<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:photo="http://www.pheed.com/pheed/"
	xmlns:media="http://search.yahoo.com/mrss"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<channel>
	<title>neodean01さんの新着動画</title>
	<link>https://liaoningmovie.net/member?mid=93660856</link>
	<description><![CDATA[]]></description>
	<dc:language>ja</dc:language>
	<dc:creator>FC2, Inc.</dc:creator>
	<dc:date>Thu, 28 Jan 2010 23:45:06 +0900</dc:date>
		
	<item>
		<title>WPA (Wi-Fi Protected Access) Part 1</title>
		<link>https://liaoningmovie.net/content/20100128vE0rsvYG/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20100128vE0rsvYG/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this lab you will connect to a wireless access point that is running Wi-Fi protected access WPA which uses Temporal Key Integrity Protocol and Message Integrity Check

Lets firs look at the type of the computer we are working on ..]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Thu, 28 Jan 2010 23:45:06 +0900</dc:date>
	</item>
	<item>
		<title>Foorprinting Tools â Logical Security</title>
		<link>https://liaoningmovie.net/content/20091224yw0C3046/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091224yw0C3046/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video, we will demonstrate some common tools used for footprinting in the information gathering phase.

The first online tool we will use for footprinting is âSamspade.orgâ. This tool returns the âWhoisâ information about the target domain which]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Thu, 24 Dec 2009 00:41:30 +0900</dc:date>
	</item>
	<item>
		<title>Enumeration Logical security</title>
		<link>https://liaoningmovie.net/content/20091222AxLhGke7/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091222AxLhGke7/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Enumeration is defined as the process of extracting user names, machine name, network resources, network shares and services from a system. In this video we will demonstrate some common Windows enumeration tools.
GetAcct allows you to reverse-lookup Windows account RID values to get user account name.

UserDump enumerates all users on a specified Windows machine and dumps information such as userid, last logon, password expiry, etc.]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Tue, 22 Dec 2009 04:05:01 +0900</dc:date>
	</item>
	<item>
		<title>DoS Attack - Logical Security</title>
		<link>https://liaoningmovie.net/content/20091124ppRBvFw4/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091124ppRBvFw4/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video weâll explore how a Land Attack is carried out. A Land Attack is a type of remote Denial of Service (DoS) attack carried out by sending spoofed packets to a target host with the source IP and port set the same as the target IP and port.]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Tue, 24 Nov 2009 00:29:57 +0900</dc:date>
	</item>
	<item>
		<title>Metasploit</title>
		<link>https://liaoningmovie.net/content/200911215M35Cerv/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/200911215M35Cerv/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Metasploit Framework is a tool for developing and executing exploit code against a remote target machine. In this video, weâll demonstrate the basic usage of this program.

Weâll use the âifconfigâ command to check our current IP address. Now lets]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Sat, 21 Nov 2009 00:10:13 +0900</dc:date>
	</item>
	<item>
		<title>Phenomena radio frequency signals: Lab 3 LS audio</title>
		<link>https://liaoningmovie.net/content/200911204h6DSypD/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/200911204h6DSypD/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Here we will go through the Phenomena of radio frequency signals with the different type of modulation 
Frequency Modulation or fn Modulation
Phase shifting or phase shifting and interference
Attenuation]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Fri, 20 Nov 2009 05:55:59 +0900</dc:date>
	</item>
	<item>
		<title>John the Ripper</title>
		<link>https://liaoningmovie.net/content/20091120CLC75WWe/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091120CLC75WWe/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video weâll demonstrate offline password cracking using John The Ripper tool.

