Search This Blog

Friday, January 23, 2009

Top10 YouTube hacking videos; Nortel chief flying in corporate jet as company goes into Chapt. 11

Top 10 hacking videos: watch and learn
Network World logo

Cisco Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by sletter is sposored by IBM
rule

sletter is sposored by IBM	Turn down the power and turn up the profits
The Network World Green IT Resource Center, sponsored by IBM, includes news, tips, podcasts, whitepapers and more to help you befriend the environment and your CFO.

rule

Spotlight Story

This is Network World's Cisco Subnet news alert in which we focus on the top items from Cisco Subnet, your daily source for Cisco news, blogs, discussion items, security alerts, giveaways and more.

Top 10 YouTube hacking videos
Cisco security expert blogger Jamey Heary writes: Hacking for fun, profit and to meet women. My favorite YouTube hacker videos range from the humorous to the downright frightening. Some of them demonstrate live hacks, while others demonstrate the use of hacker tools. I find that for learning, there is no better substitute for actually watching hackers in action (except for doing it yourself, which I am not advocating). Read more.

Related News:

More from Cisco Subnet:

Nortel chief flying in corporate jet as company files for bankruptcy protection

Ruckus Wireless looking to cause a commotion with its critique of Cisco's Wi-Fi technology

CCIE candidates motivated by career opportunities more than money

Brocade trumps Cisco in salary survey

Cisco patches CUCM, Cisco Security Manager

From our bloggers:

Brad Reese on Cisco: Nortel chief flying in corporate jet as company files for bankruptcy protection
Yours truly was totally shocked to learn that Nortel CEO Mike Zafirovski was still using a private jet, especially six days after Nortel filed for bankruptcy protection. As the company lays off thousands of workers, halts salary increases, institutes a hiring freeze, and confirms laid off Nortel employees will not be receiving their severance payments because of the bankruptcy filing, Zafirovski continued to use a private jet (often it appears to commute between a home and his office).

Michael Morris From the Field: Taking a closer look at the Cisco ASR 1000 Series
Even in a down economy we are getting ready to build a new data center. This data center will be a showcase virtualization design using the Nexus 7000 and Nexus 5000 series switches. However, one of the key parts of this new data center, other than the internal LAN, is the WAN connectivity. This data center will be our DEV/TEST/STAGE/DR data center so we will be copying large amounts of data from our production data center to the new facility.

Jamey Heary: Cisco Security Expert: PIX to ASA Configuration Migration Tool, time is running short
Ever since Cisco announced the EoS/EoL of the PIX customers have been migrating to the ASA platform. The configuration migration is very straightforward but to make it even easier Cisco developed a free Migration Tool. I’ll take you through how this very simple tool works.

Wendell Odom's Cisco Cert Zone: Does the job market push us towards multiple-CCxP?
Today I'll wrap up this thread of posts rambling about the job market. The last two such posts generated some good discussion and informal stats that I found interesting - particularly on the possible danger to CCIE's - and sparked another couple of survey's that I'll list today. I'll move on to something different next post, so if you wanted to comment on the job market stuff, here's the last blogspot on this topic for a while.

Dennis Hartmann on Cisco Unified Communications: The QoS Expedited Forwarding (EF) Model
The assured forwarding (AF) model is used to provide priority values to different data applications. The Expedited Forwarding (EF) model is used to provide resources to latency (delay) sensitive real-time, interactive traffic. The EF model uses one marking -- DSCP 46. DSCP 46 is backward compatible with an IP Precedence value of 5 as seen in the following binary pattern ...

Cisco Knowledge Share with Avner Izhar: Is my network healthy? The Macro level using SNMP
In my previous post I explained how to use Wireshark (or any other sniffer) to get a basic understanding of how your network performs. This does not require any knowledge of the current addresses or network devices, which makes it a good starting point. With that being said, it’s a very limited starting point since in a switched environment; you will only be exposed to the traffic which is in the vlan that you are connected to. In that vlan you will only see broadcasts and multicasts.

