It does what it does.
  • Anonymous
  • 2025-01-25 08:46:10
  • Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 ZH File size CRC
Download
23,463
Stored files
1,422 79400A23
390 8CEB4990
RAR-files
llaesoc-ce9a-zh.rar 50,000,000 2F60FD3F
llaesoc-ce9a-zh.r00 50,000,000 63A29F69
llaesoc-ce9a-zh.r01 50,000,000 74F52135
llaesoc-ce9a-zh.r02 50,000,000 91DF9384
llaesoc-ce9a-zh.r03 50,000,000 FFFA62BC
llaesoc-ce9a-zh.r04 50,000,000 B4F092B5
llaesoc-ce9a-zh.r05 50,000,000 AF4D7B20
llaesoc-ce9a-zh.r06 50,000,000 52C97651
llaesoc-ce9a-zh.r07 50,000,000 D698D225
llaesoc-ce9a-zh.r08 50,000,000 7B96EFA0
llaesoc-ce9a-zh.r09 50,000,000 7181E80A
llaesoc-ce9a-zh.r10 50,000,000 8F7FF33D
llaesoc-ce9a-zh.r11 39,502,319 E61C77DF

Total size: 639,502,319
Archived files
AWS Enterprise Security\08 - Security Audits in AWS\03 - Rotating access keys.mp4 [c384d744d0163b41] 9,503,747 E1E14152
AWS Enterprise Security\08 - Security Audits in AWS\06 - Exploring Trusted Advisor.mp4 [e0cdd6bdc4d95368] 15,774,383 7673CABD
AWS Enterprise Security\08 - Security Audits in AWS\04 - Understanding AWS Artifact.mp4 [e9fdcdb6043d0088] 8,202,928 1B9E8898
AWS Enterprise Security\08 - Security Audits in AWS\03 - Rotating access keys.srt 6,113 E56C2B82
AWS Enterprise Security\08 - Security Audits in AWS\02 - Using AWS Security Hub.mp4 [6b919079d32ad053] 18,189,486 3426C8CF
AWS Enterprise Security\08 - Security Audits in AWS\05 - Understanding Trusted Advisor.mp4 [9905f18514432343] 8,297,135 17F3CD28
AWS Enterprise Security\08 - Security Audits in AWS\02 - Using AWS Security Hub.srt 7,995 7ECB032E
AWS Enterprise Security\08 - Security Audits in AWS\07 - Preparing for a security audit.srt 7,738 C0A4E48C
AWS Enterprise Security\08 - Security Audits in AWS\07 - Preparing for a security audit.mp4 [9bd119fef28da8a0] 7,709,870 0D35A310
AWS Enterprise Security\08 - Security Audits in AWS\01 - Understanding AWS Security Hub.mp4 [e5a1400ee4924c78] 4,637,657 B850DDA0
AWS Enterprise Security\08 - Security Audits in AWS\01 - Understanding AWS Security Hub.srt 4,155 0F3CBEBE
AWS Enterprise Security\08 - Security Audits in AWS\06 - Exploring Trusted Advisor.srt 5,835 ED37888D
AWS Enterprise Security\Exercise Files\Ex_Files_AWS_Enterprise_Security.zip 2,888 195A2D97
AWS Enterprise Security\07 - Additional Protective Tools\05 - Creating a private certificate.mp4 [aec819942605f8a7] 11,087,189 1B7A32B8
AWS Enterprise Security\07 - Additional Protective Tools\02 - Configuring web application firewall.srt 9,763 E2028B6A
AWS Enterprise Security\07 - Additional Protective Tools\01 - Understanding web application firewall.mp4 [5558f52b7b22573e] 5,063,514 634D2AE5
AWS Enterprise Security\07 - Additional Protective Tools\01 - Understanding web application firewall.srt 4,884 7E95BEE4
AWS Enterprise Security\07 - Additional Protective Tools\02 - Configuring web application firewall.mp4 [8249f98472a98c1c] 18,248,196 56F506F3
AWS Enterprise Security\07 - Additional Protective Tools\03 - Understanding AWS Shield.mp4 [86bf28d2f1cf2b8c] 8,238,765 DBD1D688
AWS Enterprise Security\07 - Additional Protective Tools\04 - Understanding Certificate Manager.mp4 [cf05916a2da9a12c] 11,558,575 9AF22E24
AWS Enterprise Security\07 - Additional Protective Tools\04 - Understanding Certificate Manager.srt 8,090 A91C6B91
