Wednesday, 22 February 2012, 8:00pm - 9:30pm

Geraint Williams, Infosec Trainer and Consultant, IT Governance.

Is your computer system under attack? Would you know if hackers hijacked your system and took control of your resources? This presentation will show how the attacker takes control of the system, cover their tracks from the users of the system by creating a ‘backdoor’ and hiding it using a ‘rootkit’. You can see exactly what these and other terms such as ‘exploit’, ‘trojan’, and ‘rootkit’ actually mean when applied to a real system. The speaker will cover some basic precautions that will help you protect your computer from being attacked.

Location

Steria Limited, Hemel Hempstead
Three Cherry Trees Lane, Hemel Hempstead, HP2 7AH

Cost

Free for members and non-members

Last updated 12th November, 2023 at 11:43am