I’ll start by talking briefly about the protocols computers use to communicate. Then I'll discuss how they can be abused by demoing some of the tools and techniques security professionals (and hackers) use to scan and infiltrate servers.
If the demo gods are on my side, I’ll break in to a vulnerable system or two to show you how easy it is for people to exploit known vulnerabilities in software you, as a software developer, may be responsible for keeping up to date. Then finally I'll cover some ways to protect the software you write from those types of attacks.
YOU MAY ALSO LIKE:
- CloudNative London 2019 (in London on 25th - 27th September 2019)
- Keynote by Kris Nova on The Power of Linux Virtualization with Cloud Native (in London on 19th June 2019)
- Keynote by Iris Classon- Core and More: 30 Things You Should Know (in London on 28th August 2019)
- A practical guide for conducting efficient code reviews (SkillsCast recorded in June 2019)
- User-First Internationalisation (SkillsCast recorded in June 2019)
Breaking into Computers Over the Internet
David is head of engineering at Pixie Labs, a software development agency. When he's not cutting code and looking after his engineering team, he builds the occasional website or Twitter bot, runs a podcast called Octal FM, and hosts irregular LAN parties with friends.