Upload
2,012

Team Cymru

  • Team Cymru in the UK: TC-UK INTERNET SECURITY

    1,248 views 7 months ago
    NOW OPEN! http://www.team-cymru.com/T...

    Team Cymru is pleased to announce our new office in Winchester, England under the name TC-UK Internet Security. Show less
    Read more
  • Uploads Play

    This item has been hidden
  • Popular uploads Play

    • Episode 48: Fake Passports - Duration: 5 minutes, 16 seconds.

      • 5 years ago
      • 12,645 views
      This week Levi Gundert talks about a paper we're publishing this week, at:
      https://www.team-cymru.org/ReadingRoom/Whitepapers/
      We explore the recent surge in quality and availability of forged pa...
    • Episode 14: NMAP - Duration: 6 minutes, 40 seconds.

      • 5 years ago
      • 8,705 views
      In the Fourteenth episode of Team Cymru's 'The Who and Why Show', we have the second in an occasional series designed to directly assist network administrators, looking at various Open Source Tools...
    • Episode 31: Botnet Basics - Duration: 9 minutes, 35 seconds.

      • 5 years ago
      • 8,634 views
      In the 31st episode of Team Cymru's 'The Who and Why Show', we walk through the fundamentals of the three basic types of botnet Command and Control (C&C) technologies: IRC (Internet Relay Chat) bas...
    • Enterprise Intelligence Service (EIS) Case Study - Duration: 87 seconds.

      • 2 years ago
      • 8,313 views
      A short case study detailing one of our recent investigations and the EIS service
      See http://www.team-cymru.com/Services/EIS/ for more information and to download a pdf report detailing the investi...
    • Episode 9: DNS Amplification Attacks - Duration: 5 minutes, 5 seconds.

      • 5 years ago
      • 7,680 views
      In the ninth episode of Team Cymru's 'The Who and Why Show', we're joined by 2 guest speakers to find out about DNS Amplification Attacks and a new service Team Cymru is launching to try to prevent...
    • Episode 107: DDoS mitigation & visualization + conference and training updates - Duration: 19 minutes.

      • 3 years ago
      • 7,439 views
      This time we have part 4 of James's great DDoS Mitigation and Prevention class where we analyze an SNMP Amplification attack with a movie of the data. We also have another movie showing the DDoS at...
    • Episode 13: SNORT - Duration: 5 minutes, 45 seconds.

      • 5 years ago
      • 6,107 views
      In the Thirteenth episode of Team Cymru's 'The Who and Why Show', we have the first in an occasional series designed to directly assist network administrators: we'll be looking at various Open Sour...
    • Episode 19: NFSEN and NFDUMP - Duration: 9 minutes, 7 seconds.

      • 5 years ago
      • 6,043 views
      In the Nineteenth episode of Team Cymru's 'The Who and Why Show', we have the sixth in an occasional series designed to directly assist network administrators, looking at various Open Source Tools ...
    • Episode 1: Carding - Duration: 4 minutes, 12 seconds.

      • 5 years ago
      • 4,878 views
      In the first episode of Team Cymru's 'The Who and Why Show', Levi Gundert talks about 'Carding' - the fraudulent use of our credit cards by online miscreants. Levi is an ex-United States Secret Ser...
    • Episode 15: MRTG - Duration: 7 minutes, 13 seconds.

      • 5 years ago
      • 4,660 views
      In the Fifteenth episode of Team Cymru's 'The Who and Why Show', we have the third in an occasional series designed to directly assist network administrators, looking at various Open Source Tools t...
    • Episode 105: Email Forensics, DDoS Mitigation Steps & Animations - Duration: 25 minutes.

      • 3 years ago
      • 3,692 views
      We cover the final part in our series on interpreting email headers - this time going through some examples in detail. We also continue our series on DDoS attack mitigation techniques and we show a...
    • Episode 106: Security Scripting, DDoS Tuning & Animations - Duration: 33 minutes.

      • 3 years ago
      • 3,291 views
      This time John Kristoff covers an introduction to shell and Perl scripting for Network Operators:useful scripts and stuff we've used in the past to secure networks and interface with different syst...
    This item has been hidden
Sign in to add this to Watch Later

Add to

Loading playlists...