Follow me down the rabbit hole into the wonderful world of IT security.
Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io
Related Videos:
• What is a Security Vulnerability?
• Understand Security Risk vs. Security...
Tweets:
/ 1720734431659376995
/ 1720799912181284864
/ 1721493232310214910
Understanding the Risks of Stolen Credentials: https://static.googleusercontent.com/...
Chapters:
00:00 - Intro
00:40 - Security Terminology
01:38 - Direct Database Access
03:40 - Introducing a Security Boundary
05:36 - Typical Web Security Vulnerabilities
07:03 - Clear-text Passwords in Database
09:28 - Security Weakness vs. Vulnerability
11:05 - Effective Mitigations
13:03 - Useless Mitigations
16:37 - Summary: Vulnerability vs. Weakness
19:00 - Outro
=[ ❤️ Support ]=
→ per Video: / liveoverflow
→ per Month: / @liveoverflow
2nd Channel: / liveunderflow
=[ 🐕 Social ]=
→ Twitter: / liveoverflow
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: / liveoverflow_
→ Instagram: / liveoverflow
→ Blog: https://liveoverflow.com/
→ Subreddit: / liveoverflow
→ Facebook: / liveoverflow