Enviar pesquisa
Carregar
SYDO - Secure Your Data by Obscurity
•
Transferir como PPT, PDF
•
0 gostou
•
492 visualizações
Avădănei Andrei
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 16
Baixar agora
Recomendados
SYDO - Secure Your Data by Obscurity
SYDO - Secure Your Data by Obscurity
DefCamp
Managing Secrets in Production
Managing Secrets in Production
Erik Osterman
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Hacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databases
sunil kumar
WordPress Security Master Plan
WordPress Security Master Plan
ServerGuy
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
Recomendados
SYDO - Secure Your Data by Obscurity
SYDO - Secure Your Data by Obscurity
DefCamp
Managing Secrets in Production
Managing Secrets in Production
Erik Osterman
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
qqlan
Hacking databases
Hacking databases
sunil kumar
Hacking databases
Hacking databases
sunil kumar
WordPress Security Master Plan
WordPress Security Master Plan
ServerGuy
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
John Staveley
Why the cloud is more secure than your existing systems
Why the cloud is more secure than your existing systems
Ernest Mueller
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
CiNPA Security SIG
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
Blockchain @ Descon 2016
Blockchain @ Descon 2016
P-e-t-a-r
Sql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Karen Lopez
Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
Enumerating Windows Users
Enumerating Windows Users
UTD Computer Security Group
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
How you can become a hacker with no security experience
How you can become a hacker with no security experience
Avădănei Andrei
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Avădănei Andrei
Mais conteúdo relacionado
Semelhante a SYDO - Secure Your Data by Obscurity
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
CiNPA Security SIG
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
phanleson
Pentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
Blockchain @ Descon 2016
Blockchain @ Descon 2016
P-e-t-a-r
Sql server security in an insecure world
Sql server security in an insecure world
Gianluca Sartori
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Karen Lopez
Scada Strangelove - 29c3
Scada Strangelove - 29c3
qqlan
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
Enumerating Windows Users
Enumerating Windows Users
UTD Computer Security Group
cyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
Semelhante a SYDO - Secure Your Data by Obscurity
(20)
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Cloud computing security
Cloud computing security
Enterprise Cloud Security - Concepts Mash-up
Enterprise Cloud Security - Concepts Mash-up
iOS Security: The Never-Ending Story of Malicious Profiles
iOS Security: The Never-Ending Story of Malicious Profiles
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
PwnSchool: Exploiting Web APIs
PwnSchool: Exploiting Web APIs
Hacking identity: A Pen Tester's Guide to IAM
Hacking identity: A Pen Tester's Guide to IAM
302 Content Server Security Challenges And Best Practices
302 Content Server Security Challenges And Best Practices
Pentesting Android Apps
Pentesting Android Apps
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Blockchain @ Descon 2016
Blockchain @ Descon 2016
Sql server security in an insecure world
Sql server security in an insecure world
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
A Designer's Favourite Security and Privacy Features in SQL Server and Azure ...
Scada Strangelove - 29c3
Scada Strangelove - 29c3
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
Enumerating Windows Users
Enumerating Windows Users
cyber-security-reference-architecture
cyber-security-reference-architecture
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Mais de Avădănei Andrei
How you can become a hacker with no security experience
How you can become a hacker with no security experience
Avădănei Andrei
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Avădănei Andrei
Wordpress Plugins Scanner
Wordpress Plugins Scanner
Avădănei Andrei
DefCamp 2012 @Bucharest
DefCamp 2012 @Bucharest
Avădănei Andrei
A journey through an INFOSEC labyrinth
A journey through an INFOSEC labyrinth
Avădănei Andrei
Polish the Wheel
Polish the Wheel
Avădănei Andrei
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
Avădănei Andrei
SmartFender
SmartFender
Avădănei Andrei
Xss is more than a simple threat
Xss is more than a simple threat
Avădănei Andrei
Arta de a susţine o prezentare
Arta de a susţine o prezentare
Avădănei Andrei
Spaghetti Code vs MVC
Spaghetti Code vs MVC
Avădănei Andrei
Mais de Avădănei Andrei
(11)
How you can become a hacker with no security experience
How you can become a hacker with no security experience
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Honeypots - The Art of Building Secure Systems by Making them Vulnerable
Wordpress Plugins Scanner
Wordpress Plugins Scanner
DefCamp 2012 @Bucharest
DefCamp 2012 @Bucharest
A journey through an INFOSEC labyrinth
A journey through an INFOSEC labyrinth
Polish the Wheel
Polish the Wheel
Virtual Anonimity – What? Why? When? How?
Virtual Anonimity – What? Why? When? How?
SmartFender
SmartFender
Xss is more than a simple threat
Xss is more than a simple threat
Arta de a susţine o prezentare
Arta de a susţine o prezentare
Spaghetti Code vs MVC
Spaghetti Code vs MVC
Último
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Último
(20)
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
SYDO - Secure Your Data by Obscurity
1.
SYDO – Secure
Your Data by Obscurity Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
2.
Let's make some
research :-)
3.
4.
5.
We should be
more careful!
6.
But we are
lazy...
7.
8.
How it works?
9.
10.
11.
Demo
12.
13.
14.
15.
Questions?
16.
Baixar agora