Hacking Exposed Lecture at Naval Postgraduate School

Hacking Exposed Lecture at Naval Postgraduate School

Watch on YouTube

Most computer-security advisors approach the subject from a defensive point of view. "Do this, and probably you'll survive a particular kind of attack," they say. In refreshing contrast, Stuart McClure talks about security from an offensive angle. Taking on the major network operating systems and network devices one at a time, he explains exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. He doesn't hesitate to point out inherent, uncorrectable security weaknesses where he finds them.

Watch on YouTube

Most computer-security advisors approach the subject from a defensive point of view. "Do this, and probably you'll survive a particular kind of attack," they say. In refreshing contrast, Stuart McClure talks about security from an offensive angle. Taking on the major network operating systems and network devices one at a time, he explains exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. He doesn't hesitate to point out inherent, uncorrectable security weaknesses where he finds them.

Watch on YouTube

Most computer-security advisors approach the subject from a defensive point of view. "Do this, and probably you'll survive a particular kind of attack," they say. In refreshing contrast, Stuart McClure talks about security from an offensive angle. Taking on the major network operating systems and network devices one at a time, he explains exactly what Unix configuration files to alter, what Windows NT Registry keys to change, and what settings to make in NetWare. He doesn't hesitate to point out inherent, uncorrectable security weaknesses where he finds them.