際際滷shows by User: materaj / http://www.slideshare.net/images/logo.gif 際際滷shows by User: materaj / Sun, 08 Jul 2018 04:33:26 GMT 際際滷Share feed for 際際滷shows by User: materaj How to create your own hack environment /slideshow/how-to-create-your-own-hack-environment-104801064/104801064 howtocreateyourownhackenvironment-180708043326
This slide for 2600 Thailand Meeting (July 2018) for setup your own hack environment. (Currency that use in this slide is Thai Baht)]]>

This slide for 2600 Thailand Meeting (July 2018) for setup your own hack environment. (Currency that use in this slide is Thai Baht)]]>
Sun, 08 Jul 2018 04:33:26 GMT /slideshow/how-to-create-your-own-hack-environment-104801064/104801064 materaj@slideshare.net(materaj) How to create your own hack environment materaj This slide for 2600 Thailand Meeting (July 2018) for setup your own hack environment. (Currency that use in this slide is Thai Baht) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtocreateyourownhackenvironment-180708043326-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This slide for 2600 Thailand Meeting (July 2018) for setup your own hack environment. (Currency that use in this slide is Thai Baht)
How to create your own hack environment from Sumedt Jitpukdebodin
]]>
1005 3 https://cdn.slidesharecdn.com/ss_thumbnails/howtocreateyourownhackenvironment-180708043326-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Phishing /slideshow/phishing-87353938/87353938 phishing-180207045613
Just for my youtube vdo]]>

Just for my youtube vdo]]>
Wed, 07 Feb 2018 04:56:13 GMT /slideshow/phishing-87353938/87353938 materaj@slideshare.net(materaj) Phishing materaj Just for my youtube vdo <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/phishing-180207045613-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Just for my youtube vdo
Phishing from Sumedt Jitpukdebodin
]]>
164 1 https://cdn.slidesharecdn.com/ss_thumbnails/phishing-180207045613-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Which side are you /slideshow/which-side-are-you-81108794/81108794 whichsideareyou-171023160840
Talks about information security in the dark side and light side.]]>

Talks about information security in the dark side and light side.]]>
Mon, 23 Oct 2017 16:08:40 GMT /slideshow/which-side-are-you-81108794/81108794 materaj@slideshare.net(materaj) Which side are you materaj Talks about information security in the dark side and light side. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whichsideareyou-171023160840-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talks about information security in the dark side and light side.
Which side are you from Sumedt Jitpukdebodin
]]>
171 2 https://cdn.slidesharecdn.com/ss_thumbnails/whichsideareyou-171023160840-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Endpoint is not enough /slideshow/endpoint-is-not-enough/80330113 endpointisnotenough-171001091920
For #Redpill2017, The most offensive security conference in Thailand. This slide talks about the weak point of endpoint protection such as Antivirus, User Account Control, AppLocker.]]>

For #Redpill2017, The most offensive security conference in Thailand. This slide talks about the weak point of endpoint protection such as Antivirus, User Account Control, AppLocker.]]>
Sun, 01 Oct 2017 09:19:20 GMT /slideshow/endpoint-is-not-enough/80330113 materaj@slideshare.net(materaj) Endpoint is not enough materaj For #Redpill2017, The most offensive security conference in Thailand. This slide talks about the weak point of endpoint protection such as Antivirus, User Account Control, AppLocker. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/endpointisnotenough-171001091920-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> For #Redpill2017, The most offensive security conference in Thailand. This slide talks about the weak point of endpoint protection such as Antivirus, User Account Control, AppLocker.
Endpoint is not enough from Sumedt Jitpukdebodin
]]>
1216 8 https://cdn.slidesharecdn.com/ss_thumbnails/endpointisnotenough-171001091920-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Antivirus is hopeless /slideshow/antivirus-is-hopeless/78276427 antivirusishopeless-170726145920
Talk about how to bypass Windows Security such as Windows Defender, UAC, AppLocker]]>

Talk about how to bypass Windows Security such as Windows Defender, UAC, AppLocker]]>
Wed, 26 Jul 2017 14:59:20 GMT /slideshow/antivirus-is-hopeless/78276427 materaj@slideshare.net(materaj) Antivirus is hopeless materaj Talk about how to bypass Windows Security such as Windows Defender, UAC, AppLocker <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/antivirusishopeless-170726145920-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talk about how to bypass Windows Security such as Windows Defender, UAC, AppLocker
Antivirus is hopeless from Sumedt Jitpukdebodin
]]>
690 5 https://cdn.slidesharecdn.com/ss_thumbnails/antivirusishopeless-170726145920-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Purple team is awesome /slideshow/purple-team-is-awesome/71329944 purpleteamisawesome-170124132845
Purple team is the team that all security of organization should be.]]>

