Demystifying The Cloud, a look at Hyperscale Computing From a Hacker Perspective Nick Fury

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=JlhGnbONKtc



Duration: 54:27
0 views
0


CarolinaCon - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CarolinaCon
https://carolinacon.org/
CarolinaCon is a regional, technology hacking and InfoSec conference, held annually in North Carolina.

The conference was founded in 2004 by members of the Raleigh 2600 group. CarolinaCon has focused on presenting educational materials from a variety of guest speakers on various aspects of computing, technology, and information security.

The event is currently sponsored by the 501(c)3 non-profit organization "The Carolinacon Group". The goal of hosting the event is to provide an intimate, informal, and inexpensive venue for knowledge sharing.

A variety of side events has been an annual part of the conference, such as Wardriving, Lockpick Village, Capture The Flag, an "unofficial" Shooting event, Crypto Challenges, LAN gaming, Guitar Hero battle, Ham Radio, Crypto Key Signing, Vintage Tech Museum, etc. The Con generally closes with a game of Hacker Trivia.




Other Videos By All Hacking Cons


2022-01-30chill Art of Post infection Response and Mitigation
2022-01-30Andrew Shumate Cyber War Stories
2022-01-30Rob Weiss & John Eberhardt Machine Learning and Augmented Reality in Networking
2022-01-30@th3mojo RedneckSec
2022-01-30myddrn Cryptocurrency Laundering Theory for Fun and Retirement
2022-01-30digital shokunin How to design your You got hacked page
2022-01-30Unregistered & Snide Phony Business What Goes Around Comes Back Around
2022-01-30Lokesh Pidawekar Hacker s Practice Ground
2022-01-30surpherdave Social engineering is bullsh t, call it what it is
2022-01-30Justin Warner @sixdub & Will Schroeder @harmj0y Drilling Deeper with Veils PowerTools
2022-01-30Demystifying The Cloud, a look at Hyperscale Computing From a Hacker Perspective Nick Fury
2022-01-30Real World Social Engineering for the Geek Introvert Luke MindNinja Stephens
2022-01-30Simple Network Management Pwnd Deral Heiland Percent x and Matthew Kienow
2022-01-30Reverse Engineering Executables John F Davis Math for 400
2022-01-30Bypassing EMET 4 1 Jared DeMott
2022-01-30Building Botnets 101 Terrence O Connor
2022-01-30F ck These Guys Practical Counter Surveillance Lisa Lorenzin
2022-01-30AV Evasion with the Veil Framework HarmJ0y, Christopher Truncer, and Michael Wright
2022-01-30Exploiting the Bells and Whistles Uncovering OEM Vulnerabilities in Android Jake Valletta
2022-01-30Attacker Ghost Stories Mostly Free Defenses That Gives Attackers Nightmares mubix
2022-01-30Password Cracking for noobs All your hashes are belong to us smrk3r



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering