Slow and steady wins the race.
  • U: Anonymous
  • D: 2019-09-06 22:16:41
  • C: Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 SHEPHERDS File size CRC
Download
8,857
Stored files
269 3C181932
222 537B0E0A
RAR-files
linkedin.learning.threat.modeling.tampering.depth-shepherds.rar 50,000,000 CB317B74
linkedin.learning.threat.modeling.tampering.depth-shepherds.r00 50,000,000 A1BAE809
linkedin.learning.threat.modeling.tampering.depth-shepherds.r01 1,984,358 5B9D5092

Total size: 101,984,358
Archived files
Threat Modeling_ Tampering in Depth\03 Tampering with Storage\002 Permissions.mp4 [d7d01005be2a3ea3] 9,638,743 1F6C073E
Threat Modeling_ Tampering in Depth\03 Tampering with Storage\003 Effects of tampering-en.srt 1,084 6E15439E
Threat Modeling_ Tampering in Depth\03 Tampering with Storage\002 Permissions-en.srt 4,245 4A5A94E5
Threat Modeling_ Tampering in Depth\03 Tampering with Storage\003 Effects of tampering.mp4 [28367b84635ff7bb] 2,423,979 4E0C9ACD
Threat Modeling_ Tampering in Depth\03 Tampering with Storage\001 Tampering with local storage.mp4 [5178275993996191] 2,492,930 2042E90A
Threat Modeling_ Tampering in Depth\03 Tampering with Storage\001 Tampering with local storage-en.srt 1,252 6446ADCA
Threat Modeling_ Tampering in Depth\08 Integrity Defenses\003 Something more privileged.mp4 [aa1617d930d063fa] 3,562,803 423597E6
Threat Modeling_ Tampering in Depth\08 Integrity Defenses\002 Crypto.mp4 [4d7a8bba70e3da14] 8,162,819 0F34EC92
Threat Modeling_ Tampering in Depth\08 Integrity Defenses\001 Prevention and detection goals.mp4 [fe599124f0b62df1] 9,597,071 39072AD4
Threat Modeling_ Tampering in Depth\08 Integrity Defenses\003 Something more privileged-en.srt 1,656 E64EBDC7
Threat Modeling_ Tampering in Depth\08 Integrity Defenses\001 Prevention and detection goals-en.srt 4,286 A0C48C81
Threat Modeling_ Tampering in Depth\08 Integrity Defenses\002 Crypto-en.srt 4,763 C2FF0613
Threat Modeling_ Tampering in Depth\01 Introduction\002 Four-question framework.mp4 [6eb7c4ce4be68553] 3,812,184 AF9D3ABF
Threat Modeling_ Tampering in Depth\01 Introduction\001 Mitigate tampering threats.mp4 [e748d133f6e95ce8] 2,753,790 A05F54A4
Threat Modeling_ Tampering in Depth\01 Introduction\002 Four-question framework-en.srt 1,622 BD14101E
Threat Modeling_ Tampering in Depth\01 Introduction\003 Tampering as part of STRIDE.mp4 [43408eceffba8fe4] 5,881,858 8280CF35
Threat Modeling_ Tampering in Depth\01 Introduction\003 Tampering as part of STRIDE-en.srt 2,917 E3749CC9
Threat Modeling_ Tampering in Depth\01 Introduction\001 Mitigate tampering threats-en.srt 1,292 E17F7A1F
Threat Modeling_ Tampering in Depth\06 Tampering with Cloud\001 Controls and authentication-en.srt 2,098 07415684
Threat Modeling_ Tampering in Depth\06 Tampering with Cloud\001 Controls and authentication.mp4 [539c4b97a859fe5d] 3,291,757 8630455B
Threat Modeling_ Tampering in Depth\06 Tampering with Cloud\002 Becoming Jane Admin-en.srt 2,583 ED558BB3
Threat Modeling_ Tampering in Depth\06 Tampering with Cloud\002 Becoming Jane Admin.mp4 [39009ea7e1df3856] 5,983,577 B0864539
Threat Modeling_ Tampering in Depth\02 Tampering with a Process\001 Debuggers and input.mp4 [acc746c5b7031743] 2,651,781 ABADCCC9
