ºÝºÝߣshows by User: phannarith / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: phannarith / Thu, 24 Sep 2015 09:50:58 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: phannarith 3 Security Tips for better security for personal computer /slideshow/3-security-tips-for-better-security-for-personal-computer/53146316 01-rong-tharoth-150924095058-lva1-app6892
This is the student assignment on Security]]>

This is the student assignment on Security]]>
Thu, 24 Sep 2015 09:50:58 GMT /slideshow/3-security-tips-for-better-security-for-personal-computer/53146316 phannarith@slideshare.net(phannarith) 3 Security Tips for better security for personal computer phannarith This is the student assignment on Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/01-rong-tharoth-150924095058-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the student assignment on Security
3 Security Tips for better security for personal computer from Phannarith Ou, G-CISO
]]>
556 5 https://cdn.slidesharecdn.com/ss_thumbnails/01-rong-tharoth-150924095058-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding NMAP /slideshow/understanding-nmap/51706108 nmap-150817055204-lva1-app6891
This is the basic document related to NMAP. This was present during the Defense Saturday 8. Defense Saturday is one of the initiative by SecuDemy.com ]]>

This is the basic document related to NMAP. This was present during the Defense Saturday 8. Defense Saturday is one of the initiative by SecuDemy.com ]]>
Mon, 17 Aug 2015 05:52:04 GMT /slideshow/understanding-nmap/51706108 phannarith@slideshare.net(phannarith) Understanding NMAP phannarith This is the basic document related to NMAP. This was present during the Defense Saturday 8. Defense Saturday is one of the initiative by SecuDemy.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nmap-150817055204-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the basic document related to NMAP. This was present during the Defense Saturday 8. Defense Saturday is one of the initiative by SecuDemy.com
Understanding NMAP from Phannarith Ou, G-CISO
]]>
10005 6 https://cdn.slidesharecdn.com/ss_thumbnails/nmap-150817055204-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Reconnaisance /phannarith/reconnaisance reconnaisance-web-150325092250-conversion-gate01
This is the reconnaissance technique that attacker use.]]>

This is the reconnaissance technique that attacker use.]]>
Wed, 25 Mar 2015 09:22:50 GMT /phannarith/reconnaisance phannarith@slideshare.net(phannarith) Reconnaisance phannarith This is the reconnaissance technique that attacker use. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/reconnaisance-web-150325092250-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the reconnaissance technique that attacker use.
Reconnaisance from Phannarith Ou, G-CISO
]]>
861 1 https://cdn.slidesharecdn.com/ss_thumbnails/reconnaisance-web-150325092250-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Case - How to protect your information /slideshow/group-8-45663902/45663902 group8-150310104308-conversion-gate01
This is the assignment on How to Protect Your Information]]>

This is the assignment on How to Protect Your Information]]>
Tue, 10 Mar 2015 10:43:08 GMT /slideshow/group-8-45663902/45663902 phannarith@slideshare.net(phannarith) Case - How to protect your information phannarith This is the assignment on How to Protect Your Information <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/group8-150310104308-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the assignment on How to Protect Your Information
Case - How to protect your information from Phannarith Ou, G-CISO
]]>
463 1 https://cdn.slidesharecdn.com/ss_thumbnails/group8-150310104308-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Case - How to protect your website /slideshow/case-how-to-protect-your-website/45663688 how-to-protect-your-website-150310103836-conversion-gate01
This is the case of students on "How to Protect Your Website".]]>

This is the case of students on "How to Protect Your Website".]]>
Tue, 10 Mar 2015 10:38:36 GMT /slideshow/case-how-to-protect-your-website/45663688 phannarith@slideshare.net(phannarith) Case - How to protect your website phannarith This is the case of students on "How to Protect Your Website". <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/how-to-protect-your-website-150310103836-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the case of students on &quot;How to Protect Your Website&quot;.
Case - How to protect your website from Phannarith Ou, G-CISO
]]>
1041 2 https://cdn.slidesharecdn.com/ss_thumbnails/how-to-protect-your-website-150310103836-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Case Study - Internet Security Policy (Khmer) /slideshow/case-study-internet-security-policy-khmer/45653786 internetsecuritypolicy-150310070342-conversion-gate01
this is the student case study on Internet Security Policy. Cambodia Information Security, CyberSecurity in Cambodia, Information Security in Cambodia.]]>

