Home
Explore
Submit Search
Upload
Login
Signup
Advertisement
Check these out next
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
Cloud computing security
Teja Babu
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
PwnSchool: Exploiting Web APIs
CiNPA Security SIG
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
302 Content Server Security Challenges And Best Practices
phanleson
1
of
16
Top clipped slide
SYDO - Secure Your Data by Obscurity
Oct. 5, 2011
•
0 likes
0 likes
×
Be the first to like this
Show More
•
629 views
views
×
Total views
0
On Slideshare
0
From embeds
0
Number of embeds
0
Download Now
Download to read offline
Report
Technology
DefCamp
Follow
DefCamp
Advertisement
Advertisement
Advertisement
Recommended
SYDO - Secure Your Data by Obscurity
Avădănei Andrei
491 views
•
16 slides
Managing Secrets in Production
Erik Osterman
930 views
•
21 slides
Positive Technologies - S4 - Scada under x-rays
qqlan
5.6K views
•
77 slides
Hacking databases
sunil kumar
551 views
•
30 slides
Hacking databases
sunil kumar
958 views
•
30 slides
WordPress Security Master Plan
ServerGuy
298 views
•
67 slides
More Related Content
Similar to SYDO - Secure Your Data by Obscurity
(20)
[PU&D] - Securing IT Against Modern Threats with Microsoft Cloud Security Tools
Tomasz Poszytek
•
99 views
Cloud computing security
Teja Babu
•
864 views
Enterprise Cloud Security - Concepts Mash-up
Dileep Kalidindi
•
278 views
iOS Security: The Never-Ending Story of Malicious Profiles
Yair Amit
•
2K views
Security Risk Advisors - BSides Philadelphia 2017 - MFA: It's 2017 and You're...
Douglas Webster
•
893 views
PwnSchool: Exploiting Web APIs
CiNPA Security SIG
•
71 views
Hacking identity: A Pen Tester's Guide to IAM
Jerod Brennen
•
1.6K views
302 Content Server Security Challenges And Best Practices
phanleson
•
2.2K views
Pentesting Android Apps
Abdelhamid Limami
•
870 views
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
•
4.9K views
Make your Azure PaaS Deployment More Safe
Thuan Ng
•
561 views
Blockchain @ Descon 2016
P-e-t-a-r
•
324 views
Sql server security in an insecure world
Gianluca Sartori
•
500 views
Scada Strangelove - 29c3
qqlan
•
7K views
GWAVACon 2013: Keyshield SSO Infrastructure for Novell Technologies
GWAVA
•
706 views
Enumerating Windows Users
UTD Computer Security Group
•
906 views
cyber-security-reference-architecture
Birendra Negi ☁️
•
533 views
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
•
219 views
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
Start Pad
•
1.5K views
Mobile Device Encryption Systems
Peter Teufl
•
2K views
More from DefCamp
(20)
Remote Yacht Hacking
DefCamp
•
1.7K views
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
•
970 views
The Charter of Trust
DefCamp
•
542 views
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp
•
306 views
Bridging the gap between CyberSecurity R&D and UX
DefCamp
•
259 views
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
•
468 views
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp
•
268 views
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp
•
250 views
Trust, but verify – Bypassing MFA
DefCamp
•
315 views
Threat Hunting: From Platitudes to Practical Application
DefCamp
•
217 views
Building application security with 0 money down
DefCamp
•
175 views
Implementation of information security techniques on modern android based Kio...
DefCamp
•
213 views
Lattice based Merkle for post-quantum epoch
DefCamp
•
238 views
The challenge of building a secure and safe digital environment in healthcare
DefCamp
•
323 views
Timing attacks against web applications: Are they still practical?
DefCamp
•
257 views
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp
•
804 views
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp
•
291 views
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp
•
423 views
Connect & Inspire Cyber Security
DefCamp
•
289 views
The lions and the watering hole
DefCamp
•
219 views
Advertisement
Recently uploaded
(20)
Ch 4.pdf
MuhammadAsif1069
•
0 views
ArTIFICIAL INTELLIGENCE(AI).pptx
RedValentine
•
0 views
TenT-Day09.pptx
JohanMyburgh15
•
0 views
Invaluable insight of Mix panel !
AlexHill876665
•
0 views
AIML.pptx
YashGupta232466
•
0 views
Webinar: Bancada de eletrônica profissional
Embarcados
•
0 views
Cross-Platform App Development Frameworks
CloudStakes Technology
•
0 views
Tuning Traditional Language Processing Approaches for Pashto Text Classification
kevig
•
0 views
Digital Wallet Develpoment.pdf
Block Coders
•
0 views
Electron Transport .pptx
RadioactiveMainakMon
•
0 views
Nanotechnology Infographics.pdf
seed25
•
0 views
A Complete Guide to Flutter App Development Cost in 2023
CMARIX TechnoLabs
•
0 views
TenT-Day04.pptx
JohanMyburgh15
•
0 views
Blockchain in Digital Transformation.pptx
TarunTiwari94
•
0 views
Top 6 Cloud Service Providers.pdf
SatawareTechnologies6
•
0 views
TenT-Day02.pptx
JohanMyburgh15
•
0 views
Low code platforms in insurance industry - omnepresent technologies.pdf
OmnePresentTechnolog1
•
0 views
NEARSHORE DEVELOPMENT CENTER
Prime Group
•
0 views
PHP-04-Forms.ppt
NatureLifearabhi
•
0 views
OpenACC and Open Hackathons Monthly Highlights May 2023.pdf
OpenACC
•
0 views
SYDO - Secure Your Data by Obscurity
SYDO – Secure
Your Data by Obscurity Andrei Avădănei Web Developer, Security enthusiast, Blogger www.worldit.info @AndreiAvadanei +AndreiAvadanei
Let's make some
research :-)
We should be
more careful!
But we are
lazy...
How it works?
Demo
Questions?
Advertisement