Letâs first change to the directory where John is located. Here you can see some important binaries used by John.]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Fri, 20 Nov 2009 04:09:25 +0900</dc:date>
	</item>
	<item>
		<title>Active and Passive OS Fingerprinting</title>
		<link>https://liaoningmovie.net/content/20091120r0tHz14F/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091120r0tHz14F/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video weâll focus on two types of OS fingerprinting techniques, active and passive fingerprinting and the tools used for them.
For passive fingerprinting weâll look at p0f and Ettercap. For active fingerprinting, weâll look at two fingerprinting]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Fri, 20 Nov 2009 00:45:49 +0900</dc:date>
	</item>
	<item>
		<title>Hping by Shon Harris</title>
		<link>https://liaoningmovie.net/content/20091119BpTmBr0b/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091119BpTmBr0b/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video well explore Hping. Hping is a command-line oriented TCP/IP packet assembler/analyzer which is generally used for activities like firewall testing and advanced port scanning.]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Thu, 19 Nov 2009 06:32:27 +0900</dc:date>
	</item>
	<item>
		<title>DNS Spoofing by Shon Harris</title>
		<link>https://liaoningmovie.net/content/20091119f3vXR3Mu/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091119f3vXR3Mu/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video weâll demonstrate a DNS spoofing attack by creating a rouge DNS server that will redirect legitimate incoming DNS requests from our network to rouge IP addresses using the Ettercap dns_spoof plugin.]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Thu, 19 Nov 2009 03:42:29 +0900</dc:date>
	</item>
	<item>
		<title>Netcat Tool</title>
		<link>https://liaoningmovie.net/content/20091119WNe7a1kG/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091119WNe7a1kG/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video weâll demonstrate the Netcat tool. This tool is a feature packed networking utility which can read and write data across a network, using TCP/IP. We will go through the various features o Netcat, such as file transferring, banner grabbing, scanning and using Netcat as a backdoor.]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Thu, 19 Nov 2009 02:39:17 +0900</dc:date>
	</item>
	<item>
		<title>DNS and Traceroute</title>
		<link>https://liaoningmovie.net/content/20091116krfnYYDa/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20091116krfnYYDa/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video, weâll discuss some basic DNS enumeration tools like âdigâ, ânslookupâ and âhostâ.
Weâll use the âdigâ (Domain Internet Groper) tool to query the DNS server to resolve âwww.logicalsecurity.comâ.

Weâll now use the ânsâ switch to query the DNS server to return the same server of âwww.logicalsecurity.comâ.

The âmxâ (mail exchanger) switch returns the mail servers of âlogicalsecurity.comâ.

The âaxfrâ switch is used for zone transfer. Although in our case, it has failed as most secure DNS servers do not allow zone transfers.

The ânslookupâ tool is used for the same purpose as âdigâ, but is seldom used in the linux environment. Once we enter ânslookupâ, and interactive prompt appears where we can enter âset type=nsâ or âet type=mxâ for name and mail servers respectively.

Another commonly used tool for DNS lookups is âhostâ. The â-tâ specifies the query types, in our case they are ânsâ, âmxâ and âcnameâ for the name server, mail server and canonical name respectively.

The â-lâ switch lists ...]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Mon, 16 Nov 2009 00:32:08 +0900</dc:date>
	</item>
	<item>
		<title>Online Password Cracking and Working of HYDRA :</title>
		<link>https://liaoningmovie.net/content/20090614ydYPDyZn/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090614ydYPDyZn/"><img src="http://www.veoh.com/up/thumb/" /></a><br />This video demonstrates the working of HYDRA, an online password cracking tool,

Here Before we start âHYDRAâ weâll lookup our current IP address using âifconfizâ command. Weâll also scan one of our target hosts using âNmapâ

In the target tab we will specify the address, port and protocol for our target (obtained by Nmap scan earlier).
We will now specify the targetâs username and a wordlist containing possible password

Letâs view the contents of the wordlist file

The program also allows you to fine tune your attack parameters
Program has now discovered the password for our specified username.
Now letâs look at another example, this time lets break into a FTP Server

Now user suppose that we did not know user name of our target we will then specify a target list similar to password list provided in our earlier attack


Letâs decrease the number of simultaneous connection to minimize network congestion.

You can see that program has discover both user name and password
Letâs access our target using the ...]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Sun, 14 Jun 2009 23:33:09 +0900</dc:date>
	</item>
	<item>
		<title>Offline Password Cracking - John The Ripper tool</title>
		<link>https://liaoningmovie.net/content/20090613zTfVaEvF/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090613zTfVaEvF/"><img src="http://www.veoh.com/up/thumb/" /></a><br />In this video weâll demonstrate offline password cracking using John The Ripper tool.

