Posted on 10/02/201204/24/2014 Defending Against Google Hacking : Know What Can Be Found On Search Engines
Posted on 09/13/201204/24/2014 Why you should NOT use File Sharing services such as LimeWire and UTorrent : How to hide Malware / Rootkits in legitimate software.
Posted on 08/23/201204/24/2014 Configuring On-Boarding Using Identity Services Engine ISE 1.1MR / 1.1.1
Posted on 05/17/201211/11/2014 An Overview Of Zenprise Mobile Device Management MDM – Setting Up A Zenprise Lab
Posted on 02/21/201204/24/2014 Penetration Testing Tools At Your Next Security Conference – WIFI Pineapple Mark III