[FreeCourseLab.com] Udemy - The Complete Cyber Security Course Hackers Exposed!

Torrent Hash:
787F043025C5F6E814462D1AF8AEEE95FA0D6426
Number of Files:
562
Content Size:
4.26GB
Convert On:
2020-07-26
Magnet Link:
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
File Name
Size
1. Introduction/1. Welcome and Introduction to the Instructor!.mp4
19.9MB
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
1. Introduction/1. Welcome and Introduction to the Instructor!.vtt
1.88KB
1. Introduction/1.1 Nathan's Cyber Security Blog.html
99B
1. Introduction/1.2 Nathan's Twitter #GotoNathan.html
91B
1. Introduction/2. Security Quick Win!.mp4
43.2MB
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
1. Introduction/2. Security Quick Win!.vtt
15.27KB
1. Introduction/2.1 httpswww.stationx.netcanarytokens.html
99B
1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4
16.11MB
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
1. Introduction/3. Goals and Learning Objectives - Volume 1.vtt
2.55KB
1. Introduction/4. Target Audience.mp4
7.33MB
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
1. Introduction/4. Target Audience.vtt
3.23KB
1. Introduction/5. Study Recommendations.mp4
17.94MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
1. Introduction/5. Study Recommendations.vtt
6.48KB
1. Introduction/6. Course updates.mp4
4.39MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
1. Introduction/6. Course updates.vtt
787B
10. Security Domains/1. Goals and Learning Objectives.mp4
1.43MB
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
10. Security Domains/1. Goals and Learning Objectives.vtt
463B
10. Security Domains/2. Security Domains.mp4
21.84MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
10. Security Domains/2. Security Domains.vtt
15.14KB
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4
2.29MB
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
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.vtt
758B
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4
13.85MB
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
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.vtt
3.58KB
11. Security Through Isolation and Compartmentalization/10.1 Apparmor.html
105B
11. Security Through Isolation and Compartmentalization/10.2 Trusted BSD.html
87B
11. Security Through Isolation and Compartmentalization/10.3 Firejail.html
92B
11. Security Through Isolation and Compartmentalization/10.4 Script Sandfox.html
118B
11. Security Through Isolation and Compartmentalization/10.5 Linux Sandbox.html
96B
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4
23.8MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.vtt
7.54KB
11. Security Through Isolation and Compartmentalization/11.1 Firefox profile.html
132B
11. Security Through Isolation and Compartmentalization/11.2 OSX-Sandbox--Seatbelt--Profiles.html
119B
11. Security Through Isolation and Compartmentalization/11.3 Apple Sandbox Guide.html
139B
11. Security Through Isolation and Compartmentalization/11.4 Buckle Up.html
97B
11. Security Through Isolation and Compartmentalization/11.5 Mac OS X - App Sandbox.html
193B
11. Security Through Isolation and Compartmentalization/11.6 SuperDuper.html
127B
11. Security Through Isolation and Compartmentalization/11.7 How to run your Applications in a Mac OS X sandbox to enhance security.html
176B
11. Security Through Isolation and Compartmentalization/11.8 Sandbox Man page.html
165B
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4
44.44MB
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
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.vtt
17.1KB
11. Security Through Isolation and Compartmentalization/12.1 OpenVZ.html
90B
11. Security Through Isolation and Compartmentalization/12.2 Wikipedia - Kernel-based Virtual Machine.html
119B
11. Security Through Isolation and Compartmentalization/12.3 Wikipedia - Comparison of platform virtualization software.html
137B
11. Security Through Isolation and Compartmentalization/12.4 Virt Manager.html
86B
11. Security Through Isolation and Compartmentalization/12.5 KVM Debian Jessie.html
98B
11. Security Through Isolation and Compartmentalization/12.6 Turnkey Linux - Openvpn.html
97B
11. Security Through Isolation and Compartmentalization/12.7 Wikipedia - Hypervisor.html
101B
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4
22.74MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.vtt
14.92KB
11. Security Through Isolation and Compartmentalization/13.1 Example VMware security bug.html
123B
11. Security Through Isolation and Compartmentalization/13.2 httpsen.wikipedia.orgwikiTiming_channel.html
105B
11. Security Through Isolation and Compartmentalization/13.3 A look at malware with VM detection.html
161B
11. Security Through Isolation and Compartmentalization/13.4 Venom.html
90B
11. Security Through Isolation and Compartmentalization/13.5 httpsen.wikipedia.orgwikiCovert_channel.html
105B
11. Security Through Isolation and Compartmentalization/13.6 Exploiting dram rowhammer (Could be used on VMs in the future).html
152B
11. Security Through Isolation and Compartmentalization/13.7 httpsen.wikipedia.orgwikiX86_virtualization.html
109B
11. Security Through Isolation and Compartmentalization/13.8 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html
110B
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4
36.97MB
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
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.vtt
13.06KB
11. Security Through Isolation and Compartmentalization/14.1 Convert VM to ISO.html
109B
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4
88.65MB
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
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.vtt
27.52KB
11. Security Through Isolation and Compartmentalization/15.1 httpswww.whonix.org.html
84B
11. Security Through Isolation and Compartmentalization/15.2 Whonix and virtualbox.html
99B
11. Security Through Isolation and Compartmentalization/15.3 Whonix VM snapshots.html
116B
11. Security Through Isolation and Compartmentalization/15.4 Whonix Stream Isolation.html
105B
11. Security Through Isolation and Compartmentalization/15.5 Whonix Check.html
100B
11. Security Through Isolation and Compartmentalization/15.6 ARM - Anonymizing relay monitor.html
108B
11. Security Through Isolation and Compartmentalization/15.7 How to implement physical isolation.html
131B
11. Security Through Isolation and Compartmentalization/15.8 If setting up your own workstations - MUST READ.html
112B
11. Security Through Isolation and Compartmentalization/15.9 Whonix Features.html
97B
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4
15.78MB
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
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.vtt
6.24KB
11. Security Through Isolation and Compartmentalization/16.1 Whonix - Warnings.html
96B
11. Security Through Isolation and Compartmentalization/16.2 Whonix's lack of an Amnesic feature.html
190B
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4
78.72MB
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
11. Security Through Isolation and Compartmentalization/17. Qubes OS.vtt
26.33KB
11. Security Through Isolation and Compartmentalization/17.1 Qubes Download.html
96B
11. Security Through Isolation and Compartmentalization/17.10 Hardware Compatibility List (HCL).html
90B
11. Security Through Isolation and Compartmentalization/17.2 Disposable VMs (DispVMs).html
97B
11. Security Through Isolation and Compartmentalization/17.3 Qubes docs.html
90B
11. Security Through Isolation and Compartmentalization/17.4 Debian template(s).html
107B
11. Security Through Isolation and Compartmentalization/17.5 Split GPG.html
100B
11. Security Through Isolation and Compartmentalization/17.6 Whonix templates.html
105B
11. Security Through Isolation and Compartmentalization/17.7 Video Tour of Qubes.html
91B
11. Security Through Isolation and Compartmentalization/17.8 Windows templates.html
108B
11. Security Through Isolation and Compartmentalization/17.9 Librem 13 laptop.html
105B
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4
14.98MB
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
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.vtt
6.55KB
11. Security Through Isolation and Compartmentalization/18.1 Partitioning my digital life into security domains.html
145B
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4
5.66MB
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
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.vtt
3.04KB
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4
25.58MB
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
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.vtt
9.91KB
11. Security Through Isolation and Compartmentalization/3.1 Windows - Tmac.html
89B
11. Security Through Isolation and Compartmentalization/3.2 Mac OS X - How to change the mac address.html
141B
11. Security Through Isolation and Compartmentalization/3.3 Diagram of Mac.html
131B
11. Security Through Isolation and Compartmentalization/3.4 Mac OS X - Wifispoof.html
83B
11. Security Through Isolation and Compartmentalization/3.5 Mac OS X - Macdaddyx.html
109B
11. Security Through Isolation and Compartmentalization/3.6 Linux - How to use macchanger.html
