Wednesday, 22 February 2012, 8:00pm - 9:30pm
Geraint Williams, Infosec Trainer and Consultant, IT Governance.
Is your computer system under attack? Would you know if hackers hijacked your system and took control of your resources? This presentation will show how the attacker takes control of the system, cover their tracks from the users of the system by creating a ‘backdoor’ and hiding it using a ‘rootkit’. You can see exactly what these and other terms such as ‘exploit’, ‘trojan’, and ‘rootkit’ actually mean when applied to a real system. The speaker will cover some basic precautions that will help you protect your computer from being attacked.
Steria Limited, Hemel Hempstead
Three Cherry Trees Lane, Hemel Hempstead, HP2 7AH
Free for members and non-membersLast updated 18th September, 2020 at 1:41pm