Threat Modeling_ Tampering in Depth\02 Tampering with a Process\001 Debuggers and input-en.srt 2,379 0B4F3F6F
Threat Modeling_ Tampering in Depth\02 Tampering with a Process\002 Libraries.mp4 [41c57026d887311a] 3,938,260 265714B3
Threat Modeling_ Tampering in Depth\02 Tampering with a Process\002 Libraries-en.srt 2,981 FF9C1A56
Threat Modeling_ Tampering in Depth\02 Tampering with a Process\003 Mobile.mp4 [4ed13c11843011f] 4,895,366 6519BDAA
Threat Modeling_ Tampering in Depth\02 Tampering with a Process\003 Mobile-en.srt 2,919 D2FFFE10
Threat Modeling_ Tampering in Depth\Threat Modeling_ Tampering in Depth-description.txt 905 1254139D
Threat Modeling_ Tampering in Depth\07 Tampering with Data Flows\001 Channels and messages-en.srt 4,613 2569C414
Threat Modeling_ Tampering in Depth\07 Tampering with Data Flows\001 Channels and messages.mp4 [dddc72ce9877ddba] 7,055,191 2D5C396C
Threat Modeling_ Tampering in Depth\07 Tampering with Data Flows\003 Headers_ Injection and order.mp4 [e7175583f0632d31] 4,125,667 F2A6BBFF
Threat Modeling_ Tampering in Depth\07 Tampering with Data Flows\002 Replay and reflection-en.srt 1,986 E66745F4
Threat Modeling_ Tampering in Depth\07 Tampering with Data Flows\002 Replay and reflection.mp4 [637712cbcafc5521] 3,578,484 3CFD14FE
Threat Modeling_ Tampering in Depth\07 Tampering with Data Flows\003 Headers_ Injection and order-en.srt 2,839 169C9BEC
Threat Modeling_ Tampering in Depth\05 Tampering with Time Itself\001 Time is increasingly important-en.srt 2,585 742E6E22
Threat Modeling_ Tampering in Depth\05 Tampering with Time Itself\001 Time is increasingly important.mp4 [552ae1b7f8183622] 5,414,683 427F379B
Threat Modeling_ Tampering in Depth\09 Conclusion\001 Next steps-en.srt 1,611 61FBDF72
Threat Modeling_ Tampering in Depth\09 Conclusion\001 Next steps.mp4 [259537f7e8653269] 3,260,151 4792C74A
Threat Modeling_ Tampering in Depth\04 Tampering with Things\001 Whose screw_ Physical tampering matters.mp4 [a1b0d95096293f4e] 5,154,648 FAAB285D
Threat Modeling_ Tampering in Depth\04 Tampering with Things\002 Debug interfaces are exposed.mp4 [4c0c59ffa563fc1f] 4,246,952 BF017C96
Threat Modeling_ Tampering in Depth\04 Tampering with Things\002 Debug interfaces are exposed-en.srt 2,254 2FE7F2C9
Threat Modeling_ Tampering in Depth\04 Tampering with Things\001 Whose screw_ Physical tampering matters-en.srt 1,969 55E4DAC5
Threat Modeling_ Tampering in Depth\03 Tampering with Storage 0 00000000
Threat Modeling_ Tampering in Depth\08 Integrity Defenses 0 00000000
Threat Modeling_ Tampering in Depth\01 Introduction 0 00000000
Threat Modeling_ Tampering in Depth\06 Tampering with Cloud 0 00000000
Threat Modeling_ Tampering in Depth\02 Tampering with a Process 0 00000000
Threat Modeling_ Tampering in Depth\07 Tampering with Data Flows 0 00000000
Threat Modeling_ Tampering in Depth\05 Tampering with Time Itself 0 00000000
Threat Modeling_ Tampering in Depth\09 Conclusion 0 00000000
Threat Modeling_ Tampering in Depth\04 Tampering with Things 0 00000000
Threat Modeling_ Tampering in Depth 0 00000000

Total size: 101,977,533
RAR Recovery
Not Present
Labels UNKNOWN