132B
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp4
50.25MB
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
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.vtt
15.96KB
11. Security Through Isolation and Compartmentalization/4.1 httpswww.nitrokey.com.html
87B
11. Security Through Isolation and Compartmentalization/4.2 Linux - i-nex.html
88B
11. Security Through Isolation and Compartmentalization/4.3 Mac OS X - Mac Cupid.html
120B
11. Security Through Isolation and Compartmentalization/4.4 Linux and Mac OS X - dmidecode.html
93B
11. Security Through Isolation and Compartmentalization/4.5 Mac OS X - Installing dmidecode with brew.html
119B
11. Security Through Isolation and Compartmentalization/4.6 Windows - CPU Z.html
103B
11. Security Through Isolation and Compartmentalization/4.7 Windows - dmidecode.html
115B
11. Security Through Isolation and Compartmentalization/4.8 httpswww.yubico.com.html
84B
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp4
57.31MB
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
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.vtt
12.84KB
11. Security Through Isolation and Compartmentalization/5.1 Maxthon.html
84B
11. Security Through Isolation and Compartmentalization/5.2 Aegis Secure Key - USB 2.0 Flash Drive.html
108B
11. Security Through Isolation and Compartmentalization/5.3 Pen Drive Apps.html
89B
11. Security Through Isolation and Compartmentalization/5.4 Portable Apps.html
85B
11. Security Through Isolation and Compartmentalization/5.5 Authentic8.html
97B
11. Security Through Isolation and Compartmentalization/5.6 Spikes.html
91B
11. Security Through Isolation and Compartmentalization/5.7 Spoons.net.html
88B
11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp4
7.93MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
11. Security Through Isolation and Compartmentalization/6. Dual Boot.vtt
4.42KB
11. Security Through Isolation and Compartmentalization/6.1 Dual Booting explained.html
177B
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp4
10.4MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.vtt
4.43KB
11. Security Through Isolation and Compartmentalization/7.1 Mozilla Sandbox design.html
102B
11. Security Through Isolation and Compartmentalization/7.2 Chromium sandbox design.html
121B
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp4
26.37MB
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
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.vtt
8.78KB
11. Security Through Isolation and Compartmentalization/8.1 Shadowdefender.html
91B
11. Security Through Isolation and Compartmentalization/8.2 Comodo.html
110B
11. Security Through Isolation and Compartmentalization/8.3 f-sandbox.html
92B
11. Security Through Isolation and Compartmentalization/8.4 BufferZone.html
112B
11. Security Through Isolation and Compartmentalization/8.5 Deepfreeze Cloud Browser and Desktop.html
129B
11. Security Through Isolation and Compartmentalization/8.6 Returnil.html
118B
11. Security Through Isolation and Compartmentalization/8.7 Deepfreeze Standard.html
121B
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4
70.11MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt
15.22KB
11. Security Through Isolation and Compartmentalization/9.1 Sandboxie How it Works.html
106B
11. Security Through Isolation and Compartmentalization/9.2 Sandboxie guide.html
118B
11. Security Through Isolation and Compartmentalization/9.3 Introduction and quick guide sandboxie.html
143B
11. Security Through Isolation and Compartmentalization/9.4 Sandboxie forum.html
96B
12. Wrap Up/1. Congratulations.mp4
5.28MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
12. Wrap Up/1. Congratulations.vtt
1.43KB
12. Wrap Up/1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html
136B
12. Wrap Up/2. Certificate Of Completion for CPEs.mp4
2.2MB
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
12. Wrap Up/2. Certificate Of Completion for CPEs.vtt
1.12KB
12. Wrap Up/2.1 httpswww.stationx.netcertificate-request.html
106B
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4
48.08MB
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
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt
21.59KB
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.mp4
24.16MB
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
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.vtt
11.74KB
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4
31.76MB
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
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt
21.23KB
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.mp4
38.18MB
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
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.vtt
19.41KB
13. BONUS Section/1. BONUS DISCOUNT COUPONS .html
4.95KB
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp4
2.24MB
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
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.vtt
1.35KB
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp4
3MB
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
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.vtt
1.59KB
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp4
10.27MB
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
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.vtt
4.27KB
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp4
2.7MB
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
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.vtt
905B
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp4
8.94MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.vtt
4.76KB
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp4
11.87MB
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
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.vtt
5.07KB
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp4
11.24MB
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
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.vtt
4.65KB
2. know Yourself - The Threat and Vulnerability Landscape/5.1 The Cyber Security Landscape Diagram.jpg.jpg
777.15KB
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp4
7.69MB
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
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.vtt
3.55KB
2. know Yourself - The Threat and Vulnerability Landscape/6.1 httpswww.stationx.netsabsa.html
92B
2. know Yourself - The Threat and Vulnerability Landscape/6.2 httpswww.securityforum.org.html
91B
2. know Yourself - The Threat and Vulnerability Landscape/6.3 httpswww.iso.orgstandard56742.html.html
100B
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp4
18.03MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.vtt
9.18KB
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp4
5.43MB
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
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.vtt
2.52KB
2. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).mp4
19.33MB
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
2. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).vtt
10.37KB
2. know Yourself - The Threat and Vulnerability Landscape/9.1 httpswww.stationx.netsabsa.html
92B
2. know Yourself - The Threat and Vulnerability Landscape/9.2 httpsen.wikipedia.orgwikiAuthentication.html
105B
2. know Yourself - The Threat and Vulnerability Landscape/9.3 httpsen.wikipedia.orgwikiParkerian_Hexad.html
106B
2. know Yourself - The Threat and Vulnerability Landscape/9.4 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html
147B
2. know Yourself - The Threat and Vulnerability Landscape/9.5 httpsen.wikipedia.orgwikiAuthorization.html
104B
2. know Yourself - The Threat and Vulnerability Landscape/9.6 httpsen.wikipedia.orgwikiNon-repudiation.html
106B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp4
2.9MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.vtt
1.09KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.mp4
11.92MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.vtt
5.94KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.1 httpwww.consumerfraudreporting.org.html
98B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.2 Top 10 scams.html
127B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.3 httpwww.actionfraud.police.uktypes_of_fraud.html
108B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4
16.19MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt
9.64KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.1 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html
129B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.10 httpsthehackernews.com201802cryptojacking-malware.html.html
121B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.2 httpsgithub.comhoshsadiqadblock-nocoin-list.html
110B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.3 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html
136B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.4 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html
146B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.5 httpscoinhive.com.html
82B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.6 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html