AWS Enterprise Security\07 - Additional Protective Tools\03 - Understanding AWS Shield.srt 4,997 51FAC04E
AWS Enterprise Security\02 - AWS Security Foundations\06 - Enabling CloudTrail.mp4 [6b010ad44334af2d] 11,460,377 3C241718
AWS Enterprise Security\02 - AWS Security Foundations\02 - Understanding the AWS security landscape.srt 2,676 89E04CED
AWS Enterprise Security\02 - AWS Security Foundations\03 - Understanding separation of duties.mp4 [86a0c0129e903943] 5,758,127 A5F06959
AWS Enterprise Security\02 - AWS Security Foundations\02 - Understanding the AWS security landscape.mp4 [a1d916e7032f5174] 2,688,344 BCCDF619
AWS Enterprise Security\02 - AWS Security Foundations\01 - Understanding shared responsibility.mp4 [60e29cdf3e5780dd] 10,813,954 8D0DF10D
AWS Enterprise Security\02 - AWS Security Foundations\07 - Understanding AWS Organizations.srt 3,198 C6D03E59
AWS Enterprise Security\02 - AWS Security Foundations\03 - Understanding separation of duties.srt 5,467 88A51DF3
AWS Enterprise Security\02 - AWS Security Foundations\08 - The AWS Command Line Interface (CLI) for Mac.srt 5,996 F3CD70FD
AWS Enterprise Security\02 - AWS Security Foundations\07 - Understanding AWS Organizations.mp4 [405c77eb5c739c58] 3,371,012 7D56FD2C
AWS Enterprise Security\02 - AWS Security Foundations\08 - The AWS Command Line Interface (CLI) for Mac.mp4 [bed0c24000710fc0] 13,462,530 C2C84E6A
AWS Enterprise Security\02 - AWS Security Foundations\04 - Implementing separation of duties.srt 8,423 564C4CA8
AWS Enterprise Security\02 - AWS Security Foundations\04 - Implementing separation of duties.mp4 [eee496e0d1b6de4e] 14,807,212 98C2BB4F
AWS Enterprise Security\02 - AWS Security Foundations\05 - Understanding CloudTrail.mp4 [c3acae654eb82ca] 5,452,119 24A9A7A0
AWS Enterprise Security\02 - AWS Security Foundations\09 - The AWS Command Line Interface (CLI) for Windows.mp4 [bebd429068a9d39f] 8,863,578 F0FF4ED9
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\08 - Challenge IAM.srt 1,200 CC0C18F7
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\08 - Challenge IAM.mp4 [4649fbd60000e62e] 1,708,969 BA3A7F04
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\02 - Understanding IAM policies.mp4 [6cee1027b74a114a] 6,937,401 A3A2C5E1
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\13 - Granting temporary access.srt 9,478 5EBE8278
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\06 - Configuring web console access.mp4 [28f92bc797436321] 6,099,725 EDD6067C
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\17 - Use case Securing financial access.mp4 [17b9afea7ad4a1ad] 5,244,972 F2328C58
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\04 - Understanding IAM groups.mp4 [39c2930a2dca17f7] 2,888,023 6854F177
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\01 - Understanding IAM.mp4 [2e9353bf2948b641] 9,515,862 793D90D4
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\16 - Exploring federated access in AWS.mp4 [b0d2e6906dcd7d4e] 16,851,628 8BD17573
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\05 - Configuring IAM groups.mp4 [822d0e05604f47f1] 5,623,811 06F558C9
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\09 - Solution IAM.srt 4,686 A5989C2D
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\07 - Configuring IAM users Web console.mp4 [8e91d7241ef011ff] 11,769,462 858D13B5