Purple team is the team that all security of organization should be.]]>
Tue, 24 Jan 2017 13:28:45 GMT /slideshow/purple-team-is-awesome/71329944 materaj@slideshare.net(materaj) Purple team is awesome materaj Purple team is the team that all security of organization should be. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/purpleteamisawesome-170124132845-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Purple team is the team that all security of organization should be.
Purple team is awesome from Sumedt Jitpukdebodin
]]>
1409 3 https://cdn.slidesharecdn.com/ss_thumbnails/purpleteamisawesome-170124132845-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
R u hacked /slideshow/r-u-hacked-56451596/56451596 ruhacked-151226090811
Summary Security Incident Trend in Thailand 2015.]]>

Summary Security Incident Trend in Thailand 2015.]]>
Sat, 26 Dec 2015 09:08:11 GMT /slideshow/r-u-hacked-56451596/56451596 materaj@slideshare.net(materaj) R u hacked materaj Summary Security Incident Trend in Thailand 2015. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ruhacked-151226090811-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Summary Security Incident Trend in Thailand 2015.
R u hacked from Sumedt Jitpukdebodin
]]>
1579 6 https://cdn.slidesharecdn.com/ss_thumbnails/ruhacked-151226090811-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web architecture mechanism and threats /slideshow/web-architecture-mechanism-and-threats-51569073/51569073 webarchitecture-mechanismandthreats-150813032321-lva1-app6892
Fundamental of web architecture and threats, OWASP Thailand 2014]]>

Fundamental of web architecture and threats, OWASP Thailand 2014]]>
Thu, 13 Aug 2015 03:23:21 GMT /slideshow/web-architecture-mechanism-and-threats-51569073/51569073 materaj@slideshare.net(materaj) Web architecture mechanism and threats materaj Fundamental of web architecture and threats, OWASP Thailand 2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webarchitecture-mechanismandthreats-150813032321-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Fundamental of web architecture and threats, OWASP Thailand 2014
Web architecture mechanism and threats from Sumedt Jitpukdebodin
]]>
960 6 https://cdn.slidesharecdn.com/ss_thumbnails/webarchitecture-mechanismandthreats-150813032321-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Fundamental of malware analysis /materaj/fundamental-of-malware-analysis fundamentalofmalwareanalysis-150813030830-lva1-app6892
How to analyst malware and how to write the report.]]>

How to analyst malware and how to write the report.]]>
Thu, 13 Aug 2015 03:08:30 GMT /materaj/fundamental-of-malware-analysis materaj@slideshare.net(materaj) Fundamental of malware analysis materaj How to analyst malware and how to write the report. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fundamentalofmalwareanalysis-150813030830-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to analyst malware and how to write the report.
Fundamental of malware analysis from Sumedt Jitpukdebodin
]]>
630 6 https://cdn.slidesharecdn.com/ss_thumbnails/fundamentalofmalwareanalysis-150813030830-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security awareness training /slideshow/security-awareness-training-51568740/51568740 ywhc-fundamentalofcomputersecurity-securityawarenesstraining-150813030410-lva1-app6891
This presentation was 5-6 years ago. This topic is talk about Security Awareness Training]]>

This presentation was 5-6 years ago. This topic is talk about Security Awareness Training]]>
Thu, 13 Aug 2015 03:04:09 GMT /slideshow/security-awareness-training-51568740/51568740 materaj@slideshare.net(materaj) Security awareness training materaj This presentation was 5-6 years ago. This topic is talk about Security Awareness Training <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ywhc-fundamentalofcomputersecurity-securityawarenesstraining-150813030410-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation was 5-6 years ago. This topic is talk about Security Awareness Training
Security awareness training from Sumedt Jitpukdebodin
]]>
664 5 https://cdn.slidesharecdn.com/ss_thumbnails/ywhc-fundamentalofcomputersecurity-securityawarenesstraining-150813030410-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hacking with paper /slideshow/hacking-with-paper/51568692 hackingwithpaper-150813030129-lva1-app6892
How to hack people with paper (QRCode)?]]>