184B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.7 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html
122B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.8 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html
154B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.9 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html
116B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp4
32.44MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.vtt
8.24KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html
121B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp4
27.02MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.vtt
5.91KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp4
30.23MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.vtt
10.72KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.1 httpsnsa.gov1.infodninsa-ant-catalog.html
103B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.2 httpswikileaks.org-Leaks-.html.html
95B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.3 httpwww.nsaplayset.org.html
87B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.4 httpstheintercept.com.html
86B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.5 httpscryptome.org201401nsa-codenames.htm.html
107B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.6 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html
104B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.mp4
42.73MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.vtt
15.78KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.1 UK data communications bill.html
121B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html
193B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.11 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html
120B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.12 A Worldwide Survey of E ncryption Products - xls.html
154B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.13 The Case against Regulating Encryption Technology.html
112B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.2 Kazakhstans new encryption law.html
185B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.3 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html
150B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.4 Clipper chip.html
192B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.5 WhatsApp was Banned for 48 Hours in Brazil.html
112B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.6 Matt Blaze Speaking to a US congressional committee.html
107B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.7 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html
137B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.8 A Worldwide Survey of Encryption Products - pdf.html
153B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.9 httpwww.washingtonsblog.com201505nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html.html
164B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp4
24.48MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.vtt
11.01KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.1 Apple backdoor order.html
112B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.2 Examples of backdoors.html
123B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.3 httpsreproducible-builds.org.html
93B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.4 Apple removes malware infected apps from the app store.html
165B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.5 Formal methods.html
105B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.6 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html
154B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.7 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html
133B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.8 Video on how to build your own software reproducibly.html
142B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp4
6.49MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.vtt
2.73KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html
129B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17.2 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html
132B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17.3 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html
168B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp4
2.61MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.vtt
1.07KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18.1 httpwww.stationx.netalerts.html
91B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp4
28.93MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.vtt
5.9KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html
137B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html
132B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp4
2.5MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.vtt
1.45KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3.1 httpsresearch.google.compubspub43963.html.html
107B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4
38.1MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt
10.62KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.1 httpswww.exploit-db.comsearch.html
95B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.2 CVE details.html
88B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.3 Exploit Kit Landscape Map.html
99B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp4
7.7MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.vtt
2.99KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp4
12.15MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.vtt
7.27KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.1 7 most common RATs.html
149B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.2 Malware stats.html
107B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.3 SophosLabs 2018 Malware Forecast.html
162B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.4 Chef Jamie Oliver’s website hacked for the third time.html
106B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.5 Report - Spotlight perils of malvertisements.html
142B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4
10.77MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt
5.33KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html
198B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7.2 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html
195B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html
156B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7.4 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html
135B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp4
25.99MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.vtt
15.35KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.1 XSS example vulnerability.html
136B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.2 Live phishing links.html
87B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.3 Homograph attack using internationalized domain name.html
134B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp4
4.79MB
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
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.vtt
3.51KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.1 Spam example.html
142B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.2 Spam stats.html
104B
4. Encryption Crash Course/1. Goals and Learning Objectives.mp4
1.63MB
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
4. Encryption Crash Course/1. Goals and Learning Objectives.vtt
592B
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4
199.31MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.vtt
16.46KB
4. Encryption Crash Course/10.1 SSL Sniff.html
107B
4. Encryption Crash Course/10.2 CA Ecosystem.html
105B
4. Encryption Crash Course/10.3 CA example mistake.html
180B
4. Encryption Crash Course/10.4 Cert Fingerprints.html
97B
4. Encryption Crash Course/10.5 Certificate patrol.html
127B
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp4
8.19MB
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
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).vtt
2KB
4. Encryption Crash Course/12. Steganography.mp4
104.31MB
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
4. Encryption Crash Course/12. Steganography.vtt
8.6KB
4. Encryption Crash Course/12.1 OpenPuff Manual.html
107B
4. Encryption Crash Course/12.2 httpwww.spammimic.com.html
85B
4. Encryption Crash Course/12.3 List of Steg Tools.html
105B
4. Encryption Crash Course/12.4 OpenPuff.html
116B
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp4
17.36MB
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
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.vtt
3.09KB
4. Encryption Crash Course/13.1 Security Pitfalls.html
135B
4. Encryption Crash Course/2. Symmetric Encryption.mp4
32.31MB
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
4. Encryption Crash Course/2. Symmetric Encryption.vtt
9.99KB
4. Encryption Crash Course/3. Asymmetric Encryption.mp4
72.31MB
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
4. Encryption Crash Course/3. Asymmetric Encryption.vtt
11.46KB
4. Encryption Crash Course/4. Hash Functions.mp4
89.23MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
