狠狠撸shows by User: JunLI174 / http://www.slideshare.net/images/logo.gif 狠狠撸shows by User: JunLI174 / Tue, 30 Jan 2018 11:52:16 GMT 狠狠撸Share feed for 狠狠撸shows by User: JunLI174 自动化漏洞利用关键技术研究(Automatic Vulnerability Exploitation Technologies) /slideshow/automatic-vulnerability-exploitation-technologies/86912677 random-180130115216
Discuss the key technologies in doing automatic vulnerability exploitation]]>

Discuss the key technologies in doing automatic vulnerability exploitation]]>
Tue, 30 Jan 2018 11:52:16 GMT /slideshow/automatic-vulnerability-exploitation-technologies/86912677 JunLI174@slideshare.net(JunLI174) 自动化漏洞利用关键技术研究(Automatic Vulnerability Exploitation Technologies) JunLI174 Discuss the key technologies in doing automatic vulnerability exploitation <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/random-180130115216-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Discuss the key technologies in doing automatic vulnerability exploitation
自动化漏洞利用关键技术研究(Automatic Vulnerability Exploitation Technologies) from Jun LI
]]>
445 1 https://cdn.slidesharecdn.com/ss_thumbnails/random-180130115216-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DC010公司网络安全能力的叠加演进(Evolution of Enterprise Security Capabilities)2017-12-23 /slideshow/evolution-of-enterprise-security-capabilities/86035713 defcon-v2-180111173058
Enterprise Security Overview by Vice President From 360 Enterprise Security Group How to security enterprises from cyber attacks]]>

Enterprise Security Overview by Vice President From 360 Enterprise Security Group How to security enterprises from cyber attacks]]>
Thu, 11 Jan 2018 17:30:58 GMT /slideshow/evolution-of-enterprise-security-capabilities/86035713 JunLI174@slideshare.net(JunLI174) DC010公司网络安全能力的叠加演进(Evolution of Enterprise Security Capabilities)2017-12-23 JunLI174 Enterprise Security Overview by Vice President From 360 Enterprise Security Group How to security enterprises from cyber attacks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon-v2-180111173058-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Enterprise Security Overview by Vice President From 360 Enterprise Security Group How to security enterprises from cyber attacks
DC010公司网络安全能力的叠加演进(Evolution of Enterprise Security Capabilities)2017-12-23 from Jun LI
]]>
224 1 https://cdn.slidesharecdn.com/ss_thumbnails/defcon-v2-180111173058-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Anonymity is the price to pay for privacy 2017 06-03 /slideshow/anonymity-is-the-price-to-pay-for-privacy-2017-0603/81095408 anonymityisthepricetopayforprivacy2017-06-03-171023095100
In this talk Ivan go through some examples to show how your privacy can be leaked ,how your privacy got abuse by the ad companies, or adversaries, he also shows us some practical measures we can use to protect our privacy ,at least mitigate the leakage of our precious privacy ;)]]>

In this talk Ivan go through some examples to show how your privacy can be leaked ,how your privacy got abuse by the ad companies, or adversaries, he also shows us some practical measures we can use to protect our privacy ,at least mitigate the leakage of our precious privacy ;)]]>
Mon, 23 Oct 2017 09:51:00 GMT /slideshow/anonymity-is-the-price-to-pay-for-privacy-2017-0603/81095408 JunLI174@slideshare.net(JunLI174) Anonymity is the price to pay for privacy 2017 06-03 JunLI174 In this talk Ivan go through some examples to show how your privacy can be leaked ,how your privacy got abuse by the ad companies, or adversaries, he also shows us some practical measures we can use to protect our privacy ,at least mitigate the leakage of our precious privacy ;) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/anonymityisthepricetopayforprivacy2017-06-03-171023095100-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this talk Ivan go through some examples to show how your privacy can be leaked ,how your privacy got abuse by the ad companies, or adversaries, he also shows us some practical measures we can use to protect our privacy ,at least mitigate the leakage of our precious privacy ;)
Anonymity is the price to pay for privacy 2017 06-03 from Jun LI
]]>
68 1 https://cdn.slidesharecdn.com/ss_thumbnails/anonymityisthepricetopayforprivacy2017-06-03-171023095100-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Defcon24 CTF 决赛回顾2017 06-03 /slideshow/defcon24-ctf-2017-0603/81092706 defcon24ctf2017-06-03-171023084730
In this talk BrieflyX(裴中煜) talks about the experience his gained while participating in the DEFCON CTF final ]]>

