I’ll start by talking briefly about the protocols computers use to communicate. Then I'll discuss how they can be abused by demoing some of the tools and techniques security professionals (and hackers) use to scan and infiltrate servers.
If the demo gods are on my side, I’ll break in to a vulnerable system or two to show you how easy it is for people to exploit known vulnerabilities in software you, as a software developer, may be responsible for keeping up to date. Then finally I'll cover some ways to protect the software you write from those types of attacks.
YOU MAY ALSO LIKE:
- Lightbend Akka for Scala - Expert (in London on 26th - 27th November 2018)
- Scala eXchange London 2018 (in London on 13th - 14th December 2018)
- Kubernetes: Master Application Deployment and Scaling with Daniele Polencic (in London on 13th - 14th December 2018)
- Advanced Docker for Enterprise Operations (in London on 5th - 6th June 2019)
Breaking into Computers Over the Internet
David is head of engineering at Pixie Labs, a software development agency. When he's not cutting code and looking after his engineering team, he builds the occasional website or Twitter bot, runs a podcast called Octal FM, and hosts irregular LAN parties with friends.