I’ll start by talking briefly about the protocols computers use to communicate. Then I'll discuss how they can be abused by demoing some of the tools and techniques security professionals (and hackers) use to scan and infiltrate servers.
If the demo gods are on my side, I’ll break in to a vulnerable system or two to show you how easy it is for people to exploit known vulnerabilities in software you, as a software developer, may be responsible for keeping up to date. Then finally I'll cover some ways to protect the software you write from those types of attacks.
YOU MAY ALSO LIKE:
- Secure Cloud Native Architecture (in London on 23rd - 25th March 2020)
- Practical ML 2020 (in London on 2nd - 3rd July 2020)
- A Guide to the Market Promise of Automagic AI-Enabled Detection and Response (in London on 29th October 2019)
- Skills Matter Open House November (in London on 25th November 2019)
- Using software engineering practices to improve engineering management (SkillsCast recorded in October 2019)
- How to stop worrying, love the SPA and appreciate Rails (SkillsCast recorded in October 2019)
Breaking into Computers Over the Internet
David is head of engineering at Pixie Labs, a software development agency. When he's not cutting code and looking after his engineering team, he builds the occasional website or Twitter bot, runs a podcast called Octal FM, and hosts irregular LAN parties with friends.