this is the student case study on Internet Security Policy. Cambodia Information Security, CyberSecurity in Cambodia, Information Security in Cambodia.]]>
Tue, 10 Mar 2015 07:03:42 GMT /slideshow/case-study-internet-security-policy-khmer/45653786 phannarith@slideshare.net(phannarith) Case Study - Internet Security Policy (Khmer) phannarith this is the student case study on Internet Security Policy. Cambodia Information Security, CyberSecurity in Cambodia, Information Security in Cambodia. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/internetsecuritypolicy-150310070342-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this is the student case study on Internet Security Policy. Cambodia Information Security, CyberSecurity in Cambodia, Information Security in Cambodia.
Case Study - Internet Security Policy (Khmer) from Phannarith Ou, G-CISO
]]>
1582 4 https://cdn.slidesharecdn.com/ss_thumbnails/internetsecuritypolicy-150310070342-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Internet Security Policy - Khmer /slideshow/internet-security-policy-slide-45653767/45653767 internetsecuritypolicy-slide-150310070322-conversion-gate01
this is the student case study on Internet Security Policy. Cambodia Information Security, CyberSecurity in Cambodia, Information Security in Cambodia.]]>

this is the student case study on Internet Security Policy. Cambodia Information Security, CyberSecurity in Cambodia, Information Security in Cambodia.]]>
Tue, 10 Mar 2015 07:03:21 GMT /slideshow/internet-security-policy-slide-45653767/45653767 phannarith@slideshare.net(phannarith) Internet Security Policy - Khmer phannarith this is the student case study on Internet Security Policy. Cambodia Information Security, CyberSecurity in Cambodia, Information Security in Cambodia. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/internetsecuritypolicy-slide-150310070322-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this is the student case study on Internet Security Policy. Cambodia Information Security, CyberSecurity in Cambodia, Information Security in Cambodia.
Internet Security Policy - Khmer from Phannarith Ou, G-CISO
]]>
1763 2 https://cdn.slidesharecdn.com/ss_thumbnails/internetsecuritypolicy-slide-150310070322-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Protect Computer From Virus /slideshow/how-to-protect-computer-from-virus/42265083 howtoprotectcomputervirus-141202100237-conversion-gate01
This is the assignment from the BBU student which discuss about the way how to protect our computer from virus.]]>

This is the assignment from the BBU student which discuss about the way how to protect our computer from virus.]]>
Tue, 02 Dec 2014 10:02:37 GMT /slideshow/how-to-protect-computer-from-virus/42265083 phannarith@slideshare.net(phannarith) How to Protect Computer From Virus phannarith This is the assignment from the BBU student which discuss about the way how to protect our computer from virus. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtoprotectcomputervirus-141202100237-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the assignment from the BBU student which discuss about the way how to protect our computer from virus.
How to Protect Computer From Virus from Phannarith Ou, G-CISO
]]>
1172 2 https://cdn.slidesharecdn.com/ss_thumbnails/howtoprotectcomputervirus-141202100237-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Secure Your WiFi /phannarith/how-to-secure-your-wifi how-to-secure-your-wifi-141202083137-conversion-gate02
This is the method how to secure your WiFi with simple step. This is the research assignment by BBU Students.]]>

This is the method how to secure your WiFi with simple step. This is the research assignment by BBU Students.]]>
Tue, 02 Dec 2014 08:31:37 GMT /phannarith/how-to-secure-your-wifi phannarith@slideshare.net(phannarith) How to Secure Your WiFi phannarith This is the method how to secure your WiFi with simple step. This is the research assignment by BBU Students. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/how-to-secure-your-wifi-141202083137-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the method how to secure your WiFi with simple step. This is the research assignment by BBU Students.
How to Secure Your WiFi from Phannarith Ou, G-CISO
]]>
1149 1 https://cdn.slidesharecdn.com/ss_thumbnails/how-to-secure-your-wifi-141202083137-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Facebook Security in 3 Ways /slideshow/facebook-security-in-3-ways/42241741 3-way-of-facebook-security-141201204011-conversion-gate01
This is the student assignment which talking about Facebook Security. There are 3 ways that the attacker can do to hack your Facebook Account]]>

This is the student assignment which talking about Facebook Security. There are 3 ways that the attacker can do to hack your Facebook Account]]>
Mon, 01 Dec 2014 20:40:11 GMT /slideshow/facebook-security-in-3-ways/42241741 phannarith@slideshare.net(phannarith) Facebook Security in 3 Ways phannarith This is the student assignment which talking about Facebook Security. There are 3 ways that the attacker can do to hack your Facebook Account <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/3-way-of-facebook-security-141201204011-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the student assignment which talking about Facebook Security. There are 3 ways that the attacker can do to hack your Facebook Account
Facebook Security in 3 Ways from Phannarith Ou, G-CISO
]]>
894 4 https://cdn.slidesharecdn.com/ss_thumbnails/3-way-of-facebook-security-141201204011-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Keylogger /slideshow/understanding-keylogger/38979047 p12r202t8-02-keylogger-140911111536-phpapp01
This is the assignment from the BBU's student which talks about the Keylogger. ]]>