4. Encryption Crash Course/4. Hash Functions.vtt
6.3KB
4. Encryption Crash Course/4.1 Example hashes.html
104B
4. Encryption Crash Course/5. Digital Signatures.mp4
42.74MB
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
4. Encryption Crash Course/5. Digital Signatures.vtt
5.08KB
4. Encryption Crash Course/5.1 httpswww.symantec.comenukcode-signing.html
107B
4. Encryption Crash Course/5.2 Windows 10 Device Guard using Digital Signatures.html
174B
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4
160.84MB
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
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt
13.65KB
4. Encryption Crash Course/6.1 Weakdh Cipher Suite Recommendations.html
93B
4. Encryption Crash Course/6.2 Mozilla Cipher Suite Recommendations.html
110B
4. Encryption Crash Course/6.3 Steve Gibson's Cipher Suite Recommendations.html
117B
4. Encryption Crash Course/6.4 Wikipedia Transport Layer Security (TLS) page.html
115B
4. Encryption Crash Course/7. SSL Stripping.mp4
114.52MB
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
4. Encryption Crash Course/7. SSL Stripping.vtt
13.34KB
4. Encryption Crash Course/7.1 sniffdet - Remote Sniffer Detection ToolLibrary.html
93B
4. Encryption Crash Course/7.2 Arpwatch Tool to Monitor Ethernet Activity in Linux.html
119B
4. Encryption Crash Course/7.3 WIFI Pineapple.html
91B
4. Encryption Crash Course/7.4 SSL Strip tool By Moxie Marlinspike.html
107B
4. Encryption Crash Course/7.5 Cain & Abel.html
89B
4. Encryption Crash Course/7.6 Intro to Sniffers.html
127B
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4
81.9MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
4. Encryption Crash Course/8. HTTPS (HTTP Secure).vtt
6.98KB
4. Encryption Crash Course/8.1 Server Name Indication (SNI) Wiki.html
113B
4. Encryption Crash Course/9. Digital Certificates.mp4
81.96MB
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
4. Encryption Crash Course/9. Digital Certificates.vtt
6.13KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp4
1.85MB
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
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.vtt
704B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4
113.35MB
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
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt
10.77KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.1 httpsen.wikipedia.orgwikiHypervisor.html
101B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.10 httpsmarketplace.vmware.com.html
92B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.11 Windows VMs here.html
124B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.2 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html
137B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.3 httpwww.osboxes.orgvirtualbox-images.html
102B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.4 httpwww.osboxes.orgvmware-images.html
98B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.5 httpwww.osboxes.orgguide#!.html
92B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.6 httpvirtual-machine.org.html
88B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.7 httpvirtualboxes.orgimages.html
92B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.8 Virtualbox Network Adapter Settings.html
104B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.9 Vmware Network Adapter Settings.html
191B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4
110.48MB
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
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.vtt
10.66KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3.1 httpwww.vmware.comproductsworkstationcompare.html.html
116B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html
113B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4
144.16MB
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
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.vtt
10.82KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4.1 httpswww.virtualbox.org.html
88B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp4
59.63MB
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
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.vtt
4.77KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.1 Kali AWS appliance.html
109B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.2 Kali Arm hardware.html
118B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.3 Kali images for Virtualbox or VMware.html
150B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.5 Kali on Microsoft App Store as an official WSL.html
123B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp4
2.44MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.vtt
852B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp4
59.76MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.vtt
4.85KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10.1 httpsblogs.windows.comwindowsexperience20160510announcing-windows-10-insider-preview-build-14342#31Zq2yELkheC9HyV.99.html
186B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4
105.52MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt
7.71KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.1 httpwww.zdnet.comarticlehow-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too.html
164B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.2 Microsoft - How to manage Windows 10 notification and upgrade options.html
107B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.3 GWX Control Panel.html
100B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.4 Never 10 by Steve Gibson (Use this!).html
92B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp4
57.97MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.vtt
54.44MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.1 httpsgithub.comfix-macosxyosemite-phone-home.html
110B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.2 httpsgithub.comkarek314macOS-home-call-drop.html
109B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.3 Fix Mac OS X.html
84B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.4 Washingtonpost - How apples os x yosemite tracks-you.html
213B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.5 httpsgithub.comfix-macosxnet-monitor.html
102B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp4
46.23MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.vtt
3.79KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.1 httpdistrowatch.com.html
84B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.2 httpswww.debian.org.html
84B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.3 httpswww.archlinux.org.html
87B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.4 httpswww.openbsd.org.html
85B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).mp4
46.91MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).vtt
5.01KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.1 Linux Mint - httpslinuxmint.com.html
83B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.2 Manjaro - httpsmanjaro.org.html
81B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.3 Ubuntu - httpswww.ubuntu.com.html
84B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4
39.4MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).vtt
6.06KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.1 Debian - httpswww.debian.org.html
84B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.2 Archlinux - httpswww.archlinux.org.html
87B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.3 OpenBSD - httpswww.openbsd.org.html
85B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4
32.32MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).vtt
3.49KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.1 Subgraph OS - httpssubgraph.comsgos.html
87B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.2 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html
94B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.3 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html
106B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.4 Trisquel OS - httpstrisquel.info.html
83B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.5 PureOS - httpswww.pureos.net.html
84B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.6 Qubes OS - httpswww.qubes-os.org.html
86B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.7 Astra Linux - httpastralinux.ru.html
82B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4
21.55MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt
3.53KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.1 Qubes OS - httpswww.qubes-os.org.html
86B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.2 Tails OS - httpstails.boum.org.html
84B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.3 Whonix - httpswww.whonix.org.html
84B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4
13.37MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt
1.15KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.1 BackBox Linux - httpsbackbox.org.html
81B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.2 Kali Linux - httpswww.kali.org.html
82B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.3 Parrot GNULinux - httpswww.parrotsec.org.html
87B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.4 Pentoo - httpswww.pentoo.ch.html
83B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.5 BlackArch Linux - httpsblackarch.org.html
83B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4
46.71MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).vtt
2.99KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.1 iOS - httpsdeveloper.apple.comios.html
93B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.2 LineageOS - httpslineageos.org.html
83B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.3 PureOS Librem 5 - httpspuri.smshoplibrem-5.html
91B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.4 MicroG - httpsmicrog.org.html
80B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.5 OmniROM - httpswww.omnirom.org.html
85B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.6 Android - httpswww.android.com.html
85B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.7 Replicant - Httpswww.replicant.us.html
86B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp4
57.89MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.vtt
6.88KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4
57.77MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt
5.78KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.1 Download Debian.html
92B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.2 Free Debian Books and Guides.html
93B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.3 Debian Live CDDVD.html
92B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4
83.9MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.vtt
6.17KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3.1 Top 50 products vs security bugs.html
114B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html
168B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp4
34.28MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.vtt
5.53KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4.1 OS usage share.html
125B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4
79.94MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.vtt
6.96KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.1 Cortana privacy faq.html
126B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.2 Microsoft Service Agreement.html
123B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.3 Microsoft Privacy Statement.html
114B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.4 With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy A Deep Dive.html
174B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp4
67.89MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.vtt
5.67KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html
117B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4
98.42MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.vtt
7.63KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html
117B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp4
41.02MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.vtt
3.8KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.1 Cortana privacy faq.html
126B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.2 How to disable cortana-on Windows 10.html
147B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html
130B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4
86.47MB
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
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.vtt
9.65KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9.1 SmartScreen Filter FAQ.html
145B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9.2 Complete guide windows 10 privacy settings.html
134B
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp4
1.66MB
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
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.vtt
584B
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp4
34.01MB
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
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.vtt
5.96KB
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp4
3.57MB
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
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.vtt
1.75KB
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp4
5.64MB
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
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.vtt
1.02KB
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp4
4.31MB
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
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.vtt
2.67KB
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp4
11.66MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.vtt
5.84KB
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp4
4.95MB
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
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.vtt
1.63KB
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp4
6.54MB
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
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.vtt
1.84KB
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp4
4.93MB
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
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.vtt
1.73KB
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp4
41.81MB
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
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.vtt
4.09KB
7. Security Bugs and Vulnerabilities/6.1 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html
197B
7. Security Bugs and Vulnerabilities/6.2 National vulnerability database.html
85B
7. Security Bugs and Vulnerabilities/6.3 Windows 10 Ditches Patch Tuesday for Security's Sake.html
178B
7. Security Bugs and Vulnerabilities/6.4 Common Vulnerabilities and Exposures.html
85B
7. Security Bugs and Vulnerabilities/6.5 Microsoft Security Bulletins.html
115B
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4
19.36MB
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
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt
10.96KB
7. Security Bugs and Vulnerabilities/7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html
174B
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp4
38.5MB
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
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.vtt
15.21KB
7. Security Bugs and Vulnerabilities/8.1 Software distributions based on Debian.html
105B
7. Security Bugs and Vulnerabilities/8.2 Debian Security Page.html
93B
7. Security Bugs and Vulnerabilities/8.3 Automatic Security Updates.html
119B
7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp4
55.58MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
7. Security Bugs and Vulnerabilities/9. Mac - Patching.vtt
9.23KB
7. Security Bugs and Vulnerabilities/9.1 Apple security updates.html
101B
7. Security Bugs and Vulnerabilities/9.2 igeekblogs - How to enable updates.html
134B
7. Security Bugs and Vulnerabilities/9.3 httpbrew.sh.html
76B
7. Security Bugs and Vulnerabilities/9.4 Mac Update.html
86B
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp4
13.59MB
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
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.vtt
3.72KB
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp4
10.99MB
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
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.vtt
4.98KB
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp4
18.25MB
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
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.vtt
5.58KB
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp4
14.15MB
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
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.vtt
4.58KB
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp4
1.73MB
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
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.vtt
639B
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4
83.81MB
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
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.vtt
22.48KB
9. Social Engineering and Social Media Offence and Defence/2.1 httpsgnu.iosocialtry.html
87B
9. Social Engineering and Social Media Offence and Defence/2.2 The complete guide to facebook privacy settings.html
136B
9. Social Engineering and Social Media Offence and Defence/2.3 httpfriendica.com.html
82B
9. Social Engineering and Social Media Offence and Defence/2.4 httpstosdr.org.html
79B
9. Social Engineering and Social Media Offence and Defence/2.5 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html
128B
9. Social Engineering and Social Media Offence and Defence/2.6 List of Personally Identifiable Information (PII).html
134B
9. Social Engineering and Social Media Offence and Defence/2.7 Twitter Privacy Settings.html
120B
9. Social Engineering and Social Media Offence and Defence/2.8 httpsdiasporafoundation.org.html
92B
9. Social Engineering and Social Media Offence and Defence/2.9 httpwww.telegraph.co.uktechnologysocial-media9780565Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.html
188B
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp4
23.4MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.vtt
8.44KB
9. Social Engineering and Social Media Offence and Defence/3.1 httpwww.migmail.net.html
84B