How to hack people with paper (QRCode)?]]>
Thu, 13 Aug 2015 03:01:29 GMT /slideshow/hacking-with-paper/51568692 materaj@slideshare.net(materaj) Hacking with paper materaj How to hack people with paper (QRCode)? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hackingwithpaper-150813030129-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to hack people with paper (QRCode)?
Hacking with paper from Sumedt Jitpukdebodin
]]>
1128 9 https://cdn.slidesharecdn.com/ss_thumbnails/hackingwithpaper-150813030129-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DDoS handlering /slideshow/ddos-handlering/51568578 ddoshandlering-150813025415-lva1-app6892
What is DoS? DDoS? And how to handle it.]]>

What is DoS? DDoS? And how to handle it.]]>
Thu, 13 Aug 2015 02:54:15 GMT /slideshow/ddos-handlering/51568578 materaj@slideshare.net(materaj) DDoS handlering materaj What is DoS? DDoS? And how to handle it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ddoshandlering-150813025415-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What is DoS? DDoS? And how to handle it.
DDoS handlering from Sumedt Jitpukdebodin
]]>
1099 4 https://cdn.slidesharecdn.com/ss_thumbnails/ddoshandlering-150813025415-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Incident response before:after breach /slideshow/incident-response-beforeafter-breach/51568464 incidentresponsebeforeafterbreach-150813024725-lva1-app6892
Describe what is required for incident response in company]]>

Describe what is required for incident response in company]]>
Thu, 13 Aug 2015 02:47:25 GMT /slideshow/incident-response-beforeafter-breach/51568464 materaj@slideshare.net(materaj) Incident response before:after breach materaj Describe what is required for incident response in company <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/incidentresponsebeforeafterbreach-150813024725-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Describe what is required for incident response in company
Incident response before:after breach from Sumedt Jitpukdebodin
]]>
1386 7 https://cdn.slidesharecdn.com/ss_thumbnails/incidentresponsebeforeafterbreach-150813024725-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
What should I do when my website got hack? /materaj/web-attack-analysis webattackanalysis-150803091918-lva1-app6892
How to analyst web application log to find web application attack]]>

How to analyst web application log to find web application attack]]>
Mon, 03 Aug 2015 09:19:18 GMT /materaj/web-attack-analysis materaj@slideshare.net(materaj) What should I do when my website got hack? materaj How to analyst web application log to find web application attack <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webattackanalysis-150803091918-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to analyst web application log to find web application attack
What should I do when my website got hack? from Sumedt Jitpukdebodin
]]>
1578 5 https://cdn.slidesharecdn.com/ss_thumbnails/webattackanalysis-150803091918-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Architecture - Mechanism and Threats /slideshow/web-architecture-mechanism-and-threats/41804615 webarchitecture-mechanismandthreats-141120074258-conversion-gate02
This slide is my presentation in 2600Thailand Meeting]]>

This slide is my presentation in 2600Thailand Meeting]]>
Thu, 20 Nov 2014 07:42:58 GMT /slideshow/web-architecture-mechanism-and-threats/41804615 materaj@slideshare.net(materaj) Web Architecture - Mechanism and Threats materaj This slide is my presentation in 2600Thailand Meeting <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webarchitecture-mechanismandthreats-141120074258-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This slide is my presentation in 2600Thailand Meeting
Web Architecture - Mechanism and Threats from Sumedt Jitpukdebodin
]]>
3985 8 https://cdn.slidesharecdn.com/ss_thumbnails/webarchitecture-mechanismandthreats-141120074258-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-materaj-48x48.jpg?cb=1698853072 Specialties: My Certification :: LPIC-1, NCLA, Comptia Security+, C|EHv6, eCPPT, IWSS, CPTE, GIAC GPEN www.techsuii.com https://cdn.slidesharecdn.com/ss_thumbnails/howtocreateyourownhackenvironment-180708043326-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/how-to-create-your-own-hack-environment-104801064/104801064 How to create your own... https://cdn.slidesharecdn.com/ss_thumbnails/phishing-180207045613-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/phishing-87353938/87353938 Phishing https://cdn.slidesharecdn.com/ss_thumbnails/whichsideareyou-171023160840-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/which-side-are-you-81108794/81108794 Which side are you