Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Introduction
Hats
What color hats do we wear?
Black hat hackers
White hat hackers
Grey hat hackers
Email Hack
This hack happens every day
How this hack worked
Why email?
Could have been avoided
Care for a USB memory stick?
Pwned
You are now pwned
HaveIbeenpwned
Youhavebeenpwned and here’s your homework
You probably did not do the homework
Passwords
Simple and popular passwords
Harvesting passwords
A password solution
Anything is better than nothing
Password homework
Multi Factor Authentication
Say hello to Multi Factor Authentication
Say YES to 2-Factor Authentication
2-factor Authentication helps protect your identity.
How it looks in real life.
The benefit.
Say NO to 2-Factor Authentication
You do not need 2-factor Authentication.
What happens if you don’t do it?
Why bother?
Convenience vs. Security
40,000-foot view
100% convenience
100% security
100% security is not attainable
We live somewhere in the middle
Attractive targets
We are rich Americans
Hover technique
What a phishing attack looks like
Vet the short links
Phishing traits homework
Hacking
How I hack
Private browsing (incognito mode)
VPN to…anywhere
What the target’s firewall logs report
What the target’s Windows logs report
Stop the remote desktop attack
VPN software is bad and VPN software is good
Open ports homework
Hacking WordPress
Hacking into a WordPress website
What else can a hacker do with a WordPress password?
Get ready for the answers
Surrender Media (Social Media)
Real social media connections
Fake social media connections
Harvesting information
Four-letter words
Facebook is free?
How Facebook tracks
Facebook acknowledges recording
What Facebook remembers
Examples of sloppiness
Is Facebook collecting too much information?
Oversharing homework
Google and Yahoo also track
Gmail tracking
Maps tracking
Web & App Activity tracking
Downloading tracking data
Deleting tracking data
Gmail monetizes your personal information
Yahoo monetizes your personal information
You agreed to it
Google homework
Credit card numbers online
Low-tech hacking
Dumpster Diving
Storing papers with personal information
Junk mail homework
How to protect yourself
Convenience vs. security – your comfort level
Don’t share passwords online
Least privilege to data
Least privilege to the system
Expiring passwords
Centralized virus protection
Virus protection homework
Are we done yet?
Authentication Apps
Text messages or an Authentication app?
Multi Factor Authentication homework
← Prev
Back
Next →
← Prev
Back
Next →