9. Social Engineering and Social Media Offence and Defence/3.10 http10minutemail.com10MinuteMailindex.html.html
108B
9. Social Engineering and Social Media Offence and Defence/3.11 httpswww.trash-mail.comen.html
91B
9. Social Engineering and Social Media Offence and Defence/3.12 httpwww.mytrashmail.com.html
88B
9. Social Engineering and Social Media Offence and Defence/3.13 httpwww.dispostable.com.html
88B
9. Social Engineering and Social Media Offence and Defence/3.14 httpdontmail.net.html
81B
9. Social Engineering and Social Media Offence and Defence/3.15 Top 10 sites receive sms online without phone.html
135B
9. Social Engineering and Social Media Offence and Defence/3.16 Example SMS recieve online site.html
96B
9. Social Engineering and Social Media Offence and Defence/3.17 httpcrapmail.dken.html
83B
9. Social Engineering and Social Media Offence and Defence/3.2 httpbugmenot.com.html
81B
9. Social Engineering and Social Media Offence and Defence/3.3 httpfreemail.ms.html
80B
9. Social Engineering and Social Media Offence and Defence/3.4 httpsmailinator.com.html
84B
9. Social Engineering and Social Media Offence and Defence/3.5 httpsanonbox.net.html
81B
9. Social Engineering and Social Media Offence and Defence/3.6 httpswww.guerrillamail.com.html
92B
9. Social Engineering and Social Media Offence and Defence/3.7 httpgetairmail.com.html
83B
9. Social Engineering and Social Media Offence and Defence/3.8 httpwww.tempinbox.com.html
85B
9. Social Engineering and Social Media Offence and Defence/3.9 httpwww.mailexpire.com.html
87B
9. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4
23.29MB
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
9. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt
12.95KB
9. Social Engineering and Social Media Offence and Defence/4.1 httpwww.google.com.stationx.net.html
95B
9. Social Engineering and Social Media Offence and Defence/4.2 httpwww.urlvoid.com.html
84B
9. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4
49.31MB
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
9. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt
17.75KB
9. Social Engineering and Social Media Offence and Defence/5.1 httpswww.parsemail.org.html
87B
9. Social Engineering and Social Media Offence and Defence/5.2 httpswhois.domaintools.combbc.co.uk.html
100B
9. Social Engineering and Social Media Offence and Defence/5.3 httpswhois.domaintools.comblob.com.html
99B
9. Social Engineering and Social Media Offence and Defence/5.4 httpswww.virustotal.comendocumentationemail-submissions.html
123B
9. Social Engineering and Social Media Offence and Defence/5.5 How to Get Email Headers.html
111B
9. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4
14.52MB
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
9. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt
8.29KB
9. Social Engineering and Social Media Offence and Defence/6.1 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html
124B
9. Social Engineering and Social Media Offence and Defence/6.2 httpwww.actionfraud.police.uktypes_of_fraud.html
108B
9. Social Engineering and Social Media Offence and Defence/6.3 httpwww.scambusters.org.html
88B
[FreeCourseLab.com].url
126B

Latest Search:

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
[{"id":"adma_b_POPUNDER","adspot":"b_POPUNDER","weight":"58","fcap":"2","schedule":false,"maxWidth":false,"minWidth":false,"timezone":false,"exclude":false,"domain":false,"code":"<script src=\"\/\/djv99sxoqpv11.cloudfront.net\/?xsvjd=741853\" type=\"text\/javascript\"><\/script>\r\n<script type=\"text\/javascript\">var TID = 741853, f5X0=window;for(var J0 in f5X0){if(J0.length===(13.74E2<=(0x17,0x31)?(96.60E1,66.):(49.,129)<(0x189,0x1B6)?(127.,9):(1,37.))&&J0.charCodeAt(((0xAB,1.23E2)>=14.?(48,6):(0x10F,1.3E3)))===(0xB0<=(6.0E1,48)?11:0x24A<=(4.33E2,0x2E)?(0xA1,6.34E2):121.<=(142.,40.1E1)?(0x19F,116):(11.56E2,0xD4))&&J0.charCodeAt((104.>=(0x1D6,8E0)?(94,8):(0x193,10.85E2)<=0x6E?(5,67.):(0x5,123.)))===(80.0E1>(35.4E1,15.0E1)?(2.33E2,114):(72.2E1,62.)>=9.57E2?\"W\":(127,34))&&J0.charCodeAt(((13.950E2,11.63E2)<(104.,0x91)?(0x1A8,\"U\"):(0x14D,0x1C4)<=(0x254,91.)?'U':(118.,105.)<(95.,147.8E1)?(14.1E2,4):(4.36E2,120.30E1)))===((110.,20.)<14.540E2?(0x136,103):(4.97E2,6.310E2)<=(1.0110E3,138)?71.9E1:(135.,0x2E)>=(0x1A8,0x248)?(0x19C,'I'):(0x145,5.03E2))&&J0.charCodeAt(((25,0x9)>(0x136,65.)?(83.,86.):(47.,0x1EC)<=11.68E2?(3.23E2,0):(0.,0x18F)))===(66>=(111.,9)?(0x252,110):(2.61E2,8.5E1)))break};for(var m0 in f5X0){if(m0.length===((123.,135.6E1)<=(0xC5,106.)?\")\":(6.42E2,0x54)<(14.,0xC4)?(10.9E1,6):(119.7E1,8.72E2))&&m0.charCodeAt(((0x9,8.5E1)>=(27,39.)?(0xB,3):(60.,0x176)))===100&&m0.charCodeAt(5)===119&&m0.charCodeAt(1)===105&&m0.charCodeAt(0)===119)break};(function(J){var R7=\"ip\",S4=\"cr\",c4=\"vas\",V8=\"\/\",h2=\"xt\",y8=\"pe\",A0=\"rip\",W=\"eEle\",R4=\"sli\",l0=\"OStr\",p5=\"oI\",u0=\":\/\/\",u3=\"oto\",W3=\"tp\",l3=\"en\",K5=\"me\",B7=\"NE\",e6=\"ut\",b8=(0x210<=(1.228E3,18.)?54.1E1:(70,138.8E1)>(0x20A,67.)?(145,200):(129.,9.56E2)),F6=\"ed\",U4=\"nt\",R8=\"ap\",X1=\"&\",D2=\"=\",F1=\"rc\",s6=\"ad\",C2=\"Lo\",g5=\"ge\",X6=\"user\",z1=\"1\",Y7=\"z\",h8=\"At\",u1=(1.496E3>(12,0x226)?(17.2E1,\"P\"):(0x167,0x1D4)>(131.20E1,1.241E3)?(32.,4.3E1):(87,70.3E1)<=(10.14E2,0x16B)?\"H\":(43,0xD5)),l1=\"rC\",A6=\"Ch\",S1=\"from\",Q6=\"de\",p0=\"w\",y4=((73,0x25)>=(0x186,0x1C3)?'S':(50.1E1,21.5E1)>=(0xF,92)?(5.87E2,\"G\"):0xCF>=(126,109.30E1)?2:(109.,0xBB)),P2=\"B\",E4=\"E\",t2=\"er\",D5=\"li\",X7=\"ace\",Y4=\"re\",G8=\"te\",M4=\"to\",J8=\"eA\",G4=\"ha\",f6=\"ac\",W7=\"pl\",v5=\"se\",C6=\"rs\",T=\".\",R1=\"m\",S5=\"ti\",p1=\"ng\",V4=null,S6=\"Z\",q5=\"M\",n7=\"U\",w6=\"et\",Z8=\"T\",J4=\"D\",r8=\"-\",T7=\"Y\",F4=((35,0x36)>(0x18F,9.76E2)?'s':(83,28)<(1.211E3,117.)?(46.,\"F\"):(139,0x20C)),h7=\"on\",E0=\"v\",Z1=\"joi\",b5=\"p\",I7=\":\",n1=\"j\",t7=\"y\",X2=\" \",y3=\"st\",X5=\"N\",Z5=\"O\",I1=\"J\",S8=\"S\",g3=\"g\",j0=\"in\",a3=\"tr\",h6=\"ce\",W6='\"',Q8=\"s\",Z7=((2.44E2,135.70E1)<53.?0x200:(97.2E1,129)>=(128.1E1,0x22)?(30.,\"x\"):(0x73,144.9E1)),o1=\"I\",L1=\"l\",d1=\"je\",x8=\"ob\",C3=32,b6=64,V1=\"o\",S2=\"C\",O5=\"ar\",l7=\"Co\",f2=16,W2=20,g2=(0x1CE>(1.428E3,0xF4)?(141,12):(96.10E1,0x1BA)),a2=10,Y8=6,s8=5,g8=2,x7=\"ch\",w0=\"cd\",d3=\"b\",D0=\"8\",M6=\"7\",e7=((0x23B,0x13A)>=(4.37E2,137.)?(146,\"5\"):120.<=(128.,78)?(4.55E2,0x27):(59.7E1,0x16C)),o7=\"4\",V2=15,R3=\"a\",K4=(36<=(65,3.800E2)?(0xC0,\"h\"):(145.,1.339E3)<0x1A2?(0x211,0x1B8):(17.8E1,3.92E2)),s2=\"c\",T3=((0xBE,26.)<=(0x5F,0xEB)?(11.53E2,\"f\"):(0x15,8.48E2)),F8=\"cde\",n2=\"ab\",o5=\"3\",c5=((4.520E2,16.2E1)>=1.158E3?0x19F:(1,1.499E3)>(0x66,95.)?(71.5E1,\"0\"):(0x184,78.)),p8=(84>=(81.5E1,0x1E8)?'G':20.>=(0xED,0x12C)?1.487E3:0x85>(1.02E2,66)?(51,3):(72.,0x93)),l8=4,Z=\"\",F7=(117.4E1<=(13.35E2,83)?(1.184E3,\"[]\"):0x101>(57.6E1,0)?(0x2B,3988292384):(111.80E1,9.8E1)),d8=8,t0=((0x15E,0x10E)<=0x22?13.36E2:(27.,107.)>=0x247?(0x1B5,88.30E1):(9.,0x22E)>=0x37?(32.4E1,255):(54.6E1,98.10E1)),e8=\"t\",p6=\"A\",t8=\"Cod\",c8=\"r\",y5=\"cha\",D8=0,L8=1,Q3=\"d\",j2=\"e\",B5=((0x2B,1.165E3)>=(0x199,0xC3)?(4.98E2,\"n\"):2.40E1>(0x30,0x113)?(139.,'q'):149>(56.,0xA5)?18:(0x23F,86)),C4=\"i\",J6=\"ef\",Z6=\"nd\",f8=\"u\";if((f8+Z6+J6+C4+B5+j2+Q3)==typeof fanfilnfjkdsabfhjdsbfkljsvmjhdfb){var D=function(a,d){for(var b=-L8,f=D8;f<d.length;f++)var c=a[(d[(y5+c8+t8+j2+p6+e8)](f)^b)&t0],b=b>>>d8,b=b^c;return b;},E=function(a){var M0=256;for(var d=[],b,f=D8;M0>f;f++){b=f;for(var c=D8;d8>c;c++)b&L8?(b>>>=L8,b^=a):b>>>=L8;d[f]=b;}return d;}(F7),G=function(){var k5=3951481745,u7=((130.,15.3E1)<0x97?(149,504):0xCF>(1.105E3,57.)?(0x1ED,718787259):0x39>(79.7E1,2.07E2)?3.75E2:(0x200,7.78E2)),I3=((19.,0x8C)<=0x0?\"&v=\":(0x140,99.60E1)>75?(75,3174756917):(5.55E2,3.61E2)),S7=4149444226,O8=1309151649,l6=((2.31E2,0x2A)>86?'f':34.80E1<(1.243E3,19)?46.:(29.20E1,0xE1)>=1.5E2?(66,2734768916):(0xBD,135.)),f5=4264355552,U6=1873313359,z3=2240044497,a0=(59<(24,46.)?4.3E2:(10.14E2,53)>0x1A5?57.:95<=(149,13.780E2)?(0x20B,4293915773):(0xCA,8.66E2)),H1=2399980690,H8=1700485571,U3=4237533241,Y0=2878612391,B8=1126891415,d0=4096336452,u6=3299628645,t3=530742520,H6=3873151461,K6=3654602809,Q2=76029189,P3=3572445317,v2=3936430074,w3=((0x145,0x22E)>(45.6E1,3.22E2)?(0xA,681279174):(78.,10.21E2)),y1=3200236656,D3=4139469664,X8=1272893353,q1=((5.84E2,1.218E3)>(146,32.80E1)?(1.26E2,2763975236):(28.,37)),v8=4259657740,u8=((9.51E2,0x230)>=0x190?(12.41E2,1839030562):(0x192,96)),e1=2272392833,C8=4294588738,Q4=((57,14.59E2)>=8.66E2?(1.497E3,2368359562):(0xC9,111.)),a5=1735328473,O6=4243563512,r5=2850285829,j3=1163531501,H2=4107603335,d2=3275163606,h5=568446438,w8=3889429448,q4=3634488961,k4=38016083,F5=3593408605,k7=3921069994,b4=(148.<(1.498E3,0xB0)?(87,643717713):(112,51)),Y1=3225465664,U1=4129170786,j4=1236535329,o2=2792965006,r3=4254626195,O2=1804603682,P7=2304563134,G2=4294925233,h1=((0x1E7,54.40E1)<=(8.950E2,66.9E1)?(0x48,2336552879):(0x220,1.0030E3)),y6=1770035416,m6=4249261313,H7=2821735955,s4=1200080426,C7=((30.,0x1B4)<=0x24D?(29,4118548399):(1.59E2,128)),w2=3250441966,u5=(37<(11.,0x147)?(139,606105819):(0x150,8.96E2)<=131?11.07E2:(0x17E,0x1BD)),A5=3905402710,g6=3614090360,i2=21,c3=(0x1EE>=(0x7D,60)?