Curating warez scene history.
  • U: Anonymous
  • D: 2018-01-28 17:22:38
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.6 XQZT File size CRC
Download
31,153
Stored files
2,141 753BD325
341 DC4B3269
RAR-files
ppirah-c3ff-xqzt.rar 50,000,000 25412025
ppirah-c3ff-xqzt.r00 50,000,000 74052DD5
ppirah-c3ff-xqzt.r01 50,000,000 CCEF67A1
ppirah-c3ff-xqzt.r02 50,000,000 86FFBDFD
ppirah-c3ff-xqzt.r03 50,000,000 978461B9
ppirah-c3ff-xqzt.r04 50,000,000 B83852A0
ppirah-c3ff-xqzt.r05 50,000,000 F66A2671
ppirah-c3ff-xqzt.r06 50,000,000 AE127235
ppirah-c3ff-xqzt.r07 50,000,000 F425F6FC
ppirah-c3ff-xqzt.r08 50,000,000 22946333
ppirah-c3ff-xqzt.r09 32,828,756 BABB3889

Total size: 532,828,756
Archived files
Performing Incident Response and Handling\5.Networks and Host Attacks \058.Denial of Service - Best Practices.mp4 [cff6db9bdd54a6bf] 2,348,187 58F21B40
Performing Incident Response and Handling\5.Networks and Host Attacks \072.What Did We Learn.mp4 [9bf2b47ca7c90b03] 2,046,414 6847EFE4
Performing Incident Response and Handling\5.Networks and Host Attacks \062.Unauthorized Access - Responding.mp4 [ad3f0b7a2001666a] 1,869,171 157F55ED
Performing Incident Response and Handling\5.Networks and Host Attacks \070.Multiple Components Issues - Handling.mp4 [d3abdfc24e13a511] 2,561,843 4A4D4F9B
Performing Incident Response and Handling\5.Networks and Host Attacks \064.Unauthorized Access - Responding.mp4 [1b9006baeba7571e] 2,146,216 CF96E353
Performing Incident Response and Handling\5.Networks and Host Attacks \053.Denial of Service - Detection.mp4 [f14b349b181f3500] 9,026,385 701EAAE5
Performing Incident Response and Handling\5.Networks and Host Attacks \069.Inappropriate Usage - Containment.mp4 [3036ffe9d4493b0] 1,761,876 5DD4BCE9
Performing Incident Response and Handling\5.Networks and Host Attacks \063.Unauthorized Access - Prevention.mp4 [ede6fa2cb924b3db] 7,060,269 9E4DF684
Performing Incident Response and Handling\5.Networks and Host Attacks \051.What We're Going to Learn.mp4 [b69cbb27abbab683] 994,927 E9B277C0
Performing Incident Response and Handling\5.Networks and Host Attacks \065.Unauthorized Access - Eradicate and Recovery.mp4 [e8bc1e42560cb074] 2,023,294 DF8B69B8
Performing Incident Response and Handling\5.Networks and Host Attacks \056.Denial of Service - Prevention.mp4 [8fe735294f68672f] 3,871,174 3AFF6CC6
Performing Incident Response and Handling\5.Networks and Host Attacks \055.Denial of Service - Responding.mp4 [f98c76daf527d1e7] 2,849,035 ECECFD60
Performing Incident Response and Handling\5.Networks and Host Attacks \054.Denial of Service - Handling.mp4 [b968e9b223b9f4e7] 3,124,162 67D9EF2D
Performing Incident Response and Handling\5.Networks and Host Attacks \067.Inappropriate Usage - Detecting.mp4 [d78eed8ee21b008] 5,141,204 56E36576
Performing Incident Response and Handling\5.Networks and Host Attacks \061.Unauthorized Access - Hardware.mp4 [e434031a6841df14] 3,471,411 895DD138
Performing Incident Response and Handling\5.Networks and Host Attacks \059.Unauthorized Access - Handling.mp4 [b487ab50ef0a3baf] 10,654,936 1CC433CA
Performing Incident Response and Handling\5.Networks and Host Attacks \068.Inappropriate Usage - Prevention.mp4 [1223d2e210d5260f] 2,960,646 A6307579
Performing Incident Response and Handling\5.Networks and Host Attacks \060.Unauthorized Access - Signs of a Root Compromise.mp4 [e09b3b79e2e7e6d0] 5,576,775 41FC5914
Performing Incident Response and Handling\5.Networks and Host Attacks \057.Denial of Service - Containment.mp4 [2df6aa708397d6ec] 2,730,269 09A9694F
Performing Incident Response and Handling\5.Networks and Host Attacks \071.Multiple Components Issues - Responding.mp4 [69bc5291181446ee] 1,212,934 0ABD25B6
Performing Incident Response and Handling\5.Networks and Host Attacks \066.Unauthorized Access - Best Practices.mp4 [76dbca3faa22b2e6] 3,638,245 85E3A1B7
