vtt 871B
5. Live Rescue Operating Systems, CDs, and USBs.mp4 18.33MB
5. Live Rescue Operating Systems, CDs, and USBs.vtt 7.98KB
5. OpenCanary.mp4 38.79MB
5. OpenCanary.vtt 14.09KB
5. PGP & GPG Clients.mp4 15.03MB
5. PGP & GPG Clients.vtt 15.05MB
5. Socks5 proxy tunneling.mp4 22.99MB
5. Socks5 proxy tunneling.vtt 9.92KB
5. Study Recommendations.mp4 27.90MB
5. Study Recommendations.vtt 5.34KB
5. Windows - Application control - Software Restriction Policies.mp4 11.29MB
5. Windows - Application control - Software Restriction Policies.vtt 4.50KB
6.10 NoVA Hackers Curt Shaffer & Judah Plummer - Application Whitelisting - Video.html 104B
6.11 Bypassing Windows AppLocker using a Time of Check Time of Use vulnerability.html 204B
6.1 AppLocker Step-by-Step Guide.html 131B
6.1 Force Windows 7 to Clear Virtual Memory Pagefile at Shutdown.html 156B
6.1 hardenwindows8forsecurity.com.html 108B
6.1 How to Use PGP for Windows.html 110B
6.1 httpsricochet.im.html 81B
6.1 httpstechnet.microsoft.comen-ussysinternalsprocessexplorer.html 125B
6.1 httpswww.binarydefense.comproject-artillery.html 109B
6.1 Windows BitLocker.html 131B
6.2 BestCrypt Container Encryption.html 139B
6.2 hardenwindows7forsecurity.com.html 108B
6.2 httpsgithub.comBinaryDefenseartillery.html 103B
6.2 httpstechnet.microsoft.comen-ussysinternals.html 110B
6.2 Lock down Windows 10 to specific apps.html 23.78MB
6.2 The Gpg4win Compendium Secure e-mail and file encryption using GnuPG for Windows.html 115B
6.2 Windows - Disbale Memory Dump Files.html 128B
6.3 CIS Benchmarks. - (Center For Internet Security).html 124B
6.3 Gpg4win.html 98B
6.3 Guide to Application Whitelisting.html 133B
6.3 How to disable and re-enable hibernation on a computer that is running Windows.html 106B
6.3 Veracrypt.html 92B
6.4 CipherShed.html 88B
6.4 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html 104B
6.4 Google - Sign in using App Passwords.html 117B
6.4 Paging File Info.html 120B
6.4 Use AppLocker and Software Restriction Policies in the same domain.html 189B
6.5 DiskCryptor.html 99B
6.5 hardenwindows10forsecurity.com.html 99B
6.5 How to disable virtual memory in Windows 7.html 104B
6.5 Restrict Access to Programs with AppLocker in Windows 7.html 156B
6.5 Thunderbird.html 103B
6.6 Bypass the Windows AppLocker bouncer with a tweet-size command.html 118B
6.6 httpwww.stationx.netnathan-house.html 98B
6.6 Mac - Instruction to disable swap here.html 116B
6.6 Symantec Drive Encryption.html 131B
6.6 The United States Government Configuration Baseline (USGCB).html 102B
6.7 Enigmail.html 104B
6.7 Finding Evil in the Whitelist.html 146B
6.7 Mac - How to disable virtual memory swap files.html 122B
6.7 Truecrpyt v7.2 (latest full version) - Download.html 109B
6.8 Comparison of disk encryption software From Wikipedia.html 129B
6.8 Linux - How to Clear RAM Memory Cache, Buffer and Swap Space.html 138B
6.8 What Is AppLocker.html 131B
6.9 Bypass Application Whitelisting Script Protections - Regsvr32.exe & COM Scriptlets (.sct files).html 143B
6. Artillery - Binary Defense.mp4 11.11MB
6. Artillery - Binary Defense.vtt 4.31KB
6. Course updates.mp4 2.56MB
6. Course updates.vtt 759B
6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.mp4 14.19MB
6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.vtt 6.66KB
6. Instant Messengers - Ricochet.mp4 1.47MB
6. Instant Messengers - Ricochet.vtt 830B
6. The Problem With AV and EPP Testing.mp4 6.65MB
6. The Problem With AV and EPP Testing.vtt 4.05KB
