Upload
2,220
  • Team Cymru in the UK: TC-UK INTERNET SECURITY

    1K views 1 year ago
    NOW OPEN! http://www.team-cymru.com/T...

    Team Cymru is pleased to announce our new office in Winchester, England under the name TC-UK Internet Security. Show less
    Read more
  • Uploads Play all

    This item has been hidden
  • Popular uploads Play all

    • Episode 48: Fake Passports - Duration: 5 minutes, 16 seconds.

      • 6 years ago
      • 12,937 views
      This week Levi Gundert talks about a paper we're publishing this week, at:
      https://www.team-cymru.org/ReadingRoom/Whitepapers/
      We explore the recent surge in quality and availability of forged pa...
    • Episode 31: Botnet Basics - Duration: 9 minutes, 35 seconds.

      • 6 years ago
      • 9,351 views
      In the 31st episode of Team Cymru's 'The Who and Why Show', we walk through the fundamentals of the three basic types of botnet Command and Control (C&C) technologies: IRC (Internet Relay Chat) bas...
    • Episode 14: NMAP - Duration: 6 minutes, 40 seconds.

      • 6 years ago
      • 8,976 views
      In the Fourteenth episode of Team Cymru's 'The Who and Why Show', we have the second in an occasional series designed to directly assist network administrators, looking at various Open Source Tools...
    • Episode 9: DNS Amplification Attacks - Duration: 5 minutes, 5 seconds.

      • 7 years ago
      • 8,962 views
      In the ninth episode of Team Cymru's 'The Who and Why Show', we're joined by 2 guest speakers to find out about DNS Amplification Attacks and a new service Team Cymru is launching to try to prevent...
    • Enterprise Intelligence Service (EIS) Case Study - Duration: 87 seconds.

      • 3 years ago
      • 8,618 views
      A short case study detailing one of our recent investigations and the EIS service
      See http://www.team-cymru.com/Services/EIS/ for more information and to download a pdf report detailing the investi...
    • Episode 107: DDoS mitigation & visualization + conference and training updates - Duration: 19 minutes.

      • 4 years ago
      • 8,063 views
      This time we have part 4 of James's great DDoS Mitigation and Prevention class where we analyze an SNMP Amplification attack with a movie of the data. We also have another movie showing the DDoS at...
    • Episode 19: NFSEN and NFDUMP - Duration: 9 minutes, 7 seconds.

      • 6 years ago
      • 7,695 views
      In the Nineteenth episode of Team Cymru's 'The Who and Why Show', we have the sixth in an occasional series designed to directly assist network administrators, looking at various Open Source Tools ...
    • Episode 13: SNORT - Duration: 5 minutes, 45 seconds.

      • 6 years ago
      • 6,242 views
      In the Thirteenth episode of Team Cymru's 'The Who and Why Show', we have the first in an occasional series designed to directly assist network administrators: we'll be looking at various Open Sour...
    • Episode 1: Carding - Duration: 4 minutes, 12 seconds.

      • 7 years ago
      • 5,306 views
      In the first episode of Team Cymru's 'The Who and Why Show', Levi Gundert talks about 'Carding' - the fraudulent use of our credit cards by online miscreants. Levi is an ex-United States Secret Ser...
    • Episode 15: MRTG - Duration: 7 minutes, 13 seconds.

      • 6 years ago
      • 4,869 views
      In the Fifteenth episode of Team Cymru's 'The Who and Why Show', we have the third in an occasional series designed to directly assist network administrators, looking at various Open Source Tools t...
    • Episode 105: Email Forensics, DDoS Mitigation Steps & Animations - Duration: 25 minutes.

      • 4 years ago
      • 4,130 views
      We cover the final part in our series on interpreting email headers - this time going through some examples in detail. We also continue our series on DDoS attack mitigation techniques and we show a...
    • Episode 106: Security Scripting, DDoS Tuning & Animations - Duration: 33 minutes.

      • 4 years ago
      • 3,529 views
      This time John Kristoff covers an introduction to shell and Perl scripting for Network Operators:useful scripts and stuff we've used in the past to secure networks and interface with different syst...
    This item has been hidden
to add this to Watch Later

Add to

Loading playlists...