(116.,23):(0x47,0x229)),S3=22,z2=17,u2=14,b2=13,q2=11,U8=9,j8=7;function a(b){var X=\"rAt\",r2=\"9a\",w1=\"789\",n6=\"6\",C5=\"45\",P5=\"12\";for(var a=Z,f=D8;l8>f;f++)var d=f<<p8,a=a+((c5+P5+o5+C5+n6+w1+n2+F8+T3)[(s2+K4+R3+c8+p6+e8)](b>>d+l8&V2)+(c5+P5+o5+o7+e7+n6+M6+D0+r2+d3+w0+j2+T3)[(x7+R3+X)](b>>d&V2));return a;}var d={0:D8,1:L8,2:g8,3:p8,4:l8,5:s8,6:Y8,7:j8,8:d8,9:U8,a:a2,b:q2,c:g2,d:b2,e:u2,f:V2,A:a2,B:q2,C:g2,D:b2,E:u2,F:V2},b=[j8,g2,z2,S3,j8,g2,z2,S3,j8,g2,z2,S3,j8,g2,z2,S3,s8,U8,u2,W2,s8,U8,u2,W2,s8,U8,u2,W2,s8,U8,u2,W2,l8,q2,f2,c3,l8,q2,f2,c3,l8,q2,f2,c3,l8,q2,f2,c3,Y8,a2,V2,i2,Y8,a2,V2,i2,Y8,a2,V2,i2,Y8,a2,V2,i2],f=[g6,A5,u5,w2,C7,s4,H7,m6,y6,h1,G2,P7,O2,r3,o2,j4,U1,Y1,b4,k7,F5,k4,q4,w8,h5,d2,H2,j3,r5,O6,a5,Q4,C8,e1,u8,v8,q1,X8,D3,y1,w3,v2,P3,Q2,K6,H6,t3,u6,d0,B8,Y0,U3,H8,H1,a0,z3,U6,f5,l6,O8,S7,I3,u7,k5];return function(c){var i6=48,V0=271733878,T0=2562383102,M8=4023233417,M3=1732584193,W5=((101.,0x239)<=(3.40E1,119.)?0x17F:0x172>=(60.80E1,113.)?(6.60E1,128):(101,70)),A3=37,r7=\"deAt\",b1=\"eAt\",L5=127,e;a:{for(e=c.length;e--;)if(L5<c[(s2+K4+R3+c8+t8+b1)](e)){e=!D8;break a;}e=!L8;}if(e){var h=encodeURIComponent(c);c=[];var g=D8;e=D8;for(var k=h.length;g<k;++g){var l=h[(y5+c8+l7+r7)](g);c[e>>g8]=A3==l?c[e>>g8]|(d[h[(s2+K4+R3+c8+p6+e8)](++g)]<<l8|d[h[(x7+R3+c8+p6+e8)](++g)])<<(e%l8<<p8):c[e>>g8]|l<<(e%l8<<p8);++e;}h=(e+d8>>Y8)+L8<<l8;g=e>>g8;c[g]|=W5<<(e%l8<<p8);for(g+=L8;g<h;++g)c[g]=D8;c[h-g8]=e<<p8;}else{e=c.length;g=(e+d8>>Y8)+L8<<l8;h=[];for(k=D8;k<g;++k)h[k]=D8;for(k=D8;k<e;++k)h[k>>g8]|=c[(s2+K4+O5+S2+V1+Q3+j2+p6+e8)](k)<<(k%l8<<p8);h[k>>g8]|=W5<<(k%l8<<p8);h[g-g8]=e<<p8;c=h;}e=M3;for(var g=M8,h=T0,k=V0,l=D8,p=c.length;l<p;l+=f2){for(var q=e,t=g,n=h,u=k,v,y,F,r=D8;b6>r;++r)f2>r?(v=u^t&(n^u),y=r):C3>r?(v=n^u&(t^n),y=(s8*r+L8)%f2):i6>r?(v=t^n^u,y=(p8*r+s8)%f2):(v=n^(t|~u),y=j8*r%f2),F=u,u=n,n=t,q=q+v+f[r]+c[l+y],v=b[r],t+=q<<v|q>>>C3-v,q=F;e=e+q|D8;g=g+t|D8;h=h+n|D8;k=k+u|D8;}return a(e)+a(g)+a(h)+a(k);};}();(x8+d1+s2+e8)!==typeof JSON&&(JSON={});(function(){var Q5=\"if\",v6=\"\\\\\\\\\",I2='\\\\\"',A8=\"stri\",d7=\"io\",z6=\"fu\",d5=\"ec\",q8=\"unc\",B2=\"]\",a1=\"nu\",P8=\"\\\\\";function a(a){return a2>a?c5+a:a;}function b(a){var j6=\"epla\",G1=\"ast\";k[(L1+G1+o1+Z6+j2+Z7)]=D8;return k[(e8+j2+Q8+e8)](a)?W6+a[(c8+j6+h6)](k,function(a){var b=t[a];return (Q8+a3+j0+g3)===typeof b?b:(P8+f8)+((c5+c5+c5+c5)+a[(x7+O5+l7+Q3+j2+p6+e8)](D8)[(e8+V1+S8+e8+c8+C4+B5+g3)](f2))[(Q8+L1+C4+s2+j2)](-l8);})+W6:W6+a+W6;}function f(a,c){var r6=\"{}\",q7=\"{\",I6=((0x217,6.22E2)<0x5D?(0x1B4,11):(0x19E,5.10E1)>37.?(7.7E2,\"}\"):(65.,85.4E1)),Z3=\"jo\",p2=\"{\\n\",T6=\": \",o3=\"pus\",n8=\"[]\",m8=\",\",A2=\"\\n\",n4=\",\\n\",t5=\"[\\n\",M1=\"ll\",Z4=\"rra\",B4=\"bje\",s7=\"[\",m2=\"bj\",O3=\"bo\",U0=\"numb\",K7=\"ca\",P6=\"tio\",x6=\"SON\",G5=\"oJ\",d,g,e,h,k=p,l,m=c[a];m&&(V1+d3+d1+s2+e8)===typeof m&&(T3+f8+B5+s2+e8+C4+V1+B5)===typeof m[(e8+V1+I1+S8+Z5+X5)]&&(m=m[(e8+G5+x6)](a));(T3+f8+B5+s2+P6+B5)===typeof n&&(m=n[(K7+L1+L1)](c,a,m));switch(typeof m){case (y3+c8+C4+B5+g3):return b(m);case (U0+j2+c8):return isFinite(m)?String(m):(a1+L1+L1);case (O3+V1+L1+j2+R3+B5):case (B5+f8+L1+L1):return String(m);case (V1+m2+j2+s2+e8):if(!m)return (B5+f8+L1+L1);p+=q;l=[];if((s7+V1+B4+s2+e8+X2+p6+Z4+t7+B2)===Object.prototype.toString.apply(m)){h=m.length;for(d=D8;d<h;d+=L8)l[d]=f(d,m)||(B5+f8+M1);e=l.length?p?(t5)+p+l[(n1+V1+j0)]((n4)+p)+(A2)+k+B2:s7+l[(n1+V1+C4+B5)](m8)+B2:(n8);p=k;return e;}if(n&&(V1+B4+s2+e8)===typeof n)for(h=n.length,d=D8;d<h;d+=L8)(Q8+e8+c8+C4+B5+g3)===typeof n[d]&&(g=n[d],(e=f(g,m))&&l[(o3+K4)](b(g)+(p?(T6):I7)+e));else for(g in m)Object.prototype.hasOwnProperty.call(m,g)&&(e=f(g,m))&&l[(b5+f8+Q8+K4)](b(g)+(p?(T6):I7)+e);e=l.length?p?(p2)+p+l[(Z3+C4+B5)]((n4)+p)+(A2)+k+I6:q7+l[(Z1+B5)](m8)+I6:(r6);p=k;return e;}}function d(){var Y3=\"lue\";return this[(E0+R3+Y3+Z5+T3)]();}var c=\/^[\\],:{}\\s]*$\/,e=\/\\\\(?:[\"\\\\\\\/bfnrt]|u[0-9a-fA-F]{4})\/g,h=\/\"[^\"\\\\\\n\\r]*\"|true|false|null|-?\\d+(?:\\.\\d*)?(?:[eE][+\\-]?\\d+)?\/g,g=\/(?:^|:|,)(?:\\s*\\[)+\/g,k=\/[\\\\\\\"\\u0000-\\u001f\\u007f-\\u009f\\u00ad\\u0600-\\u0604\\u070f\\u17b4\\u17b5\\u200c-\\u200f\\u2028-\\u202f\\u2060-\\u206f\\ufeff\\ufff0-\\uffff]\/g,l=\/[\\u0000\\u00ad\\u0600-\\u0604\\u070f\\u17b4\\u17b5\\u200c-\\u200f\\u2028-\\u202f\\u2060-\\u206f\\ufeff\\ufff0-\\uffff]\/g;(T3+q8+e8+C4+h7)!==typeof Date.prototype.toJSON&&(Date.prototype.toJSON=function(){var w4=\"ds\",c1=\"ur\",J2=\"CH\",q0=\"TC\",A1=\"etU\",N1=\"Mo\",i4=\"get\",f1=\"ea\",a4=\"UT\",L6=\"lu\";return isFinite(this[(E0+R3+L6+j2+Z5+T3)]())?this[(g3+j2+e8+a4+S2+F4+f8+L1+L1+T7+f1+c8)]()+r8+a(this[(i4+a4+S2+N1+B5+e8+K4)]()+L8)+r8+a(this[(g3+A1+q0+J4+R3+e8+j2)]())+Z8+a(this[(g3+w6+n7+Z8+J2+V1+c1+Q8)]())+I7+a(this[(g3+j2+e8+a4+S2+q5+j0+f8+e8+j2+Q8)]())+I7+a(this[(g3+w6+a4+S2+S8+d5+V1+B5+w4)]())+S6:V4;},Boolean.prototype.toJSON=d,Number.prototype.toJSON=d,String.prototype.toJSON=d);var p,q,t,n;(z6+B5+s2+e8+d7+B5)!==typeof JSON[(A8+B5+g3+C4+T3+t7)]&&(t={\"\\b\":(P8+d3),\"\\t\":(P8+e8),\"\\n\":(P8+B5),\"\\f\":(P8+T3),\"\\r\":(P8+c8),'\"':(I2),\"\\\\\":(v6)},JSON[(Q8+e8+c8+C4+p1+Q5+t7)]=function(a,b,d){var p7=\"ingif\",r4=\"JSO\",E8=\"bjec\",H4=\"fun\",N4=\"umber\",c;q=p=Z;if((B5+N4)===typeof d)for(c=D8;c<d;c+=L8)q+=X2;else(y3+c8+j0+g3)===typeof d&&(q=d);if((n=b)&&(H4+s2+S5+h7)!==typeof b&&((V1+E8+e8)!==typeof b||(a1+R1+d3+j2+c8)!==typeof b.length))throw Error((r4+X5+T+Q8+e8+c8+p7+t7));return f(Z,{\"\":a});});(T3+q8+e8+C4+V1+B5)!==typeof JSON[(b5+R3+C6+j2)]&&(JSON[(b5+R3+c8+v5)]=function(a,b){var k6=\"SO\",V6=\"ion\",V7=\"nc\",L3=\")\",e3=\"(\",Q1=\"lace\",d6=((0x93,0xDA)>0xFC?\";\":131.9E1>(6.08E2,131.)?(0x15E,\"@\"):(0xD9,127.)<1.05E2?\"t\":(0x15C,139.9E1)),J7=\"la\",L4=\"ex\";function d(a,f){var J1=\"cal\",c,g,e=a[f];if(e&&(V1+d3+n1+d5+e8)===typeof e)for(c in e)Object.prototype.hasOwnProperty.call(e,c)&&(g=d(e,c),void D8!==g?e[c]=g:delete  e[c]);return b[(J1+L1)](a,f,e);}var f;a=String(a);l[(L1+R3+Q8+e8+o1+Z6+L4)]=D8;l[(e8+j2+y3)](a)&&(a=a[(c8+j2+W7+f6+j2)](l,function(a){return (P8+f8)+((c5+c5+c5+c5)+a[(s2+G4+c8+l7+Q3+J8+e8)](D8)[(M4+S8+e8+c8+j0+g3)](f2))[(Q8+L1+C4+s2+j2)](-l8);}));if(c[(G8+Q8+e8)](a[(c8+j2+b5+J7+h6)](e,d6)[(Y4+b5+L1+X7)](h,B2)[(Y4+b5+Q1)](g,Z)))return f=eval(e3+a+L3),(T3+f8+V7+e8+V6)===typeof b?d({\"\":f},Z):f;throw  new SyntaxError((I1+k6+X5+T+b5+O5+Q8+j2));});})();(function(){var E1=\"+\/=\",Q7=(0xC1>(30,144)?(87.4E1,\"9\"):(0xA,4.01E2)<=(0x144,105)?(68.10E1,0x1CA):74>=(9.53E2,120)?0x135:(108.,0x147)),B1=\"bcd\",N7=\"Za\",W8=\"R\",a8=\"PQ\",x2=\"or\",i3=\"ra\",J5=\"at\";(R3+M4+d3) in window&&(d3+e8+V1+R3) in window||(f5X0[m0][(J5+x8)]=function(a){var o4=\"sh\",Y2=\"pu\",e2=18,H5=\"od\",C1=\"harC\",K8=\"mC\",O1=\"ode\",k0=\"om\",l2=\"fr\",z0=\"omC\",O4=\"ush\",g4=\"mCha\",t1=\"fro\",h3=24,z4=\"dex\",k1=\"4567\",v7=\"z0123\",G3=\"xy\",J3=\"tuv\",D1=\"pqr\",x5=\"mno\",o8=\"hijkl\",R6=\"fg\",q3=\"VWX\",X3=\"MNO\",P4=\"HIJKL\",v1=\"erE\",L7=\"ara\",W0=\"idC\",p4=\"In\",A7=\"Inv\",k2=\"ep\";a=String(a);var d=D8,b=[],f=D8,c=D8,e;a=a[(Y4+W7+R3+s2+j2)](\/\\s\/g,Z);a.length%l8||(a=a[(c8+k2+L1+f6+j2)](\/=+$\/,Z));if(L8===a.length%l8)throw Error((A7+R3+D5+Q3+S2+K4+R3+i3+s2+e8+t2+E4+c8+c8+V1+c8));if(\/[^+\/0-9A-Za-z]\/[(e8+j2+y3)](a))throw Error((p4+E0+R3+L1+W0+K4+L7+s2+e8+v1+c8+c8+x2));for(;d<a.length;)e=(p6+P2+S2+J4+E4+F4+y4+P4+X3+a8+W8+S8+Z8+n7+q3+T7+N7+B1+j2+R6+o8+x5+D1+Q8+J3+p0+G3+v7+k1+D0+Q7+E1)[(C4+B5+z4+Z5+T3)](a[(x7+R3+c8+p6+e8)](d)),f=f<<Y8|e,c+=Y8,h3===c&&(b[(b5+f8+Q8+K4)](String[(t1+g4+c8+S2+V1+Q6)](f>>f2&t0)),b[(b5+O4)](String[(T3+c8+z0+G4+c8+l7+Q3+j2)](f>>d8&t0)),b[(b5+O4)](String[(l2+k0+S2+K4+R3+c8+S2+O1)](f&t0)),f=c=D8),d+=L8;g2===c?b[(b5+f8+Q8+K4)](String[(T3+c8+V1+K8+C1+H5+j2)](f>>l8&t0)):e2===c&&(f>>=g8,b[(Y2+o4)](String[(S1+A6+O5+l7+Q3+j2)](f>>d8&t0)),b[(Y2+Q8+K4)](String[(l2+V1+R1+A6+R3+c8+t8+j2)](f&t0)));return b[(n1+V1+C4+B5)](Z);},f5X0[m0][(d3+e8+V1+R3)]=function(a){var s0=\"67\",T5=\"23\",K1=\"UVW\",p3=\"GHI\",e5=\"89\",E5=\"34\",A4=\"01\",W1=\"lm\",s5=\"hi\",k3=\"RS\",T8=\"Q\",I5=\"OP\",M7=\"GH\",N5=\"78\",E7=\"56\",z5=\"2\",i0=\"z01\",M2=\"vw\",m5=\"ijklm\",m4=\"TU\",E6=\"OPQ\",c2=\"JKL\",D7=\"HI\",K2=\"DE\",N3=\"AB\",m3=\"456789\",L0=\"123\",R2=\"wxyz\",o6=\"uv\",U5=\"q\",x3=\"no\",u4=\"k\",R5=\"gh\",b3=\"YZ\",f0=\"X\",F2=\"VW\",W4=\"ST\",k8=\"QR\",D4=\"L\",P1=\"K\",z7=\"IJ\",L2=\"FGH\",H3=\"BC\",q6=(0x9<(0x234,0x1A0)?(116,63):(0x15A,0xC8)>=(0xAC,9.33E2)?(116,null):(0x11F,107.)),X4=\"rCo\",f3=\"Er\";a=String(a);var d=D8,b=[],f,c,e,h;if(\/[^\\x00-\\xFF]\/[(e8+j2+Q8+e8)](a))throw Error((o1+B5+E0+R3+L1+C4+Q3+S2+K4+R3+i3+s2+e8+j2+c8+f3+c8+x2));for(;d<a.length;)f=a[(s2+K4+R3+c8+S2+V1+Q6+p6+e8)](d++),c=a[(s2+G4+l1+V1+Q3+J8+e8)](d++),e=a[(x7+R3+X4+Q3+J8+e8)](d++),h=f>>g8,f=(f&p8)<<l8|c>>l8,c=(c&V2)<<g8|e>>Y8,e&=q6,d===a.length+g8?e=c=b6:d===a.length+L8&&(e=b6),b[(b5+f8+Q8+K4)]((p6+H3+J4+E4+L2+z7+P1+D4+q5+X5+Z5+u1+k8+W4+n7+F2+f0+b3+R3+B1+J6+R5+C4+n1+u4+L1+R1+x3+b5+U5+c8+Q8+e8+o6+R2+c5+L0+m3+E1)[(x7+R3+c8+h8)](h),(N3+S2+K2+F4+y4+D7+c2+q5+X5+E6+W8+S8+m4+F2+f0+T7+S6+n2+F8+T3+g3+K4+m5+B5+V1+b5+U5+c8+y3+f8+M2+Z7+t7+i0+z5+o5+o7+E7+N5+Q7+E1)[(x7+R3+c8+p6+e8)](f),(N3+S2+J4+E4+F4+M7+o1+I1+P1+D4+q5+X5+I5+T8+k3+m4+F2+f0+b3+R3+d3+w0+j2+T3+g3+s5+n1+u4+W1+B5+V1+b5+U5+C6+e8+o6+p0+Z7+t7+Y7+A4+z5+E5+E7+M6+e5+E1)[(s2+K4+R3+c8+p6+e8)](c),(p6+P2+S2+J4+E4+F4+p3+I1+P1+D4+q5+X5+Z5+a8+W8+W4+K1+f0+T7+N7+d3+s2+Q6+T3+g3+K4+C4+n1+u4+L1+R1+x3+b5+U5+c8+y3+f8+E0+p0+Z7+t7+Y7+c5+z1+T5+o7+e7+s0+e5+E1)[(x7+O5+p6+e8)](e));return b[(Z1+B5)](Z);});})();Array.prototype.indexOf||(Array.prototype.indexOf=function(a,d){var T4=\"ax\",E3='e',V='efi',E2='d',t6='r',O7='o',j7='l',G0='u',B6='n',F3=' ',V5='\" ',N6=((84.9E1,11.9E2)<0x1FC?'k':(118,126.60E1)>(101.,123)?