Lets first change to the directory where John is located. Here you can see some important binaries used by John.
First weâll execute the âunshadowâ script which will merge the â/etc/passâ and â/etc/shadowâ files into a single file, called âcrack.dbâ. This file will be used by John for password brute force attack.

Letâs see the content of the crack.db file

You can see there are various option that can be used for cracking password using John.

You can see that the brute force attack we previously initiated is still under progress.
John has now discovered the password âtoorâ for the user ârootâ.
Now lets uses the ââshowâ switch to display the password in plaintext.
John stores the obtained passwords in the âjohn. Potâ file.

You can see that the dictionary attack (in console 2) has now been completed and john has revealed 4 passwords.
Youâll notice that the dictionary attack was much faster than the brute force attack ...]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Sat, 13 Jun 2009 07:28:55 +0900</dc:date>
	</item>
	<item>
		<title>Access Control Fundamental and Methodology</title>
		<link>https://liaoningmovie.net/content/20090528f0Yf0nrH/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090528f0Yf0nrH/"><img src="http://www.veoh.com/up/thumb/" /></a><br />First line of Logical Protection:
Access control is the first line of protection of a companyâs assets &amp; several technologies are usedâ¦

Access Control Technology:
Subject is an active entity attempting to access an object, Object is a]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Thu, 28 May 2009 23:22:30 +0900</dc:date>
	</item>
	<item>
		<title>Logical Security</title>
		<link>https://liaoningmovie.net/content/20090527nwvu4HbC/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090527nwvu4HbC/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Logical security]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Wed, 27 May 2009 22:55:55 +0900</dc:date>
	</item>
	<item>
		<title>Changes in Computing Environments, Management responsibilities</title>
		<link>https://liaoningmovie.net/content/200904294tTPnAtU/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/200904294tTPnAtU/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Security has changed drastically over the last 5-10 yearsâ¦
10-15 years ago only a few people interacted with mainframes &amp; dumb terminals
Computing power has brought down to individual desktops. More people interacted with technology
Users were then able to cause much more damage, either through mistake or maliciously
In todayâs complex environment we work in distributed networks; intranet, extranets, Internet, wireless, etc]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Wed, 29 Apr 2009 00:10:46 +0900</dc:date>
	</item>
	<item>
		<title>Understanding business impact, Risk Analysisâ Goals, Identifying Team Members, Asset Identification</title>
		<link>https://liaoningmovie.net/content/20090428UYqA726a/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090428UYqA726a/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Risk Management 
Set an acceptable level of risk. Risk management ensures that this level is not exceeded
Risk management is responsible for identifying vulnerabilities &amp; threats &amp; calculating risks involved.
Identifying Team Members
Asset Identification
for more information go to www.logicalsecurity.com]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Tue, 28 Apr 2009 05:58:12 +0900</dc:date>
	</item>
	<item>
		<title>Specific Threats &amp; Risk Analysis, Potential versus Delayed Risk, Qualitative versus Quantitative</title>
		<link>https://liaoningmovie.net/content/20090428sU9ea0dW/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090428sU9ea0dW/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Potential versus Delayed Risk:
Risk Types:
Potential risk: Experienced at the time of exposure.
Delayed risk: Experienced later

Delayed loss is harder to identify, compared to potential loss
An effective risk analysis will identify several different types of potential losses &amp; delayed losses


Qualitative versus Quantitative
Risk Analysis Approaches

A quantitative risk analysis uses percentages &amp; monetary numeric values.
A qualitative risk analysis is based on opinions &amp; experience. It uses a rating system.
A qualitative approach relies on information coming from company experts, who are closest to the assets.
For more knowledge go to www.logicalsecurity.com]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Tue, 28 Apr 2009 04:25:36 +0900</dc:date>
	</item>
	<item>
		<title>Cost Benefit\Analysis, Using the Results of the Analysis</title>
		<link>https://liaoningmovie.net/content/20090428V3nHqqeh/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090428V3nHqqeh/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Description
A cost\benefit analysis compares countermeasure costs with money saved by having it in placeâ¦

After an analysis is completed on the assets, their threats, risks, &amp; countermeasures are identified

A cost \ benefit analysis compares countermeasure costs with money saved by having it in place
Cost of countermeasure = cost of purchase, maintenance, affects on productivity, updating, interoperability
Only by understanding the cost &amp; benefit of a countermeasure can a good business decision be made