Performing Incident Response and Handling\5.Networks and Host Attacks \052.Denial of Service - Handling.mp4 [1eeded324e43b562] 7,618,392 070444EF
Performing Incident Response and Handling\3.Incident Response Processes \028.Signs of an Incident.mp4 [51d077049d776a8d] 17,250,046 13D5AA2B
Performing Incident Response and Handling\3.Incident Response Processes \025.What's the Plan.mp4 [a4ec0d6909291a15] 3,416,367 63B930BD
Performing Incident Response and Handling\3.Incident Response Processes \027.Vulnerability, Attacks, and Threats.mp4 [2e3f4f8837849804] 9,064,054 FE70D079
Performing Incident Response and Handling\3.Incident Response Processes \029.How Do We Respond.mp4 [125067ae413d976f] 6,745,011 89E13FC1
Performing Incident Response and Handling\3.Incident Response Processes \021.What Is a Computer Security Incident.mp4 [8da1b66a7be0a4b9] 5,683,336 B602F3A7
Performing Incident Response and Handling\3.Incident Response Processes \020.What We're Going to Learn.mp4 [d8d78b9d5649abc4] 1,484,934 E3C48FB8
Performing Incident Response and Handling\3.Incident Response Processes \031.What Did We Learn.mp4 [bbf9dba7f43c3ace] 1,896,286 764DA3C4
Performing Incident Response and Handling\3.Incident Response Processes \022.How Do We Identify an Incident.mp4 [e947361132ec18e3] 4,228,560 7F819F68
Performing Incident Response and Handling\3.Incident Response Processes \024.So What's the Goal.mp4 [e566a181803ab9e8] 4,247,924 40EE4E6F
Performing Incident Response and Handling\3.Incident Response Processes \030.The Team.mp4 [6e80e2c4616d29fc] 6,128,551 62509287
Performing Incident Response and Handling\3.Incident Response Processes \023.How Do We Handle an Incident.mp4 [376dabbbfa9774ab] 1,942,272 10B71938
Performing Incident Response and Handling\3.Incident Response Processes \026.Information Warefare.mp4 [2b3143b509d49ef1] 4,474,414 17D6A16C
Performing Incident Response and Handling\1.Course Overview\001.Course Overview.mp4 [fcf878df44054a75] 7,652,095 C6470074
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\005.Access Control Policy.mp4 [80b69350b574cea5] 3,140,031 B4021ABF
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\018.The Law in a Digital World.mp4 [665f9ccbb97d85f8] 6,980,411 E769348A
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\010.Logging Policy.mp4 [9fa2acd2f475a80e] 3,135,030 52742F3D
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\007.Administrative Security Policy.mp4 [1056296305c68871] 4,207,788 7A6D9ACE
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\002.Course Introduction.mp4 [41fcd5ba603d9cdb] 19,012,966 0A719FE5
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\003.Security Policies and Their Goals.mp4 [cbf011bab57321b9] 8,060,817 D4688432
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\006.Acceptable Use Policy.mp4 [8908adb852f2f706] 1,979,149 4A77F1B4
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\009.Audit Trail Policy.mp4 [336bbf909848659e] 4,290,603 4072C833
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\015.NIACAP, IA, and C_A Policy.mp4 [413574dddee395b8] 1,563,926 5224F56B
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\017.Physical Security Guidelines.mp4 [848f4189c9f5ce18] 2,095,927 783B1906
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\004.Characteristics and Implementation.mp4 [55714f0210f25bea] 7,362,416 76A89E50
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\012.Evidence Collection Policy.mp4 [d97b8505eec90255] 4,080,532 2AA94ACB
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\016.Physical Security Policy.mp4 [c93071608c080f37] 2,809,746 0E3EA7D0
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\013.Evidence Preservation Policy.mp4 [a2f729fd0dd2f2da] 3,389,876 CDE97F57