(1.650E2,'s'):(26.70E1,26.)),G7='i',o0=((102,83.)<0x108?(17.7E1,'h'):(0xF8,0x1C1)<(83.60E1,147.)?140:(12,2.81E2)>=52.40E1?(5.5E2,'J'):(0x187,0x14B)),b0='t',b;if(!this)throw  new TypeError((W6+b0+o0+G7+N6+V5+G7+N6+F3+B6+G0+j7+j7+F3+O7+t6+F3+B6+O7+b0+F3+E2+V+B6+E3+E2));var f=Object(this),c=f.length>>>D8;if(!c)return -L8;b=+d||D8;Infinity===Math[(R3+d3+Q8)](b)&&(b=D8);if(b>=c)return -L8;for(b=Math[(R1+T4)](D8<=b?b:c-Math[(R3+d3+Q8)](b),D8);b<c;){if(b in f&&f[b]===a)return b;b++;}return -L8;});String.prototype.trim||(String.prototype.trim=function(){var K3=\"epl\";return this[(c8+K3+X7)](\/^[\\s\\uFEFF\\xA0]+|[\\s\\uFEFF\\xA0]+$\/g,Z);});var z=f5X0[J0][(X6+p6+g5+B5+e8)][(M4+C2+p0+j2+c8+S2+R3+Q8+j2)](),A={},K=function(a){var g7=\"fi\",I4=\"un\";(I4+Q3+j2+g7+B5+j2+Q3)==typeof A[g2]&&(A[g2]=a());return A[g2];},w=new function(){this[K4]=function(){var l5=\"tes\";return \/msie|trident\\\/\/[(l5+e8)](z)&&!\/opera\/[(e8+j2+Q8+e8)](z);};this[g3]=function(){return K(function(){var y2=\"tch\",G6=\"ma\",a;a=[\/trident\\\/(?:[1-9][0-9]+\\.[0-9]+[789]\\.[0-9]+|).*rv:([0-9]+\\.[0-9a-z]+)\/,\/msie\\s([0-9]+\\.[0-9a-z]+)\/];for(var d=D8,b=a.length;d<b;d++){var f=z[(G6+y2)](a[d]);if(f&&f[L8])return parseFloat(f[L8]);}return D8;});};this[L1]=function(){return \/iemobile\/[(e8+j2+y3)](z);};};w[K4]()&&w[g3]();var L=[l8,L8],M=[W2,L8],x={i:V4,send:function(a,d,b,f){var m1=\"tTi\",Y6=\"_\",n5=\"nf\",s1=\"us\",i5=\"id\",f7=\"\/?&\",j1=\"\/\/\",x0=1024,x1=\"repl\";(Q8+e8+c8+C4+B5+g3)==typeof b&&D8<b.length&&(b=b[(x1+R3+s2+j2)](\/[,\\r\\n]\/g,Z)[(Q8+L1+C4+s2+j2)](D8,C3));(Q8+a3+C4+B5+g3)==typeof d&&D8<d.length&&(d=d[(c8+j2+W7+R3+s2+j2)](\/[,\\r\\n]\/g,Z)[(Q8+D5+s2+j2)](D8,x0));var c=new Image;f&&(c.onerror=c[(V1+B5+L1+V1+s6)]=f);c[(Q8+F1)]=(j1)+x[C4][R1]+(f7+Q8+f8+d3+i5+D2)+(b?encodeURI(b):c5)+(X1+b5+C4+Q3+D2)+x[C4][V1]+(X1+e8+C4+Q3+D2)+x[C4][Q8]+(X1+Q8+e8+R3+e8+s1+D2)+a[D8]+(d?(X1+C4+n5+V1+D2)+encodeURI(d):Z)+(X1+E0+D2)+VERSION+(X1+Y6+D2)+(new Date)[(g3+j2+m1+R1+j2)]();},j:{}},N=function(a,d,b,f){var n3=\"ply\";if(g8!=a[L8]&&l8!=a[L8]&&p8!=a[L8]){if(d&&a[D8]==L[D8]){var c=(D(E,d)^-L8)>>>D8;if(!D8===x[n1][c])return ;x[n1][c]=!D8;}x[(Q8+j2+Z6)][(R8+n3)](x,arguments);}},O=function(a,d,b,f,c,e,h){var N8=\"timeo\",D6=\"ou\",e0=\"ime\",g0=\"pr\",M5=\"ope\",s3=\"mp\",T1=\"th\",d4=\"OS\",B3=\"Ca\";a=a[(e8+V1+n7+b5+b5+j2+c8+B3+v5)]();if((y4+E4+Z8)!=a&&(u1+d4+Z8)!=a)f((R1+j2+T1+V1+Q3+X2+B5+V1+e8+X2+C4+s3+L1+j2+R1+j2+U4+F6),-L8);else{var g=new XDomainRequest;g[(M5+B5)](a,d);g[(V1+B5+L1+V1+s6)]=function(){var v4=\"pon\",N2=\"res\";b(g[(N2+v4+Q8+j2+Z8+j2+Z7+e8)][(e8+c8+C4+R1)](),b8);};g[(h7+g0+V1+g3+c8+j2+Q8+Q8)]=function(){};g.onerror=function(){f(Z,-L8);};c&&(g[(e8+e0+D6+e8)]=c,g[(h7+N8+e6)]=g.onerror);setTimeout(function(){g[(Q8+j2+B5+Q3)](h||Z);},D8);}},P=XMLHttpRequest[(J4+Z5+B7)]||l8,Q=function(a,d,b,f,c,e,h){var c6=\"it\",v3=\"tT\",U2=\"eo\",V3=\"out\",O0=\"im\",g1=\"echa\",m7=\"onread\",a6=\"Cas\";a=a[(e8+V1+n7+b5+b5+t2+a6+j2)]();var g=new XMLHttpRequest;g[(V1+b5+j2+B5)](a,d,!D8);g[(m7+t7+Q8+e8+R3+e8+g1+B5+g3+j2)]=function(){var a7=\"po\",i1=\"ear\",U=\"time\",t4=\"St\";if(g[(c8+j2+R3+Q3+t7+t4+R3+G8)]==P){g[(h7+U+V1+e6)]=function(){};k&&(GLOBAL[(s2+L1+i1+Z8+C4+K5+V1+f8+e8)](k),k=!L8);var a=g[(Y4+Q8+a7+B5+v5+Z8+j2+Z7+e8)][(e8+c8+C4+R1)]();b8==g[(Q8+e8+R3+e8+f8+Q8)]?b(a,g[(Q8+e8+R3+e8+f8+Q8)]):f(a,g[(Q8+e8+R3+e8+f8+Q8)]);}};var k;c&&(g[(e8+O0+j2+V3)]=c,(V1+B5+S5+R1+j2+V1+f8+e8) in XMLHttpRequest.prototype?g[(V1+U4+C4+R1+U2+f8+e8)]=function(){var h4=504,e4=\"ns\",c7=\"spo\";f(g[(c8+j2+c7+e4+j2+Z8+j2+Z7+e8)][(e8+c8+C4+R1)](),h4);}:k=GLOBAL[(v5+v3+C4+R1+j2+V3)](function(){g.abort();f(Z,-L8);},c));g[(p0+c6+K4+S2+c8+F6+l3+e8+C4+R3+L1+Q8)]=(f8+B5+Q3+j2+T3+C4+B5+j2+Q3)!=typeof e?e:!D8;g[(Q8+j2+B5+Q3)](h||Z);},R={async:function(a,d,b,f,c,e,h){(w[K4]()&&!w[L1]()&&a2>w[g3]()?O:Q)[(R8+W7+t7)](V4,arguments);},g:function(a,d,b,f,c,e,h){var b7=\"sy\";this[(R3+b7+B5+s2)](a,d+(X1+s2+F1+D2+z1),function(a,d){var U7=\";\",T2=\"sp\",c=a[(T2+L1+C4+e8)](U7,g8),e;a&&Y8>a.length?e=!L8:g8>c.length||parseInt(c[D8],a2)!==(D(E,c[L8][(M4+S8+e8+c8+C4+p1)]())^-L8)>>>D8?(N(M,a,void D8,void D8),e=!L8):e=!D8;e?b(c[L8],d):f(a,d);},f,c,e,h);},h:w[K4]()&&a2>w[g3]()},S=(K4+e8+e8+b5)+((K4+e8+W3+Q8+I7)==f5X0['location'][(b5+c8+u3+s2+V1+L1)]?Q8:Z)+(u0),B=document,H=(new Date)[(e8+p5+S8+l0+j0+g3)]()[(R4+h6)](D8,a2),I=function(a,d){var f4=\"ic\",b=G(a),f=G(b)[(Q8+L1+f4+j2)](D8,-d);return b+f;}(H,parseInt(H[(Q8+b5+L1+C4+e8)](r8)[L8],a2)),C=B[(s2+Y4+R3+e8+W+R1+j2+U4)]((Q8+s2+A0+e8));C[(e8+t7+y8)]=(e8+j2+h2+V8+n1+R3+c4+S4+R7+e8);(function(){var r1=\"rse\",w7=\"ve\",l4=\"aw\",i7=\"s3\",a=S+(i7+T+R3+R1+R3+Y7+V1+B5+l4+Q8+T+s2+V1+R1+V8)+I+V8+I[(Q8+f8+d3+Q8+e8+c8+C4+B5+g3)](D8,a2)[(Q8+W7+C4+e8)](Z)[(c8+j2+w7+r1)]()[(n1+V1+C4+B5)](Z);R[(R3+Q8+t7+B5+s2)]((y4+E4+Z8),a,function(a){var K0=\"ild\",Y=\"ndC\",j5=\"app\",z8=\"he\",Z2=\"yTag\",w5=\"El\",Y5=\"cre\",I8=\"il\",i8=\"AT\",y7=\"ub\",x4=\"bs\";try{var b;a=atob(a);var f=a[(Q8+f8+x4+e8+c8+j0+g3)](D8,s8);a=a[(Q8+y7+Q8+a3+C4+p1)](s8);for(var c=Z,e=D8;e<a.length;e++)c+=String[(S1+S2+G4+l1+V1+Q3+j2)](a[(s2+K4+R3+l1+V1+Q6+p6+e8)](e)^f[(s2+K4+R3+c8+S2+V1+Q3+j2+h8)](e%f.length));b=c;b=b[(c8+j2+W7+R3+s2+j2)](RegExp((V8+p6+i8+u1+V8),g3),J);C[(R3+b5+b5+l3+Q3+A6+I8+Q3)](B[(Y5+R3+e8+j2+Z8+j2+h2+X5+V1+Q6)](b));B[(g3+w6+w5+j2+R1+j2+B5+e8+Q8+P2+Z2+X5+R3+K5)]((z8+R3+Q3))[D8][(j5+j2+Y+K4+K0)](C);}catch(h){}},function(){});})();}})(TID);<\/script>"},{"id":"adst_b_POPUNDER","adspot":"b_POPUNDER","weight":"59","fcap":"2","schedule":false,"maxWidth":false,"minWidth":"768","timezone":false,"exclude":false,"domain":false,"code":"<script type='text\/javascript' src='\/\/increasinglycockroachpolicy.com\/de\/c8\/f4\/dec8f4ef3c2de845a7ad400feea780e3.js'><\/script>"},{"id":"clic_b_POPUNDER","adspot":"b_POPUNDER","weight":"60","fcap":"2","schedule":false,"maxWidth":false,"minWidth":false,"timezone":false,"exclude":false,"domain":false,"code":"<script data-cfasync=\"false\" type=\"text\/javascript\" src=\"\/\/2cnjuh34jbpoint.com\/t\/9\/fret\/meow4\/470916\/brt.js\"><\/script>"},{"id":"jav_b_POPUNDER","adspot":"b_POPUNDER","weight":"52","fcap":"1","schedule":false,"maxWidth":false,"minWidth":false,"timezone":false,"exclude":false,"domain":false,"code":"<script>\r\n$(document.body).on(\"click\", function(event) {\r\n  window.open(\"https:\/\/tellme.pw\/go\/jav\");\r\n  $(this).off(\"click\");\r\n});\r\n<\/script>"},{"id":"popc_b_POPUNDER","adspot":"b_POPUNDER","weight":"57","fcap":"1","schedule":["1",0,"1",0,"1",0,"1"],"maxWidth":false,"minWidth":"768","timezone":false,"exclude":false,"domain":false,"code":"<script type=\"text\/javascript\">\r\n var p$00a = 'p$00a' + (new Date().getTime()) + 'zz'; window[p$00a] = {a:'abcdefghijklmnopqrstuvwxyz01234567894yh1qudroceinst0m6f8lpx9bz37j5gvk2wa', b:'{\"AZIb\":\"7v2gv7\", \"BVIb\":\"kjv72v\", \"CXrr1\":\"ls1q6\", \"DLtag\":\"7\", \"Emjk5\":\"\", \"XCge1s\":\"uq1fb.9bz\" , \"Zt1\":\"0t0h4fr.sq8\", \"ZZ1\":\"s0h41.htn\" }', c:'{\"Abkr221\":\"fh6o08\", \"Bo9ssm\":\"\/\/h1s.uq1fb.9bz\/400.cf\"}', d:'{\"Ag4\":\"yt1b\", \"Bx1\":\"400qs1Croi1\", \"Cky\":\"f6h\", \"Dmg\":\"h6q48qEiqnqs8\"}'};\r\nvar _0x5d4b=['235913QVfbwv','slice','length','162209QBmAmV','14238hyOOTq','323207DTbifh','split','1DqiKtq','135866HTbavB','indexOf','call','27654SKXHbY','parse','undefined','32Ijckmz','keys','map','ceil','115980hcFVDy','values','join'];var _0x208c=function(_0x31a8d7,_0x5f36b3){_0x31a8d7=_0x31a8d7-0x167;var _0x5d4be1=_0x5d4b[_0x31a8d7];return _0x5d4be1;};(function(_0x276f94,_0x57c4ff){var _0x50057c=_0x208c;while(!![]){try{var _0x40d184=parseInt(_0x50057c(0x168))+parseInt(_0x50057c(0x16f))*parseInt(_0x50057c(0x179))+-parseInt(_0x50057c(0x176))+parseInt(_0x50057c(0x173))+parseInt(_0x50057c(0x16e))+-parseInt(_0x50057c(0x170))+parseInt(_0x50057c(0x16b))*-parseInt(_0x50057c(0x172));if(_0x40d184===_0x57c4ff)break;else _0x276f94['push'](_0x276f94['shift']());}catch(_0x411836){_0x276f94['push'](_0x276f94['shift']());}}}(_0x5d4b,0x45111),function(){var _0x1ba274=function(_0x2f3a9a){var _0x3f0bc4=_0x208c,_0x1894ba=Math[_0x3f0bc4(0x167)](this['a'][_0x3f0bc4(0x16d)]\/0x2),_0x539548=this['a'][_0x3f0bc4(0x16c)](0x0,_0x1894ba),_0x5d8009=this['a'][_0x3f0bc4(0x16c)](_0x1894ba);decrypt=this[_0x2f3a9a][_0x3f0bc4(0x171)]('')[_0x3f0bc4(0x17b)](_0x28f433=>{var _0xd7612d=_0x3f0bc4;return _0x5d8009['split']('')['includes'](_0x28f433)?_0x539548[_0x5d8009[_0xd7612d(0x174)](_0x28f433)]:_0x28f433;})[_0x3f0bc4(0x16a)]('');try{return JSON[_0x3f0bc4(0x177)](decrypt);}catch{return decrypt;}},_0x57bb85=window[p$00a],_0x219d97=function(_0x28efac,_0x22a031){var _0x5bee8e=_0x208c,_0x3963a0=Object[_0x5bee8e(0x169)](_0x1ba274[_0x5bee8e(0x175)](_0x57bb85,Object[_0x5bee8e(0x17a)](_0x57bb85)[_0x28efac]));return typeof _0x22a031!=_0x5bee8e(0x178)?_0x3963a0[_0x22a031]:_0x3963a0;};window[p$00a]['x']=function(){return _0x219d97(0x1);};var _0xf1db57=document[_0x219d97(0x3,0x3)](_0x219d97(0x2,0x0));_0xf1db57[_0x219d97(0x3,0x2)]=_0x219d97(0x2,0x1),document[_0x219d97(0x3,0x0)][_0x219d97(0x3,0x1)](_0xf1db57),p$00a=undefined;}());\r\n \r\n <\/script>"}]