This is the assignment from the BBU's student which talks about the Keylogger. ]]>
Thu, 11 Sep 2014 11:15:36 GMT /slideshow/understanding-keylogger/38979047 phannarith@slideshare.net(phannarith) Understanding Keylogger phannarith This is the assignment from the BBU's student which talks about the Keylogger. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-02-keylogger-140911111536-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the assignment from the BBU&#39;s student which talks about the Keylogger.
Understanding Keylogger from Phannarith Ou, G-CISO
]]>
2489 2 https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-02-keylogger-140911111536-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Exchange Server 2003 /phannarith/exchange-server-20 group04-mail-140909120054-phpapp01
This is assignment from BBU students on the topic of Exchange Server 2003. Please kindly check it and have it as your reference. ]]>

This is assignment from BBU students on the topic of Exchange Server 2003. Please kindly check it and have it as your reference. ]]>
Tue, 09 Sep 2014 12:00:54 GMT /phannarith/exchange-server-20 phannarith@slideshare.net(phannarith) Exchange Server 2003 phannarith This is assignment from BBU students on the topic of Exchange Server 2003. Please kindly check it and have it as your reference. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/group04-mail-140909120054-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is assignment from BBU students on the topic of Exchange Server 2003. Please kindly check it and have it as your reference.
Exchange Server 2003 from Phannarith Ou, G-CISO
]]>
1000 1 https://cdn.slidesharecdn.com/ss_thumbnails/group04-mail-140909120054-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network Security with ISA Server 2006 /slideshow/network-security-with-isa-server-2006/38880233 group03-network-140909113422-phpapp02
This is the assignment of BBU student on the topic "Network Security with ISA Server 2006". There are several factor that need to put in place.]]>

This is the assignment of BBU student on the topic "Network Security with ISA Server 2006". There are several factor that need to put in place.]]>
Tue, 09 Sep 2014 11:34:22 GMT /slideshow/network-security-with-isa-server-2006/38880233 phannarith@slideshare.net(phannarith) Network Security with ISA Server 2006 phannarith This is the assignment of BBU student on the topic "Network Security with ISA Server 2006". There are several factor that need to put in place. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/group03-network-140909113422-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the assignment of BBU student on the topic &quot;Network Security with ISA Server 2006&quot;. There are several factor that need to put in place.
Network Security with ISA Server 2006 from Phannarith Ou, G-CISO
]]>
1038 2 https://cdn.slidesharecdn.com/ss_thumbnails/group03-network-140909113422-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network Installation and Management in Windows 2008 Enterprise /phannarith/group02-networkmanagementonwindows2008enterprise group02-network-140908175741-phpapp02
This is the assignment of student from BBU regarding the Network installation and Management in Windows 2008 Enterprise.]]>

This is the assignment of student from BBU regarding the Network installation and Management in Windows 2008 Enterprise.]]>
Mon, 08 Sep 2014 17:57:41 GMT /phannarith/group02-networkmanagementonwindows2008enterprise phannarith@slideshare.net(phannarith) Network Installation and Management in Windows 2008 Enterprise phannarith This is the assignment of student from BBU regarding the Network installation and Management in Windows 2008 Enterprise. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/group02-network-140908175741-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the assignment of student from BBU regarding the Network installation and Management in Windows 2008 Enterprise.
Network Installation and Management in Windows 2008 Enterprise from Phannarith Ou, G-CISO
]]>
800 1 https://cdn.slidesharecdn.com/ss_thumbnails/group02-network-140908175741-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure System Development Proposal /slideshow/group01-networking-proposal/38795413 group01-networkingproposal-140907105349-phpapp02
This is the assignment of the BBU student on Secure System Development Proposal. ]]>

This is the assignment of the BBU student on Secure System Development Proposal. ]]>
Sun, 07 Sep 2014 10:53:49 GMT /slideshow/group01-networking-proposal/38795413 phannarith@slideshare.net(phannarith) Secure System Development Proposal phannarith This is the assignment of the BBU student on Secure System Development Proposal. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/group01-networkingproposal-140907105349-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the assignment of the BBU student on Secure System Development Proposal.
Secure System Development Proposal from Phannarith Ou, G-CISO
]]>
974 3 https://cdn.slidesharecdn.com/ss_thumbnails/group01-networkingproposal-140907105349-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to know you was hacked /slideshow/p12-r202t8-10howtoknowyougothack/38702327 p12r202t8-10-how-to-know-you-got-hack-140904104619-phpapp01
This is the assignment from the BBU student about the Information Security.]]>

