I’ll start by talking briefly about the protocols computers use to communicate. Then I'll discuss how they can be abused by demoing some of the tools and techniques security professionals (and hackers) use to scan and infiltrate servers.
If the demo gods are on my side, I’ll break in to a vulnerable system or two to show you how easy it is for people to exploit known vulnerabilities in software you, as a software developer, may be responsible for keeping up to date. Then finally I'll cover some ways to protect the software you write from those types of attacks.
YOU MAY ALSO LIKE:
Breaking into Computers Over the Internet
David is head of engineering at Pixie Labs, a software development agency. When he's not cutting code and looking after his engineering team, he builds the occasional website or Twitter bot, runs a podcast called Octal FM, and hosts irregular LAN parties with friends.