Jimmy Ray Purser: Networking geek to geek:GSM hacking - the next big thing
I was asked by one of dudes at my monthly hackers meeting if I have been hacking GSM lately. I told them, no, I not really interested in cell phone technology plus the equipment to monitor 850MHz and 1800MHz to gather enough info to be useful to find a hole to exploit is too much for me to expense and much more then I wife would notice missing. He told me, no gear is required to find a hole, just use a pencil.

Larry Chaffin: Putting realism into your network: Riverbed announced it has agreed to acquire Mazu Networks
Riverbed makes a bold move to purchase Mazu Networks. Is this a good or bad move for Riverbed? Who could be next?

Scott Hogg on core networking and security: Cisco IPv6 Support Comes Standard
I wanted to share with you something that I have observed in the recent release notes for some of the newest Cisco IOS versions. I am realizing that more and more IPv6 functionality is being developed and integrated into the latest versions. Recently I was reading some Cisco IOS release notes and I have noticed a lot more frequent mention of new IPv6 features. I recognize that not many people sit around and look at release notes for Cisco IOS anymore. I got in the habit of reading these when I was studying for my CCIE as I wanted to anticipate what they might throw at my on the lab.

Hot discussions among Cisco Subnet readers:

Padmasree Warrior as U.S. CTO: Huge win for Cisco, total disaster for America

Job Prospects Better for CCxP than CCIE?

Three reasons why Obama's BlackBerry is a national security threat

Nortel chief flying in corporate jet as company files for bankruptcy protection

Why are you trying to obtain your CCIE?

Top 10 YouTube hacking videos

January freebies and giveaways:

Win free books:

1. Win one of 15 copies of the Cisco Press book IPv6 Security by Scott Hogg and Eric Vyncke. Deadline for entry is Jan.31. Plus, read Chapter 1: Introduction to IPv6
Enter to win by clicking here.

2. Win one of 15 copies of the Cisco Press book Chained Exploits: Advanced Hacking Attacks by Andrew Whitaker, Keatron Evans, and Jack Voth. Deadline for entry is Jan.31. Plus, read Chapter 2: Multidimensional Space
Enter to win by clicking here.

Win free training:

We're also giving away two free seats to any Skyline-ATS-delivered course, worth a total of $6,990. The winner gets to select two courses, worth up to $3,495 each, or select one course and give the other seat to a friend. Entry details here.

View our library of exclusive Cisco Press book chapters here and rate your favorite Cisco Press books/exclusive chapters here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by sletter is sposored by IBM
rule

sletter is sposored by IBM	Turn down the power and turn up the profits
The Network World Green IT Resource Center, sponsored by IBM, includes news, tips, podcasts, whitepapers and more to help you befriend the environment and your CFO.

rule

Compare VoIP Monitoring and Analysis Products

Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's newly enhanced VoiP Monitoring, Analysis and Management Product Guide.

Click here to visit now.


IT Search: Recapture Control Over Your IT Infrastructure.
Introducing IT Search, a scalable, versatile and dynamic way to manage the modern data center. Read how IT Search will help your team find and fix problems faster, follow the trail of attackers, and trace transactions accurately using a holistic view across all components.
Learn more today.

 

01/23/09

Today's most-read stories:

  1. Bull castration and snake eaters: the life of Dave Hitz
  2. Apple puts iPhone Nano and Netbook rumors to rest
  3. Blogger: Obama to get 'super-encrypted' BlackBerry
  4. Court rules Kentucky does not own the Internet
  5. How to protect your PC against the Downadup worm
  6. Downadup worm now infects 1 in every 16 PCs
  7. Juniper expected to cut jobs amid weak demand
  8. US-CERT: Microsoft's advice on Downadup is flawed
  9. Nortel chief flying in corporate jet as company files for bankruptcy
  10. Windows 7: the untold story of how the enterprise gets snubbed


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: