Latest Videos

Cyber Security Awareness Month

Cyber Security Awareness Month


Flash video created for Cyber Security Awareness Month.






Defining Cyberwarfare

In Hopes of Preventing it  Defining Cyberwarfare

Can you imagine a future where wars are fought not with bombs and bullets but computer viruses and pacemaker shutdowns?
Cyberware is unique in that it is not covered by existing legal framework and it often inspires more questions than we are yet capable of answering.

Daniel Garrie ponders some of the practical and ethical dilemmas that may pop up as we progress towards our uncertain future. 





ID Theft | Cyber Security Awareness

Cyber Security Awareness - ID Theft


Tips to avoid Identity Theft from Sandy Chalmers

 Administrator at the Wisconsin Department of Agriculture, Trade and Consumer Protection







System Security & Cyber Security Crime

Cyber Security 

and

 System Security Video



Cyber Security: A State of Digital Denial. 

Protecting critical information is of paramount concern.



Ten Notorious Cyber Crimes

10 Notorious Cyber Crimes


Nuclear power plants, college applications, and even the sewers, nowhere's safe from cyber criminals.

Explore the sinister world of internet hackers with our countdown of the 10 most shocking cybercrimes.







Linux Root Password Reset

How to Recover (Reset) the Linux Root Password


If you've ever lost or forgotten the password to your Linux computer, this Linux tutorial video will show you exactly how to reset it. 

Using common password recovery procedures, you will learn how to boot your Linux system into single-user mode by modifying GRUB, then reset your root password. 

This video is based on CentOS version 6, but applies to most RedHat-based systems.

Facts About Cyber Crime


Facts About Cyber Crime Video


Cybercrime is criminal activity committed with computers and/or over a network or the Internet.








Cyber Warfare Video

Cyber Warfare Video


War in cyberspace is a new type of warfare which in these days of globalization becomes increasingly likely. 

Starring: ass.prof. Jens Ringsmose, 

Centre for War Studies, University of Southern Denmark.


Cyber Warfare | BlackHat

Cyber Warfare 

BlackHat - Jeff Bardin


Our Blackhat 2012 coverage continues as we catch up with our friend Jeff Bardin to discuss some new trends on the Cyber Warfare front. 

Anyone in the mood for a counterstrike?




Cyber Security Video


Cyber Security
 Internet Security Video Clips



From deliberate attacks to unforeseen errors, software failures to web weakness, today's IT environment is complex. 

Boards must have a robust understanding of the threats that exist, be aware of the company's vulnerabilities, and have measures in place to counteract the risk.



What Is Cyber Security | Animation


Cyber Security Animation Video Clip

What is Internet ?
What is Cyber Security ?






Takedown | Full Movie

Takedown Kevin Mitnick  Hackers Movies

"Track Down (also known as Takedown outside the USA), is a 2000 film about computer hacker Kevin Mitnick, based on the book Takedown by John Markoff and Tsutomu Shimomura. The film was directed by Joe Chappelle and stars Skeet Ulrich and Russell Wong."
"For years Kevin Mitnick --- the most notorious computer hacker in the nation -- had eluded Federal agents while using the latest electronic gadgetry to break into countless computers and gain access to sensitive and valuable information. But when he breaches the system of leading computer crimes expert Tsutomu Shimomura, it sets off an epic chase through cyberspace between a pair of hard-driven geniuses operating on different sides of the law."



Microchip Product Review

Microchip RN4020 Product Demonstration


Microchip Technology shows off their RN4020 Bluetooth 4.1 Low Energy module for Control Engineering's Mark Hoske.

Cyber Security Vulnerability Assessment

Cyber Security Vulnerability Assessment

Matt Luallen delivers a lecture on the basic concepts of performing your own cyber security vulnerability assessment.
Companies that decide to undertake a cyber security program often falter right out of the starting blocks because they don't begin by addressing some of the most basic concepts of security. Without that knowledge it is impossible to plan, and without a plan, the results will be haphazard at best and will likely make things worse. A sensible approach needs to begin with a basic understanding of what vulnerabilities may exist in your systems. Such an analysis is conceptually straightforward, but it can get complex in practice if not executed well. In most situations it is painful because companies often discover that the situation is worse than they thought.


Exploring The Deep Web


The Hidden Internet - Exploring The Deep Web


Let's take a journey into what experts are calling "The Deep Web". In this episode, I will show you what that term means, and how to get there, and I give a bit of a description of what you might find. 

Catch us on the next segment of "The Hidden Internet", where we will be exploring an obscure protocol, seldom used but by the most elite by the name of "Gopher".


Hacker Worlds | BBC Documentary

How Hackers Changed the World (BBC Documentary )



How Hackers Changed the World – We Are Legion is a documentary about Anonymous, a hacking documentary released by BBC. It goes in depth to describe some cyber attacks such as Church of Scientology, Paypal, Amazon, Visa, Mastercard and world governments in order to shame them for their shady actions. Anonymous attacked online payment providers when they boycotted Wikileaks, they helped to provide black market Internet connections to disseminate information coming out of the Egyptian protest movement.

Cyber Warriors - Documentary

Cyber Warriors   Documentary CBC

The internet is touted as one of the most important inventions in the history of modern man, and like the discovery of the atom, its ability to benefit mankind is matched only by its potential to unleash massive destruction.

Web Warriors is a one-hour documentary that offers an unprecedented glimpse into the world's newest and most vulnerable frontier: cyberspace. We enter the world of hackers like Mafia Boy - a 15 year old high school student who rose to infamy in 2000 by causing millions of dollars in damage after single-handedly shutting down internet giants - including Yahoo, Amazon, eBay, Dell, eTrade, and CNN.






We'll meet hackers like Donnie who goes on a into the Russian cyber underground as he searches for the creators of a computer virus with the hopes of collecting the $250,000 bounty being offered by Microsoft.

Just as in nature, computer viruses have rapidly evolved and now have the ability to control millions of computers unbeknownst to their owners, thereby creating massive illegal computer networks known as "Botnets".

These "Botnets" are being put to a variety of illicit uses including identity theft and cyber extortion, but they are also the latest and most potent weapon being deployed in military conflicts. Web Warriors dissects the massive cyber attack against Estonia in 2007 which virtually shut down the country and resulted in NATO deploying its cyber response team.

Web Warriors offers rare interviews with cyber sleuths from the FBI, the Pentagon, NATO, and the Department of Homeland Security who explain how cyberspace has become the latest battle ground between nation states and how terrorist groups are already plotting their next move.

Web Warriors offers a fast-paced never-seen before glimpse into the cyber trenches of a world wide battle. Some reports say the cost of cyber crime is now on par with the illegal drug trade. 

Web Warriors was produced by Edward Peill for Tell Tale Productions Inc.

Encryption Concepts

Encryption | İnformation Security


Topics covered include encryption algorithms, keyed and keyless cryptosystems, cryptanalysis, breaking encrypted messages, substitution, transposition, and product ciphers, the Caesar cipher, the Vigenère cipher, one-time pads, the Vernam cipher, book ciphers, symmetric and asymmetric cryptosystems, public-key encryption, stream ciphers, block ciphers, the data encryption standard (DES), and the advanced encryption standard (AES).