Submit Search
Upload
Social Engineering si etica hackingului
•
0 likes
•
326 views
Tudor Damian
Follow
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 239
Download now
Download to read offline
Recommended
Spargerea parolelor folosind GPU
Spargerea parolelor folosind GPU
Radu Potop
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Agora Group
Proiect 10B - Bocioacă Necula
Proiect 10B - Bocioacă Necula
Andreea Bocioaca
Curs White Hat Hacking #3 - ITSpark
Curs White Hat Hacking #3 - ITSpark
ITSpark Community
Curs White Hat Hacking #1 - ITSpark
Curs White Hat Hacking #1 - ITSpark
ITSpark Community
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
Tudor Damian
Recommended
Spargerea parolelor folosind GPU
Spargerea parolelor folosind GPU
Radu Potop
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Alternative Open Source pentru mediul de afaceri-solepad-tm-20mai2010
Agora Group
Proiect 10B - Bocioacă Necula
Proiect 10B - Bocioacă Necula
Andreea Bocioaca
Curs White Hat Hacking #3 - ITSpark
Curs White Hat Hacking #3 - ITSpark
ITSpark Community
Curs White Hat Hacking #1 - ITSpark
Curs White Hat Hacking #1 - ITSpark
ITSpark Community
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Tudor Damian
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
Tudor Damian
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
Tudor Damian
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Tudor Damian
Microsoft Azure Stack
Microsoft Azure Stack
Tudor Damian
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
IT Risk Management
IT Risk Management
Tudor Damian
IDS Evasion Techniques
IDS Evasion Techniques
Tudor Damian
Social Engineering, or hacking people
Social Engineering, or hacking people
Tudor Damian
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Tudor Damian
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
Tudor Damian
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Tudor Damian
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
Tudor Damian
What's new in Windows 8
What's new in Windows 8
Tudor Damian
Linux on Hyper-V
Linux on Hyper-V
Tudor Damian
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Tudor Damian
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
Tudor Damian
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Tudor Damian
Hosting your virtual private cloud
Hosting your virtual private cloud
Tudor Damian
Linux sub Hyper-V R2
Linux sub Hyper-V R2
Tudor Damian
White Hat Hacking #3
White Hat Hacking #3
Tudor Damian
White Hat Hacking #1
White Hat Hacking #1
Tudor Damian
White Hat Hacking #2
White Hat Hacking #2
Tudor Damian
More Related Content
More from Tudor Damian
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Tudor Damian
Microsoft Azure Stack
Microsoft Azure Stack
Tudor Damian
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
Tudor Damian
IT Risk Management
IT Risk Management
Tudor Damian
IDS Evasion Techniques
IDS Evasion Techniques
Tudor Damian
Social Engineering, or hacking people
Social Engineering, or hacking people
Tudor Damian
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Tudor Damian
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
Tudor Damian
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Tudor Damian
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
Tudor Damian
What's new in Windows 8
What's new in Windows 8
Tudor Damian
Linux on Hyper-V
Linux on Hyper-V
Tudor Damian
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Tudor Damian
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
Tudor Damian
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Tudor Damian
Hosting your virtual private cloud
Hosting your virtual private cloud
Tudor Damian
Linux sub Hyper-V R2
Linux sub Hyper-V R2
Tudor Damian
White Hat Hacking #3
White Hat Hacking #3
Tudor Damian
White Hat Hacking #1
White Hat Hacking #1
Tudor Damian
White Hat Hacking #2
White Hat Hacking #2
Tudor Damian
More from Tudor Damian
(20)
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
Microsoft Azure Stack
Microsoft Azure Stack
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
IT Risk Management
IT Risk Management
IDS Evasion Techniques
IDS Evasion Techniques
Social Engineering, or hacking people
Social Engineering, or hacking people
Azure Site Recovery and System Center
Azure Site Recovery and System Center
Upgrading your Private Cloud to Windows Server 2012 R2
Upgrading your Private Cloud to Windows Server 2012 R2
What's new in Hyper-V 2012 R2
What's new in Hyper-V 2012 R2
Comparing MS Cloud with VMware Cloud
Comparing MS Cloud with VMware Cloud
What's new in Windows 8
What's new in Windows 8
Linux on Hyper-V
Linux on Hyper-V
Private cloud, the Good, the Bad and the Ugly
Private cloud, the Good, the Bad and the Ugly
Hyper-V 3.0 Overview
Hyper-V 3.0 Overview
BOI 2011 - Be what's next
BOI 2011 - Be what's next
Hosting your virtual private cloud
Hosting your virtual private cloud
Linux sub Hyper-V R2
Linux sub Hyper-V R2
White Hat Hacking #3
White Hat Hacking #3
White Hat Hacking #1
White Hat Hacking #1
White Hat Hacking #2
White Hat Hacking #2
Social Engineering si etica hackingului
1.
salut.
2.
cine sunt eu?
3.
Tudor Damian, MCSA
IT Solutions Specialist tudor.damian@transcent.ro
4.
Tudy :) tudy@tudy.ro www.tudy.ro
5.
despre ce e
vorba?
6.
social engineering
7.
...sau ”hacking people”
8.
etica hackingului
9.
da, există și
așa ceva :)
10.
bun, hai să
începem
11.
Kevin Mitnick
12.
(probabil) cel mai
cunoscut ”hacker” din lume
13.
atât doar că
nu e hacker! :)
14.
e ”social engineer”
Download now