Skip to content

Videos

Topics

Sort

65 results found

Hacking Demo #2 Command & Control

This video portrays how malware uses command and control through the DNS protocol in order to contact the main server, to move onto their next act. In the previous video on phishing, one main infection...

Hacking Demo #1 Mail Infection

This demo video presents how mail infection can help malware enter the enterprise network. Once the user has opened the infected email attachment (e.g. an invoice, proposal, funny picture, resume), the malware installs itself and...

EfficientIP Solutions Overview

In this video, you will see how EfficientIP solutions can help to modernize your network with security, automation and IP address management. Follow Jane, IT network administrator, who faces standard issues like the introduction of...