6. Windows - Application control - AppLocker.mp4 32.15MB
6. Windows - Application control - AppLocker.vtt 10.53KB
6. Windows - Disk Encryption - An Introduction.mp4 7.52MB
6. Windows - Disk Encryption - An Introduction.vtt 3.10KB
6. Windows - Hardening.mp4 9.31MB
6. Windows - Hardening.vtt 2.03KB
6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4 57.77MB
6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.vtt 3.32KB
6. Windows - PGP & GPG.mp4 58.31MB
6. Windows - PGP & GPG.vtt 18.23KB
7.10 How To Securely Wipe Your Hard Drive with DBAN – Erase Your Data for Good.html 159B
7.11 httpwww.dban.org.html 81B
7.1 Conversations (Jabber XMPP).html 130B
7.1 httpsbruteforce.grhoneydrive.html 93B
7.1 httpswhois.domaintools.com.html 91B
7.1 httpswww.bleachbit.org.html 87B
7.1 httpwww.kaspersky.co.ukbusiness-securitysmall-to-medium-business.html 138B
7.1 httpwww.stationx.netnathan-house.html 98B
7.1 Microsoft Baseline Security Analyzer MBSA for windows.html 122B
7.1 Test Parental control software for Windows and Mac OS X.html 166B
7.1 What's new in Windows 10, versions 1507 and 1511.html 157B
7.2 Ensure a Windows PC Never Gets Malware By Whitelisting Applications.html 161B
7.2 httpkontalk.org.html 80B
7.2 httpssourceforge.netprojectshoneydrive.html 105B
7.2 httpstechnet.microsoft.comen-ussysinternalsprocessexplorer.html 125B
7.2 httpwww.bitdefender.co.ukbusiness.html 99B
7.2 httpwww.fileshredder.org.html 89B
7.2 Microsoft Security Compliance Manager.html 123B
7.2 YUBIKEYS.html 110B
7.3 Every Windows 10 in-place Upgrade is a SEVERE Security risk.html 133B
7.3 How To Wipe a Hard Drive.html 118B
7.3 LGPO.exe – Local Group Policy Object Utility.html 165B
7.3 The best antivirus software for Windows Client Business User.html 133B
7.4 httpsblogs.technet.microsoft.comsecguide.html 106B
7.4 httpswww.piriform.comccleaner.html 95B
7.4 Windows BitLocker Drive Encryption Step-by-Step Guide.html 131B
7.5 Attack surface analyiser.html 153B
7.5 OS X Yosemite Securely erasing your deleted files.html 127B
7.6 Attack surface analyiser.html 123B
7.6 Drive eRazer Ultra Multi-function device that completely erases all data from a hard drive.html 132B
7.7 HARD DRIVE DEGAUSSER.html 105B
7.7 Policy Analyzer.html 142B
7.8 httperaser.heidi.ie.html 84B
7.9 httppartedmagic.com.html 84B
7. Disk Wiping - Mechanical Drives.mp4 11.43MB
7. Disk Wiping - Mechanical Drives.vtt 4.34KB
7. Honey Drive.mp4 2.53MB
7. Honey Drive.vtt 1.44KB
7. Instant Messengers - Other.mp4 1.54MB
7. Instant Messengers - Other.vtt 767B
7. Tail - PGP & GPG.mp4 9.66MB
7. Tail - PGP & GPG.vtt 2.79KB
7. The Best of Business End-Point-Protection (EPP).mp4 9.40MB
7. The Best of Business End-Point-Protection (EPP).vtt 4.60KB
7. Windows - Application Control - Parental controls.mp4 4.88MB
7. Windows - Application Control - Parental controls.vtt 2.80KB
7. Windows - Disk Encryption - Bitlocker.mp4 30.21MB
7. Windows - Disk Encryption - Bitlocker.vtt 13.61KB
7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4 46.72MB
7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.vtt 10.33KB
7. Windows - Security Compliance Manager (SCM).mp4 44.88MB
7. Windows - Security Compliance Manager (SCM).vtt 12.12KB
8.10 httppartedmagic.com.html 84B
8.11 httpsen.wikipedia.orgwikiParallel_ATA#HDD_passwords_and_security.html 130B
8.12 Thermaltake BlacX Hot-Swap SATA External Hard Drive Docking Station for Windows & Mac Os Compatible.html 143B
8.13 NIST Special Publication 800-88 - Guidelines for Media Sanitization.html 134B