This is the assignment from the BBU student about the Information Security.]]>
Thu, 04 Sep 2014 10:46:19 GMT /slideshow/p12-r202t8-10howtoknowyougothack/38702327 phannarith@slideshare.net(phannarith) How to know you was hacked phannarith This is the assignment from the BBU student about the Information Security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-10-how-to-know-you-got-hack-140904104619-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the assignment from the BBU student about the Information Security.
How to know you was hacked from Phannarith Ou, G-CISO
]]>
992 1 https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-10-how-to-know-you-got-hack-140904104619-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
áž¼Understanding DNS Spoofing /slideshow/p12-r202t8-06dnsspoofing/38702294 p12r202t8-06-dns-spoofing-140904104532-phpapp01
This is the assignment from BBU' student. The title is "Understanding DNS Spoofing". ]]>

This is the assignment from BBU' student. The title is "Understanding DNS Spoofing". ]]>
Thu, 04 Sep 2014 10:45:32 GMT /slideshow/p12-r202t8-06dnsspoofing/38702294 phannarith@slideshare.net(phannarith) áž¼Understanding DNS Spoofing phannarith This is the assignment from BBU' student. The title is "Understanding DNS Spoofing". <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-06-dns-spoofing-140904104532-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the assignment from BBU&#39; student. The title is &quot;Understanding DNS Spoofing&quot;.
ç™°ã‚·Understanding DNS Spoofing from Phannarith Ou, G-CISO
]]>
573 2 https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-06-dns-spoofing-140904104532-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Malware by BBU Student /slideshow/p12-r202t8-08malware/38492613 p12r202t8-08-malware-140829101541-phpapp02
Information Security, Malware, Virus, Trojan, Understanding Security. This is assignment of student at Build Bright University. ]]>

Information Security, Malware, Virus, Trojan, Understanding Security. This is assignment of student at Build Bright University. ]]>
Fri, 29 Aug 2014 10:15:41 GMT /slideshow/p12-r202t8-08malware/38492613 phannarith@slideshare.net(phannarith) Understanding Malware by BBU Student phannarith Information Security, Malware, Virus, Trojan, Understanding Security. This is assignment of student at Build Bright University. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-08-malware-140829101541-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Information Security, Malware, Virus, Trojan, Understanding Security. This is assignment of student at Build Bright University.
Understanding Malware by BBU Student from Phannarith Ou, G-CISO
]]>
943 4 https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-08-malware-140829101541-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Heartbleed vulnerability /slideshow/p12-r202t8-07heartbleed-vulnerability/38492587 p12r202t8-07-heartbleedvulnerability-140829101508-phpapp01
]]>

]]>
Fri, 29 Aug 2014 10:15:08 GMT /slideshow/p12-r202t8-07heartbleed-vulnerability/38492587 phannarith@slideshare.net(phannarith) Heartbleed vulnerability phannarith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-07-heartbleedvulnerability-140829101508-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Heartbleed vulnerability from Phannarith Ou, G-CISO
]]>
584 3 https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-07-heartbleedvulnerability-140829101508-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
P12 r202t8 05-spam /slideshow/p12-r202t8-05spam/38492585 p12r202t8-05-spam-140829101504-phpapp02
]]>

]]>
Fri, 29 Aug 2014 10:15:04 GMT /slideshow/p12-r202t8-05spam/38492585 phannarith@slideshare.net(phannarith) P12 r202t8 05-spam phannarith <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-05-spam-140829101504-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
P12 r202t8 05-spam from Phannarith Ou, G-CISO
]]>
282 2 https://cdn.slidesharecdn.com/ss_thumbnails/p12r202t8-05-spam-140829101504-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-phannarith-48x48.jpg?cb=1721031850 Mr. Ou Phannarith is the Director of Information and Communications Technology (ICT) Security of Ministry of Posts and Telecommunications of Cambodia. He is the former Head of National Cambodia Computer Emergency Response Team (CamCERT), National ICT Development Authority (NiDA), Council of Ministers. He had been involved in the development of Cybercrime Law, E-Commerce Law, Cambodia ICT Masterplan 2020 and Digital Signature legislation. Mr. OU has been invited to present in global conferences, forums and seminars and he is the ISLA-(ISC)2 award in 2016. In December 2012, he was awarded as one of the top 10 Chief Information Security Officers (CISO) in ASEAN by the International Data Gro... www.secudemy.com https://cdn.slidesharecdn.com/ss_thumbnails/01-rong-tharoth-150924095058-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/3-security-tips-for-better-security-for-personal-computer/53146316 3 Security Tips for be... https://cdn.slidesharecdn.com/ss_thumbnails/nmap-150817055204-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/understanding-nmap/51706108 Understanding NMAP https://cdn.slidesharecdn.com/ss_thumbnails/reconnaisance-web-150325092250-conversion-gate01-thumbnail.jpg?width=320&height=320&fit=bounds phannarith/reconnaisance Reconnaisance