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\019.Summary.mp4 [fd358a944520ea59] 2,120,764 7245E743
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\014.Information Security Policy.mp4 [1698c5ed95cf6e22] 2,481,252 EE53980B
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\008.Asset Control Policy.mp4 [8b5c580a990b022a] 3,628,366 5575C282
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling\011.Documentation Policy.mp4 [b27c9535bdfa3fba] 3,983,030 22498DE4
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \109.Malicious Code - How Bots and Botnets Work.mp4 [d4bab13f7a75fe64] 8,132,239 A53D3E72
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \104.Malicious Code - What to Do.mp4 [87be4140a18f2c8b] 4,123,796 54D94935
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \119.Insider Threats - Prevention - Access Control.mp4 [5dab9fcd061eb1c5] 2,659,865 C3E91553
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \116.Insider Threats - The Workflow.mp4 [eeb43878feb9f0eb] 1,386,872 C81104B6
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \102.Malicious Code - Virus and Worms.mp4 [86705db8ca61a31f] 2,666,361 38411380
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \105.Malicious Code - What Are the Signs.mp4 [9675c79f7e4515d5] 2,936,839 C2964A4E
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \120.Insider Threats - Prevention - Awareness Program.mp4 [1edf922e9ace06e5] 3,129,363 BEEB620A
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \106.Malicious Code - Containment.mp4 [a26d2748520495e1] 3,982,707 FAFE15F2
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \103.Malicious Code - Trojans and Spyware.mp4 [ec9061fcd0b98919] 3,267,016 4D9E9121
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \114.Prevention - Rootkits.mp4 [b2ad80c4a9bdfafa] 13,213,185 9A462FE6
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \110.Incident Response Handling Performing.mp4 [4ad5de8aa02104d8] 2,924,297 4EAB85EB
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \101.What We're Going to Learn.mp4 [df22fdfd3fdab5cd] 2,139,625 FCFC88C5
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \122.Insider Threats - Prevention - Backups.mp4 [93f6ff21c75a514a] 2,558,832 2D868C46
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \113.When It Happens - Rootkits.mp4 [15e03c43a8985f89] 3,050,952 25917113
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \115.Insider Threats - The Landscape.mp4 [b865625055117953] 2,459,610 0D89AB55
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \117.Insider Threats - Detection and Response.mp4 [b8a23594f95aaa9e] 3,383,106 8365B2B0
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \111.Malicious Code - Rootkits in Windows.mp4 [1015249eb8a73fd4] 5,860,952 10E4B7E0
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \123.What Did We Learn.mp4 [306c73e192a36ddf] 2,194,395 0AF6C877
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \118.Insider Threats - Prevention - Network Level.mp4 [e9c83fdce6ee7a5c] 2,770,943 74652F1C
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \107.Malicious Code - Gather Evidence.mp4 [b59e2d9710be9a0] 2,660,256 A753CDE6
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \112.Malicious Code - Rootkits - Kernel Mode.mp4 [38bb7b55f4586141] 1,600,736 42C0C422
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \108.Malicious Code - Bots and Botnets.mp4 [d57a4b91757927e8] 4,903,605 87FE675A
Performing Incident Response and Handling\7.Malicious Code and Insider Threats \121.Insider Threats - Prevention - Admins and Privileged Users.mp4 [cdf3c5ab29c47bd7] 5,301,534 300BCA1B
Performing Incident Response and Handling\4.The Workflow of Incident Response\040.Incident Investigation.mp4 [8875967bb7589b5a] 1,291,787 7224AE7A
