Predator to Prey - Tracking Criminals with Trojans and Data Mining for Fun and Profit

Predator to Prey - Tracking Criminals with Trojans and Data Mining for Fun and Profit

via YouTube Direct link

Crazy Walls

11 of 22

11 of 22

Crazy Walls

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Predator to Prey - Tracking Criminals with Trojans and Data Mining for Fun and Profit

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 The Cards Exchange Principle
  3. 3 Boogie Data
  4. 4 Ethical Implications
  5. 5 USB Hacks
  6. 6 Theft Recovery
  7. 7 Windows USB Client
  8. 8 iPod Recovery
  9. 9 Apple Script
  10. 10 USB Malware
  11. 11 Crazy Walls
  12. 12 Laptop Tracking
  13. 13 Flickr API
  14. 14 Recovering an iMac
  15. 15 Tracking laptops
  16. 16 Victor
  17. 17 Mobile Security
  18. 18 Surveillance Photos
  19. 19 Exif Data
  20. 20 Data Mining
  21. 21 Stolen Camera Case
  22. 22 Camera Case

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.