In this talk BrieflyX(裴中煜) talks about the experience his gained while participating in the DEFCON CTF final ]]>
Mon, 23 Oct 2017 08:47:30 GMT /slideshow/defcon24-ctf-2017-0603/81092706 JunLI174@slideshare.net(JunLI174) Defcon24 CTF 决赛回顾2017 06-03 JunLI174 In this talk BrieflyX(裴中煜) talks about the experience his gained while participating in the DEFCON CTF final <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/defcon24ctf2017-06-03-171023084730-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this talk BrieflyX(裴中煜) talks about the experience his gained while participating in the DEFCON CTF final
Defcon24 CTF 蜀ウ襍帛屓鬘セ2017 06-03 from Jun LI
]]>
105 1 https://cdn.slidesharecdn.com/ss_thumbnails/defcon24ctf2017-06-03-171023084730-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Application of threat intelligence in security operation 2017-06-03 /slideshow/application-of-threat-intelligence-in-security-operation-20170603/81092485 applicationofthreatintelligenceinsecurityoperation2017-06-03-171023084106
In this talk Jeremy Li talks about how to apply threat intelligence to security operations]]>

In this talk Jeremy Li talks about how to apply threat intelligence to security operations]]>
Mon, 23 Oct 2017 08:41:06 GMT /slideshow/application-of-threat-intelligence-in-security-operation-20170603/81092485 JunLI174@slideshare.net(JunLI174) Application of threat intelligence in security operation 2017-06-03 JunLI174 In this talk Jeremy Li talks about how to apply threat intelligence to security operations <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/applicationofthreatintelligenceinsecurityoperation2017-06-03-171023084106-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this talk Jeremy Li talks about how to apply threat intelligence to security operations
Application of threat intelligence in security operation 2017-06-03 from Jun LI
]]>
304 1 https://cdn.slidesharecdn.com/ss_thumbnails/applicationofthreatintelligenceinsecurityoperation2017-06-03-171023084106-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android bug hunting from finding bugs to getting bounty 2017-06-03 /slideshow/android-bug-hunting-from-finding-bugs-to-getting-bounty-20170603/81092288 androidbughunting-fromfindingbugstogettingbounty2017-06-03-171023083559
In the talk Hanxiang Wen talks about how to hunt bugs in Android and how to report bugs to affected vendors to get the bounty money]]>

In the talk Hanxiang Wen talks about how to hunt bugs in Android and how to report bugs to affected vendors to get the bounty money]]>
Mon, 23 Oct 2017 08:35:59 GMT /slideshow/android-bug-hunting-from-finding-bugs-to-getting-bounty-20170603/81092288 JunLI174@slideshare.net(JunLI174) Android bug hunting from finding bugs to getting bounty 2017-06-03 JunLI174 In the talk Hanxiang Wen talks about how to hunt bugs in Android and how to report bugs to affected vendors to get the bounty money <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/androidbughunting-fromfindingbugstogettingbounty2017-06-03-171023083559-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the talk Hanxiang Wen talks about how to hunt bugs in Android and how to report bugs to affected vendors to get the bounty money
Android bug hunting from finding bugs to getting bounty 2017-06-03 from Jun LI
]]>
309 1 https://cdn.slidesharecdn.com/ss_thumbnails/androidbughunting-fromfindingbugstogettingbounty2017-06-03-171023083559-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DEFCON GROUP 010 Intro and Opening 李均 /slideshow/defcon-group-010-into-and-opening/74018426 opening-170331013116
李均(DC010 Founder,Point of contact,security researcher at Unicorn Team,Qihoo360)introduce how DC010 came into been,how hacker community operates]]>

李均(DC010 Founder,Point of contact,security researcher at Unicorn Team,Qihoo360)introduce how DC010 came into been,how hacker community operates]]>
Fri, 31 Mar 2017 01:31:16 GMT /slideshow/defcon-group-010-into-and-opening/74018426 JunLI174@slideshare.net(JunLI174) DEFCON GROUP 010 Intro and Opening 李均 JunLI174 李均(DC010 Founder,Point of contact,security researcher at Unicorn Team,Qihoo360)introduce how DC010 came into been,how hacker community operates <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/opening-170331013116-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 李均(DC010 Founder,Point of contact,security researcher at Unicorn Team,Qihoo360)introduce how DC010 came into been,how hacker community operates
DEFCON GROUP 010 Intro and Opening 李均 from Jun LI
]]>
295 2 https://cdn.slidesharecdn.com/ss_thumbnails/opening-170331013116-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-JunLI174-48x48.jpg?cb=1523985645 Technology is the ultimate force that drive the human race forward ! https://cdn.slidesharecdn.com/ss_thumbnails/random-180130115216-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/automatic-vulnerability-exploitation-technologies/86912677 自动化漏洞利用关键技术研究(础耻迟辞尘补迟颈... https://cdn.slidesharecdn.com/ss_thumbnails/defcon-v2-180111173058-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/evolution-of-enterprise-security-capabilities/86035713 顿颁010公司网络安全能力的迭加演进(贰惫辞... https://cdn.slidesharecdn.com/ss_thumbnails/anonymityisthepricetopayforprivacy2017-06-03-171023095100-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/anonymity-is-the-price-to-pay-for-privacy-2017-0603/81095408 Anonymity is the price...