ALE Before Implementing Countermeasure


ALE after Implementing Countermeasure
For more information goto www.logicalsecurity.com]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Tue, 28 Apr 2009 01:41:16 +0900</dc:date>
	</item>
	<item>
		<title>Managing and Mitigating Risk, Ways of Dealing with Risk</title>
		<link>https://liaoningmovie.net/content/20090428MWR7v0xQ/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090428MWR7v0xQ/"><img src="http://www.veoh.com/up/thumb/" /></a><br />Of the different ways of dealing with risk, senior management will decide which is best for their company...]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Tue, 28 Apr 2009 00:35:40 +0900</dc:date>
	</item>
	<item>
		<title>Security Plociy &amp; Security Approaches, Necessary Security Component, Items Supporting the Security Policy</title>
		<link>https://liaoningmovie.net/content/20090427tk3VG6Eu/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090427tk3VG6Eu/"><img src="http://www.veoh.com/up/thumb/" /></a><br />IT &amp; management should learn to speak each other&#039;s language &amp; understand why they do what they do...]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Mon, 27 Apr 2009 23:34:43 +0900</dc:date>
	</item>
	<item>
		<title>Protecting Sensitive Data Information Classification</title>
		<link>https://liaoningmovie.net/content/200904279V9wWetG/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/200904279V9wWetG/"><img src="http://www.veoh.com/up/thumb/" /></a><br />&quot;To many companies today, data is one of their most important assets &amp; needs to be protected..&quot;
A classification scheme is developed to protect data&#039;s confidentiality, integrity, &amp; availability
If data is not declassified correctly, company resources can be wasted]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Mon, 27 Apr 2009 02:56:03 +0900</dc:date>
	</item>
	<item>
		<title>Domain Wrap-up, Security Management Practice</title>
		<link>https://liaoningmovie.net/content/20090426r5p3LaxB/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090426r5p3LaxB/"><img src="http://www.veoh.com/up/thumb/" /></a><br />&quot;Administrative controls are soft in nature but technical &amp; physical controls ar not...&quot;
Management Must ensure that physical, technical &amp; administrative controls are rolled out &amp; maintained
Management Must designate fan acceptable level of risk for the risk management team to maintain
The AIC traid: availability, integrity, confidentiality
Risk analysis is a tool used by the risk management team to help define a security budget
If you do not know these concepts, reread the necessary section in the book &amp; review this domain]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Sun, 26 Apr 2009 22:31:35 +0900</dc:date>
	</item>
	<item>
		<title>Security Management Practice</title>
		<link>https://liaoningmovie.net/content/20090424f5dupAKV/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090424f5dupAKV/"><img src="http://www.veoh.com/up/thumb/" /></a><br />This video is the part3 of the domain1 for logical security course.
The main focus of this video is Security Management Practice, Threats to a Company and its Assets]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Fri, 24 Apr 2009 23:06:16 +0900</dc:date>
	</item>
	<item>
		<title>Administrative Responsibilities, Legal Aspects of Security</title>
		<link>https://liaoningmovie.net/content/20090424JHmEwtEx/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090424JHmEwtEx/"><img src="http://www.veoh.com/up/thumb/" /></a><br />The main focus of this video is about the Administrative Responsibilities , Legal Aspects of Security, Traditional Security 
Services for more information about logical security and network security go to www.logicalsecurity.com]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Fri, 24 Apr 2009 07:27:57 +0900</dc:date>
	</item>
	<item>
		<title>Logical Security</title>
		<link>https://liaoningmovie.net/content/20090424u2kKgmmt/</link>
		<description><![CDATA[<a href="https://liaoningmovie.net/content/20090424u2kKgmmt/"><img src="http://www.veoh.com/up/thumb/" /></a><br />This video is related to the cours ( Lovical Security &quot;Logical Security, CISSP Solution Set, CISSP Instructor Lead Course, Intrusion Prevention System&quot;)]]></description>
		<dc:subject>ゲーム CG</dc:subject>
		<dc:date>Fri, 24 Apr 2009 04:40:05 +0900</dc:date>
	</item>

		
	</channel>
</rss>