Performing Incident Response and Handling\4.The Workflow of Incident Response\033.Identification.mp4 [99526efe6e564fbe] 5,465,932 E26DF595
Performing Incident Response and Handling\4.The Workflow of Incident Response\044.Notifying External Agencies.mp4 [2d018b0edfb033e3] 1,534,462 2DDFDA61
Performing Incident Response and Handling\4.The Workflow of Incident Response\039.Incident Classification.mp4 [85a489fea0295ee6] 2,001,582 F8E6D502
Performing Incident Response and Handling\4.The Workflow of Incident Response\045.Eradication.mp4 [99c0e634f9d5cf2e] 9,579,789 EF807B15
Performing Incident Response and Handling\4.The Workflow of Incident Response\036.Communicating the Incident.mp4 [fd86c7df795ea7c6] 1,606,825 F65B6EA2
Performing Incident Response and Handling\4.The Workflow of Incident Response\046.System Recovery.mp4 [93f7d9c37a023b22] 1,971,887 AB420BCA
Performing Incident Response and Handling\4.The Workflow of Incident Response\035.Initial Response.mp4 [d54c09f470d02c15] 2,707,114 75015548
Performing Incident Response and Handling\4.The Workflow of Incident Response\037.Containment.mp4 [2dbb420f54617109] 2,992,189 C972F85D
Performing Incident Response and Handling\4.The Workflow of Incident Response\043.Evidence Protection.mp4 [1f13abdb742cbb6b] 3,095,355 0A6B566A
Performing Incident Response and Handling\4.The Workflow of Incident Response\042.Forensic Analysis.mp4 [d4885b2aa0437529] 3,044,424 45101F3B
Performing Incident Response and Handling\4.The Workflow of Incident Response\041.Data Collection.mp4 [df920255c05ac20f] 1,938,508 DB83836A
Performing Incident Response and Handling\4.The Workflow of Incident Response\034.Incident Recording.mp4 [df148b9258a0452e] 1,198,348 D16F3610
Performing Incident Response and Handling\4.The Workflow of Incident Response\047.Incident Documentation.mp4 [e30a26d3a22a6eac] 2,548,968 85A880F3
Performing Incident Response and Handling\4.The Workflow of Incident Response\049.Review and Update the Response Policies.mp4 [24cce52572734c6d] 1,915,120 462BA4F3
Performing Incident Response and Handling\4.The Workflow of Incident Response\048.Incident Damage and Cost Assessment.mp4 [29fa0d7501ab230b] 2,957,434 BA7F31F4
Performing Incident Response and Handling\4.The Workflow of Incident Response\032.Understanding the Workflow.mp4 [8d498c3ee64b31bf] 5,039,586 F4907402
Performing Incident Response and Handling\4.The Workflow of Incident Response\050.What Did We Learn.mp4 [3521c981524b3e39] 1,121,117 9AB5E5F8
Performing Incident Response and Handling\4.The Workflow of Incident Response\038.Formulating a Response Strategy.mp4 [1b1488041e44c57a] 4,639,393 A93E1B6B
Performing Incident Response and Handling\6.Service and Application Attacks \073.What We're Going to Learn.mp4 [16ca9430d3617349] 1,583,240 EACF4686
Performing Incident Response and Handling\6.Service and Application Attacks \093.Defense - XSS Attacks.mp4 [d8e2d48a51647f0d] 3,914,565 BFA651FF
Performing Incident Response and Handling\6.Service and Application Attacks \087.Defense - SQL Injections.mp4 [e973c1f5d1c21db5] 3,974,793 36903A20
Performing Incident Response and Handling\6.Service and Application Attacks \086.Types of Attacks - Command Injection.mp4 [f86686e3e640c69a] 6,541,402 63EC971A
Performing Incident Response and Handling\6.Service and Application Attacks \082.DEMO - Session Hijack.mp4 [4f2048629a56539d] 6,836,811 039373BE
Performing Incident Response and Handling\6.Service and Application Attacks \095.Types of Attacks - Buffer Overflow.mp4 [2437acdad01b87ba] 3,853,375 FD36E5E9
Performing Incident Response and Handling\6.Service and Application Attacks \081.Types of Attacks - Session Hijacking.mp4 [ac248ca062ca8e08] 1,959,738 25B0337B
Performing Incident Response and Handling\6.Service and Application Attacks \078.Analysis - Applications.mp4 [1a5dd8e0b2f8c84b] 1,206,674 2F7BD79E
