Follow me down the rabbit hole into the wonderful world of IT security.
Buy my terrible font (ad): shop.liveoverflow.com
Learn hacking (ad): hextree.io
Related Videos:
• What is a Security Vul...
• Understand Security Ri...
Tweets:
/ 1720734431659376995
/ 1720799912181284864
/ 1721493232310214910
Understanding the Risks of Stolen Credentials: static.googleusercontent.com/...
Chapters:
00:00 - Intro
00:40 - Security Terminology
01:38 - Direct Database Access
03:40 - Introducing a Security Boundary
05:36 - Typical Web Security Vulnerabilities
07:03 - Clear-text Passwords in Database
09:28 - Security Weakness vs. Vulnerability
11:05 - Effective Mitigations
13:03 - Useless Mitigations
16:37 - Summary: Vulnerability vs. Weakness
19:00 - Outro
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
2nd Channel: / liveunderflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Streaming: twitch.tvLiveOverflow/
→ TikTok: / liveoverflow_
→ Instagram: / liveoverflow
→ Blog: liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow
Негізгі бет Reinventing Web Security
Пікірлер: 164