Completed
Laptop Tracking
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Predator to Prey - Tracking Criminals with Trojans and Data Mining for Fun and Profit
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 The Cards Exchange Principle
- 3 Boogie Data
- 4 Ethical Implications
- 5 USB Hacks
- 6 Theft Recovery
- 7 Windows USB Client
- 8 iPod Recovery
- 9 Apple Script
- 10 USB Malware
- 11 Crazy Walls
- 12 Laptop Tracking
- 13 Flickr API
- 14 Recovering an iMac
- 15 Tracking laptops
- 16 Victor
- 17 Mobile Security
- 18 Surveillance Photos
- 19 Exif Data
- 20 Data Mining
- 21 Stolen Camera Case
- 22 Camera Case