Performing Incident Response and Handling\6.Service and Application Attacks \085.When It Happens - Session Hijacking.mp4 [66985802b7129c97] 2,031,552 8C7CE837
Performing Incident Response and Handling\6.Service and Application Attacks \098.Defense - Buffer Overflows.mp4 [833fe48df2a5aba7] 3,660,508 49DCE605
Performing Incident Response and Handling\6.Service and Application Attacks \076.DEMO - Checking Services.mp4 [2a24911e883311d] 33,027,012 900703A0
Performing Incident Response and Handling\6.Service and Application Attacks \089.Types of Attacks - XSS Attacks.mp4 [60113be6fc70f650] 1,919,791 71890705
Performing Incident Response and Handling\6.Service and Application Attacks \084.Defense - Session Hijacking.mp4 [dd2304c38c5bea00] 3,911,497 F86261DA
Performing Incident Response and Handling\6.Service and Application Attacks \097.Tools - Buffer Overflows.mp4 [b777f3094a365337] 2,173,095 699D02AC
Performing Incident Response and Handling\6.Service and Application Attacks \094.When It Happens - XSS Attacks.mp4 [d929e979010feb6a] 1,502,956 AFEB2826
Performing Incident Response and Handling\6.Service and Application Attacks \075.Some Symptoms - Services.mp4 [59416c3e927df5b0] 2,472,190 244E11C5
Performing Incident Response and Handling\6.Service and Application Attacks \088.When It Happens - SQL Injection.mp4 [9ee8e335a09037eb] 3,415,369 FD51A52B
Performing Incident Response and Handling\6.Service and Application Attacks \099.When It Happens - Buffer Overflows.mp4 [a73d20b2bb11839c] 1,749,723 154142F0
Performing Incident Response and Handling\6.Service and Application Attacks \080.Detecting the Attacks - Applications.mp4 [3e825f28d9790f93] 4,728,000 02DAA611
Performing Incident Response and Handling\6.Service and Application Attacks \100.What Did We Learn.mp4 [674f44dc42ea7e84] 1,820,024 DFC8BE02
Performing Incident Response and Handling\6.Service and Application Attacks \077.DEMO - Application Error Monitoring.mp4 [fba16387ff5de68e] 17,903,092 BB7C1109
Performing Incident Response and Handling\6.Service and Application Attacks \074.Service and Application - Monitoring.mp4 [adf800f2e39a5953] 2,600,492 F32F8AC3
Performing Incident Response and Handling\6.Service and Application Attacks \083.Symptoms - Session Hijacking.mp4 [784593c643b724a] 17,788,643 BB235692
Performing Incident Response and Handling\6.Service and Application Attacks \096.Types of Buffer Overflows.mp4 [e4273370de6c80d7] 1,409,349 EF5E2063
Performing Incident Response and Handling\6.Service and Application Attacks \090.What Attackers Are Looking For - XSS Attacks.mp4 [2c95dd6231b24f46] 6,119,888 7B1AD0A9
Performing Incident Response and Handling\6.Service and Application Attacks \079.Service and Application - Response and Restore.mp4 [f69b209a239c880a] 2,511,814 903E2BBA
Performing Incident Response and Handling\6.Service and Application Attacks \092.Tools - XSS Attacks.mp4 [eb7d51775860822d] 1,582,965 59BFF314
Performing Incident Response and Handling\6.Service and Application Attacks \091.Types of XSS Attacks.mp4 [2b39b9714ea4fde3] 3,428,275 BEF06B45
Performing Incident Response and Handling\5.Networks and Host Attacks 0 00000000
Performing Incident Response and Handling\3.Incident Response Processes 0 00000000
Performing Incident Response and Handling\1.Course Overview 0 00000000
Performing Incident Response and Handling\2.Preparing for Incident Response and Handling 0 00000000
Performing Incident Response and Handling\7.Malicious Code and Insider Threats 0 00000000
Performing Incident Response and Handling\4.The Workflow of Incident Response 0 00000000
Performing Incident Response and Handling\6.Service and Application Attacks 0 00000000
Performing Incident Response and Handling 0 00000000

Total size: 532,807,984
RAR Recovery
Not Present
Labels UNKNOWN