8.14 Securely Erasing Your SSD with Linux A How-To.html 135B
8.1 Commonly Asked Questions and Answers on Self-encrypting Drives.html 170B
8.1 ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT.html 125B
8.1 httpprocesshacker.sourceforge.net.html 98B
8.1 httpsobjective-see.comproductslockdown.html.html 109B
8.1 httpswww.linphone.org.html 86B
8.1 httpwindows.microsoft.comen-uswindows-10getstarted-protect-your-pc.html 133B
8.1 voodooshield.com.html 85B
8.1 What’s the matter with PGP.html 135B
8.2 15 reasons not to start using PGP.html 85B
8.2 Defence Information Systems Agency - STIGs - Security Template Implementation guide for Mac.html 112B
8.2 httpswhispersystems.org.html 88B
8.2 httpwww.nirsoft.netutilsuserassist_view.html.html 110B
8.2 NoVirusThanks EXE Radar Pro.html 113B
8.2 Security Essentials Download.html 136B
8.2 What is Crypto Erase.html 136B
8.3 httpdocs.hardentheworld.orgOSindex.html.html 105B
8.3 httpsgithub.commandiantShimCacheParser.html 104B
8.3 httpsuk.norton.comnorton-security-with-backup.html 111B
8.3 httpswww.linphone.orguser-guide.html.html 101B
8.3 Protecting your PC against any malware using Kaspersky Lab’s Trusted Applications technology.html 146B
8.3 SanDisk Crypto Erase Tool support information.html 160B
8.4 AppGuard® Breach Prevention.html 87B
8.4 httpswww.linphone.orgfree-sip-service.html.html 108B
8.4 httpwww.apple.comsupportsecurityguides.html 106B
8.4 httpwww.bitdefender.co.uksolutionsantivirus-comparison.html.html 126B
8.4 Ten Reasons to Buy Self-Encrypting Drives.html 137B
8.5 CIS Benchmarks for Mac.html 153B
8.5 Drive Erase Utility for the Resetting the Cryptographic Key and the Erasing the Solid State Drive - ThinkPad.html 111B
8.5 httpwww.kaspersky.co.ukcompare.html 96B
8.5 Kaspersky Internet Security 20xx.html 99B
8.6 httpgparted.sourceforge.net.html 92B
8.6 httpsobjective-see.comproductslockdown.html.html 109B
8.6 httpwww.mcafee.comusproductsapplication-control.aspx.html 119B
8.6 Microsoft’s Free Security Tools – Windows Defender Offline.html 167B
8.7 httpswww.carbonblack.comproducts.html 99B
8.7 httpwww.bitdefender.commediahtmlfreeav-upgradeet_cid=EMM_NA_FreeAV_Upsell.html 142B
8.7 Paper - Reliably Erasing Data From Flash-Based Solid State Drives.html 129B
8.8 How to Secure Erase your Solid State Drive (SSD) with Parted Magic.html 106B
8.8 Lumension Application Control.html 120B
8.9 httpsen.wikipedia.orgwikiHdparm.html 97B
8. Disk Wiping - Solid State Drives (SSD).mp4 23.13MB
8. Disk Wiping - Solid State Drives (SSD).vtt 11.86KB
8. Intrusion Detection Systems (IDS) Part 1 - Methods.mp4 13.24MB
8. Intrusion Detection Systems (IDS) Part 1 - Methods.vtt 8.57KB
8. Mac – Hardening.mp4 3.51MB
8. Mac – Hardening.vtt 1.99KB
8. PGP & GPG Weaknesses.mp4 14.71MB
8. PGP & GPG Weaknesses.vtt 6.57KB
8. Video and Voice Messengers - Linphone.mp4 11.51MB
8. Video and Voice Messengers - Linphone.vtt 4.57KB
8. Windows - Malware Seek & Destroy - Process Tools.mp4 8.78MB
8. Windows - Malware Seek & Destroy - Process Tools.vtt 2.15KB
8. Windows - Setting Up BitLocker.mp4 23.64MB
8. Windows - Setting Up BitLocker.vtt 9.46KB
8. Windows - The Best of Anti-Virus and End-Point-Protection.mp4 10.29MB
8. Windows - The Best of Anti-Virus and End-Point-Protection.vtt 4.46KB
8. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.mp4 12.92MB
8. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.vtt 7.17KB
9.10 CIS Benchmarks. - (Center For Internet Security).html 124B
9.10 httpssourceforge.netpveracryptcodecimastertreesrcBootEFIReadme.txt#l19.html 144B
