BITCQ

[Coursera] Malicious Software and its Underground Economy

Size: 782.6 MB
Magnet link

Name Size
[Coursera] Malicious Software and its Underground Economy/2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).mp4 102.6 MB
[Coursera] Malicious Software and its Underground Economy/2 - 5 - (a glimpse at) Botnets (26_09).mp4 75.6 MB
[Coursera] Malicious Software and its Underground Economy/2 - 4 - Malicious Software (20_09).mp4 58.3 MB
[Coursera] Malicious Software and its Underground Economy/3 - 5 - IDA Pro—a very simple example. . . (24_17).mp4 58.3 MB
[Coursera] Malicious Software and its Underground Economy/3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).mp4 52.8 MB
[Coursera] Malicious Software and its Underground Economy/3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).mp4 33.2 MB
[Coursera] Malicious Software and its Underground Economy/2 - 3 - Admin blabbing (11_38).mp4 33.2 MB
[Coursera] Malicious Software and its Underground Economy/4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).mp4 30.5 MB
[Coursera] Malicious Software and its Underground Economy/3 - 1 - Early days, AV industry (15_36).mp4 29.7 MB
[Coursera] Malicious Software and its Underground Economy/6 - 2 - Pay-per-install (23.55) .mp4 25.1 MB
[Coursera] Malicious Software and its Underground Economy/7 - 1 - Investigating China_'s online underground economy (23_32).mp4 25 MB
[Coursera] Malicious Software and its Underground Economy/7 - 1 - Investigating China's online underground economy (23_32).mp4 25 MB
[Coursera] Malicious Software and its Underground Economy/4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).mp4 23.5 MB
[Coursera] Malicious Software and its Underground Economy/2 - 2 - (Should we care_ A botnet takeover storytelling) (11_39).mp4 19 MB
[Coursera] Malicious Software and its Underground Economy/4 - 1 - Toward dynamic analysis (15_05).mp4 17.6 MB
[Coursera] Malicious Software and its Underground Economy/5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).mp4 16.9 MB
[Coursera] Malicious Software and its Underground Economy/6 - 1 - Introduction (15_58).mp4 16.8 MB
[Coursera] Malicious Software and its Underground Economy/3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).mp4 16 MB
[Coursera] Malicious Software and its Underground Economy/6 - 5 - Memory errors_ the past, the present, and the future (15_30).mp4 16 MB
[Coursera] Malicious Software and its Underground Economy/6 - 4 - Exploit-as-a-Service (15_03).mp4 15.9 MB
[Coursera] Malicious Software and its Underground Economy/4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).mp4 14.1 MB
[Coursera] Malicious Software and its Underground Economy/7 - 2 - Measuring the cost of cybercrime (12_31).mp4 13.9 MB
[Coursera] Malicious Software and its Underground Economy/4 - 5 - AccessMiner — system-centric models (10_38).mp4 13.5 MB
[Coursera] Malicious Software and its Underground Economy/5 - 2 - Background (12_27).mp4 13.4 MB
[Coursera] Malicious Software and its Underground Economy/5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).mp4 12.6 MB
[Coursera] Malicious Software and its Underground Economy/5 - 1 - Introduction (10_24).mp4 11.3 MB
[Coursera] Malicious Software and its Underground Economy/7 - 3 - Concluding remarks (8_17).mp4 9.3 MB
[Coursera] Malicious Software and its Underground Economy/2 - 1 - Course Teaser — Introduction (01_11).mp4 3.1 MB
[Coursera] Malicious Software and its Underground Economy/2 - 6 - (a glimpse at) Botnets detection and Rootkits (42_42).srt 54 KB
[Coursera] Malicious Software and its Underground Economy/3 - 2 - (a glimpse at) Reverse engineering (part 1) (30_41).srt 39 KB
[Coursera] Malicious Software and its Underground Economy/4 - 2 - (a glimpse at) Dynamic analysis (part 1) (25_59).srt 33 KB
[Coursera] Malicious Software and its Underground Economy/2 - 5 - (a glimpse at) Botnets (26_09).srt 32 KB
[Coursera] Malicious Software and its Underground Economy/6 - 2 - Pay-per-install (23.55) .srt 31 KB
[Coursera] Malicious Software and its Underground Economy/7 - 1 - Investigating China's online underground economy (23_32).srt 31 KB
[Coursera] Malicious Software and its Underground Economy/3 - 5 - IDA Pro—a very simple example. . . (24_17).srt 30 KB
[Coursera] Malicious Software and its Underground Economy/2 - 4 - Malicious Software (20_09).srt 26 KB
[Coursera] Malicious Software and its Underground Economy/4 - 3 - (a glimpse at) Dynamic analysis (part 2) (19_14).srt 24 KB
[Coursera] Malicious Software and its Underground Economy/3 - 4 - (a glimpse at) Polymorphism, code obfuscation (18_23).srt 21 KB
[Coursera] Malicious Software and its Underground Economy/6 - 1 - Introduction (15_58).srt 21 KB
[Coursera] Malicious Software and its Underground Economy/6 - 5 - Memory errors_ the past, the present, and the future (15_30).srt 21 KB
[Coursera] Malicious Software and its Underground Economy/5 - 3 - Dynamic analysis of Android malware (part 1) (15_16).srt 20 KB
[Coursera] Malicious Software and its Underground Economy/4 - 1 - Toward dynamic analysis (15_05).srt 20 KB
[Coursera] Malicious Software and its Underground Economy/3 - 1 - Early days, AV industry (15_36).srt 19 KB
[Coursera] Malicious Software and its Underground Economy/6 - 4 - Exploit-as-a-Service (15_03).srt 19 KB
[Coursera] Malicious Software and its Underground Economy/7 - 2 - Measuring the cost of cybercrime (12_31).srt 16 KB
[Coursera] Malicious Software and its Underground Economy/5 - 2 - Background (12_27).srt 16 KB
[Coursera] Malicious Software and its Underground Economy/2 - 3 - Admin blabbing (11_38).srt 14 KB
[Coursera] Malicious Software and its Underground Economy/4 - 4 - (a glimpse at) Limits of dynamic analysis (11_31).srt 14 KB
[Coursera] Malicious Software and its Underground Economy/5 - 4 - Dynamic analysis of Android malware (part 2) (10_59).srt 14 KB
[Coursera] Malicious Software and its Underground Economy/4 - 5 - AccessMiner — system-centric models (10_38).srt 13 KB
[Coursera] Malicious Software and its Underground Economy/5 - 1 - Introduction (10_24).srt 13 KB
[Coursera] Malicious Software and its Underground Economy/7 - 3 - Concluding remarks (8_17).srt 12 KB
[Coursera] Malicious Software and its Underground Economy/3 - 3 - (a glimpse at) Reverse engineering (part 2) (09_06).srt 11 KB
[Coursera] Malicious Software and its Underground Economy/_README.txt 3 KB
[Coursera] Malicious Software and its Underground Economy/2 - 1 - Course Teaser — Introduction (01_11).srt 1 KB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...