TWC | The Ultimate Hardening Guide: What to Do to Make Hackers Pick Someone Else

Play TWC | The Ultimate Hardening Guide: What to Do to Make Hackers Pick Someone Else
Sign in to queue


It is pretty clear that we have a smart new generation who understand how to get around computer systems—some are doing it just for fun, while others are doing it with a slightly more sinister intent! Then we read in newspapers about these impressive findings done by a young hacker. Let's stop there and think for a while! Are these really targeted attacks, or was it just for a good time and by accident he discovered something useful? Did you see all these breaking news stories about destroying another botnet containing millions of computers? Why are they targeting these computers and not others? Usually the young hacker's goal is very simple: let's do whatever is possible. Our response should be, "Do whatever you want, but somewhere else!' During Paula's session learn how to strengthen systems and stop the data breaches that litter the news sites today. Come and enjoy the live-experience presentation with engaging stories and demos! Let's deter hackers together—whether they’re 7 or 70 years old!



Session Type:





Hall 8.0 Room C1



Right click to download this episode

The Discussion

  • User profile image

    Question to the advice in Step 8: How is it possible to use cached Credentials for ptH when they are salted?

Add Your 2 Cents