9.11 yubico.com.html 113B
9.12 GERMAN GOVERNMENT AUDITS TRUECRYPT.html 126B
9.1 BatchPurifier™ 7.2.html 122B
9.1 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html 104B
9.1 httpsjitsi.org.html 79B
9.1 httpswww.bro.org.html 81B
9.1 httpwww.openwall.comlistsoss-security201601111.html 116B
9.1 Microsoft - The Enhanced Mitigation Experience Toolkit.html 107B
9.1 OpenPGP Best Practices.html 136B
9.1 Sigcheck.html 123B
9.1 The best antivirus software for Windows Client Business User.html 133B
9.2 httpsen.wikipedia.orgwikiAppArmor.html 99B
9.2 httpsraw.githubusercontent.comioerrorduraconfmasterconfigsgnupggpg.conf.html 141B
9.2 httpswww.snort.org.html 83B
9.2 Metadata ruins Google's anonymous eBay Australia protest.html 135B
9.2 Microsoft - Moving Beyond EMET.html 124B
9.2 VeraCrypt - Operating Systems Supported for System Encryption.html 154B
9.3 Enhanced Mitigation Experience Toolkit (EMET).html 114B
9.3 httpskernsec.orgwikiindex.phpKernel_Self_Protection_Project.html 126B
9.3 httpsloc.alize.us.html 82B
9.3 httpssuricata-ids.org.html 86B
9.3 Veracrypt.html 92B
9.4 httpopenwips-ng.org.html 84B
9.4 httpsgrsecurity.netfeatures.php.html 96B
9.4 Process Explorer.html 125B
9.4 Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS.html 174B
9.4 The 13 Most Embarrassing Web Moments.html 123B
9.5 ANGLER EXPLOIT KIT EVADING EMET.html 138B
9.5 Busted! FBI led to Anonymous hacker after he posts picture of girlfriend's breasts online.html 198B
9.5 httpselinuxproject.orgpageMain_Page.html 101B
9.5 IsTrueCryptAuditedYet Yes!.html 94B
9.6 Compare Security Frameworks.html 95B
9.6 Nitrokey.com.html 87B
9.6 Process Explorer.html 125B
9.6 The views of Iraq you weren’t supposed to see.html 108B
9.7 CVE-2015-2545 ITW EMET Evasion.html 142B
9.7 Geotagging poses security risks.html 128B
9.7 httpswww.debian.orgdocmanualssecuring-debian-howto.html 118B
9.7 Veracrypt FAQ.html 110B
9.8 EMET Guide To New Features - Video.html 122B
9.8 The United States Government Configuration Baseline (USGCB).html 102B
9.8 Truecrypt 7 Derived CodeWindows Incorrect Impersonation Token Handling EoP.html 130B
9.9 httpswww.open-scap.orgsecurity-policiesscap-security-guide.html 125B
9.9 Truecrypt 7 Derived CodeWindows Drive Letter Symbolic Link Creation EoP.html 130B
9.9 Whitepaper on Bypassing ASLRDEP.html 102B
9. Business End Point Protection (EPP).mp4 5.14MB
9. Business End Point Protection (EPP).vtt 2.43KB
9. Improving OpenPGP Security - Best Practices - Part 1.mp4 5.57MB
9. Improving OpenPGP Security - Best Practices - Part 1.vtt 2.40KB
9. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n.mp4 9.24MB
9. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n.vtt 5.46KB
9. Linux – Hardening.mp4 9.04MB
9. Linux – Hardening.vtt 4.18KB
9. Scrubbing EXIF & Metadata Part 1 - Introduction.mp4 16.23MB
9. Scrubbing EXIF & Metadata Part 1 - Introduction.vtt 7.87KB
9. Video and Voice Messengers - Jitsi.mp4 3.73MB
9. Video and Voice Messengers - Jitsi.vtt 1.86KB
9. Windows - Disk Encryption - VeraCrypt.mp4 25.05MB
9. Windows - Disk Encryption - VeraCrypt.vtt 13.21KB
9. Windows - Exploitation Prevention - EMET.mp4 37.37MB
9. Windows - Exploitation Prevention - EMET.vtt 13.67KB
9. Windows - Malware Seek & Destroy - Sigcheck.mp4 4.55MB
9. Windows - Malware Seek & Destroy - Sigcheck.vtt 2.79KB
Distribution statistics by country
France (FR) 2
Israel (IL) 1
United States (US) 1
Total 4
IP List List of IP addresses which were distributed this torrent