The back of the Class
Why is the IPv4 address range of 127.0.0.0/8 not considered part of a subnet class?
Why is the IPv4 address range of 127.0.0.0/8 not considered part of a subnet class?
At what point is the “Last Known Good Configuration” updated to the current configuration? A) Five minutes after boot B) During the next login C) During the next System Restore checkpoint D) During the next logoff E) What’s really “good?” What if the configuration is only “somewhat reasonable?”
What USMT application gathers user data and settings to use for a migration?
What is the recommended video RAM requirement for Windows Vista Business?
The bad guys know that attachments and add-ons are some of the easiest ways to attack our computer systems. In this video, you’ll learn about malicious attachments and how some bad guys have used add-ons to take over our PCs.
CompTIA Security+ SY0-301: 3.5 – Malicious Add-ons and Attachments Read More »
Our browsers are very good at saving “cookies” of information to our hard drive, and these details can often be used against us. In this video, you’ll learn how session information saved in browser cookies can be easily manipulated in packet headers to gain unauthorized access to web applications.
CompTIA Security+ SY0-301: 3.5 – Cookies, Header Manipulation, and Session Hijacking Read More »
Are your applications susceptible to attack? In this video, you’ll learn about zero-day attacks and what happens when a zero-day attack is announced.
CompTIA Security+ SY0-301: 3.5 – Zero-day Attacks Read More »
Buffer overflows are unique attacks that can cause significant security breaches. In this video, you’ll learn how buffer overflows work and you’ll watch as we use Metasploit Framework to gain access to a Windows XP system using a well-known buffer overflow exploit.
CompTIA Security+ SY0-301: 3.5 – Buffer Overflows Read More »