Monthly Archives: July 2014

Give Me Your Data!

July 7th, 2014 | ๐Ÿ•’

iSpeech We hear news stories every day about malicious hackers compromising the sensitive data of corporations, governments and individuals. But


Android Exploitation

July 7th, 2014 | ๐Ÿ•’

Convert Text to Speech The lab will be based on Android exploitation, and the lab will address such topics as


Smart TV Insecurity

July 7th, 2014 | ๐Ÿ•’

Text to Speech Demo At the beginning TV were just supposed to be TV. They were used to make people's


ARM Exploitation

July 7th, 2014 | ๐Ÿ•’

french tts The ARM exploitation workshop takes a deep dive into the security concepts of ARM Linux starting right from


Principles of Computer Security: Lecture 2

July 4th, 2014 | ๐Ÿ•’

https://www.ispeech.org Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation. by Szymon Machajewski. Step by