christiaan@christiaan008.com
  • Facebook
  • X
  • Facebook
  • X
  • Central Hub
Christiaan's collection
  • Home
  • Conferences
    • Black Hat
    • BlueHat
    • BruCON
    • CERIAS
    • Chaos Communication Congress
    • DeepSec
    • DEF CON
    • DerbyCon
    • Hack In The Box (HITB)
    • Hacking at Random (HAR)
    • Notacon
    • Observe, Hack, Make (OHM)
    • Open Web Application Security Project (OWASP)
    • ShmooCon
  • Less technical videos
    • By category
    • Video wall
  • Technical videos
    • By category
    • Video wall
  • News overview
Select Page

The Honey project and CIC News Engine

Finally a new vlog!

This time an update about the Honey project and the developmentĀ of the CIC News engine.

Watch this video on YouTube

Views

Likes

Christiaan008

Source

Main category

Hacking

Subcategory

Hacking

Great content with nice educational topics. I’m studying Computer Science and your channel really helps in the real world scenarios!

TheNEMKE

Be surprised

Video wall

I know what I'm looking for

Videos by category

Related videos

  • All
  • Other
SOURCE Barcelona 2010: Carders.cc, the rise and fall of an underground forum

SOURCE Barcelona 2010: Carders.cc, the rise and fall of an underground forum

Attacking SMS. It’s no longer your BFF

Attacking SMS. It’s no longer your BFF

DeepSec 2010: Debugging GSM

DeepSec 2010: Debugging GSM

DEF CON 16: Forensics is ONLY for Private Investigators

DEF CON 16: Forensics is ONLY for Private Investigators

DeepSec 2011: The security of non-executable files

DeepSec 2011: The security of non-executable files

29C3: Russia’s surveillance state

29C3: Russia’s surveillance state

ICS Cybersecurity Advanced Training Day 4

ICS Cybersecurity Advanced Training Day 4

24C3: Mifare (Little security, despite obscurity)

24C3: Mifare (Little security, despite obscurity)

OWASP AppSecUSA 2012: Bug bounty programs

OWASP AppSecUSA 2012: Bug bounty programs

Introduction to Trusted Computing

Introduction to Trusted Computing

25C3: Hacking the iPhone

25C3: Hacking the iPhone

OHM2013: Should law enforcement have hacking powers?

OHM2013: Should law enforcement have hacking powers?

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for security vulnerabilities

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

DeepSec 2013: Cracking and analysing Apple iCloud protocols

DeepSec 2013: Cracking and analysing Apple iCloud protocols

DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3

DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3

DEF CON 17: Making fun of your malware

DEF CON 17: Making fun of your malware

The Honey project and CIC News Engine

The Honey project and CIC News Engine

Testing SQL injection with sqlmap

Testing SQL injection with sqlmap

Battery firmware hacking

Battery firmware hacking

Owning bad guys (and mafia) with JavaScript botnets

Owning bad guys (and mafia) with JavaScript botnets

This website is part of the Christiaan008 network | Credits