article thumbnail

What’s Free at Linux Academy — May 2019

Linux Academy

By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and Cloud skills further. Each month, we will kick off our community content with a live study group allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.

Linux 113
article thumbnail

What’s Free at Linux Academy — May 2019

Linux Academy

By adding free cloud training to our Community Membership, students have the opportunity to develop their Linux and Cloud skills further. Each month, we will kick off our community content with a live study group allowing members of the Linux Academy community to come together and share their insights in order to learn from one another.

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

Traditional anti-malware research relies on customer systems but what if a particular malware wasn’t on the same platform as your solution software? éveillé from ESET joins The Hacker Mind podcast to talk about the challenges of building his own internet scanner to scan for elusive malware. Marc-Etienne M.Léveillé

article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

So for instance in 2017 during the whole WannaCry, and NotPetya phenomenon. Vamosi: WannaCry and NotPetya were ransomware campaigns in 2017. Unlike other malware, ransom not only infected machines, it encrypted all the data, then asked for a ransom to decrypt them. The more famous of these is Kali Linux, from Offensive Security.

Network 52
article thumbnail

The Hacker Mind Podcast: So You Want To Be A Pentester

ForAllSecure

So for instance in 2017 during the whole WannaCry, and NotPetya phenomenon. Vamosi: WannaCry and NotPetya were ransomware campaigns in 2017. Unlike other malware, ransom not only infected machines, it encrypted all the data, then asked for a ransom to decrypt them. The more famous of these is Kali Linux, from Offensive Security.

Network 52
article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

And after I was done, so that all happened, and I was able to reproduce this 2017 bug and mosquito. This is how malware, for example, is analyzed; if the virtual machine gets infected and crashes, the physical machine isn’t impacted. And I wrote an article about it, and, and that was fine.

article thumbnail

History of Computer Hacking and Cybersecurity Threats: From the 50s to Today

ForAllSecure

The 1980s also saw the emergence of computer viruses and malware as a significant threat to computer security. One of the most famous malware of this era was the Morris worm , which was created by a graduate student named Robert Tappan Morris Jr. The early 2010s also saw the growing use of social media by hackers and cybercriminals.

Malware 75