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\17 - Use case Securing financial access.srt 4,663 89C707B6
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\11 - Configuring IAM roles.srt 4,702 8762731E
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\15 - Exploring IAM policy simulator.srt 6,638 E70D212F
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\18 - Understanding Resource Access Manager.mp4 [de8ae191aee50bd6] 13,513,392 7FDFA96D
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\10 - Understanding IAM roles.mp4 [ae7cfc5f2033ecbf] 2,918,576 DFE73D06
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\14 - Illustrating access restrictions.mp4 [9a6a2f89bc127a01] 2,901,506 1E888A0E
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\13 - Granting temporary access.mp4 [302a60c21570c4bf] 16,222,212 410F8364
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\11 - Configuring IAM roles.mp4 [ae93d43c38b45d5f] 8,544,086 DA73AF78
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\15 - Exploring IAM policy simulator.mp4 [f680ea3ae5d0220] 10,599,089 E92EFB17
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\03 - Configuring IAM policies.mp4 [8a8dafd13a52ea7f] 16,784,558 6B1ABB04
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\14 - Illustrating access restrictions.srt 2,494 A2A9DA97
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\09 - Solution IAM.mp4 [30373e94cd6024c9] 8,797,557 0914BE5B
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS\12 - Understanding Security Token Service.mp4 [26043569d14852ed] 3,403,948 1F4F0341
AWS Enterprise Security\06 - Internal Detective Controls\08 - Understanding Amazon Detective.mp4 [fa7141ae6589672f] 2,656,558 42B6F860
AWS Enterprise Security\06 - Internal Detective Controls\01 - Understanding AWS Config.srt 7,247 44EF733C
AWS Enterprise Security\06 - Internal Detective Controls\03 - Exploring AWS Config results.mp4 [3afaadd52ddffd96] 12,040,194 AD870D08
AWS Enterprise Security\06 - Internal Detective Controls\02 - Enabling AWS Config.mp4 [c1b6fdf6e22d117a] 10,002,946 E2F4464A
AWS Enterprise Security\06 - Internal Detective Controls\10 - Understanding Amazon Inspector.srt 4,458 EBB5725C
AWS Enterprise Security\06 - Internal Detective Controls\06 - Understanding AWS Macie.mp4 [e4c6fa4c6441018c] 13,214,554 9A10301A
AWS Enterprise Security\06 - Internal Detective Controls\10 - Understanding Amazon Inspector.mp4 [f0b583e8c09b7491] 5,027,585 F93F07E3
AWS Enterprise Security\06 - Internal Detective Controls\04 - Understanding AWS GuardDuty.mp4 [78fb43f4d723dd0d] 9,617,924 1F69BC83
AWS Enterprise Security\06 - Internal Detective Controls\11 - Exploring Amazon Inspector.mp4 [8956748b73b1b544] 13,533,526 107FAABF
AWS Enterprise Security\06 - Internal Detective Controls\02 - Enabling AWS Config.srt 5,351 281E272D
AWS Enterprise Security\06 - Internal Detective Controls\01 - Understanding AWS Config.mp4 [58923d0cbc89657c] 7,788,548 AF00F124
AWS Enterprise Security\06 - Internal Detective Controls\11 - Exploring Amazon Inspector.srt 6,448 5EC8AD3A
AWS Enterprise Security\06 - Internal Detective Controls\05 - Exploring AWS GuardDuty.mp4 [4019108e8937adcf] 13,507,415 A2145965
AWS Enterprise Security\06 - Internal Detective Controls\07 - Understanding IAM Access Analyzer.mp4 [3e2802d638db8d00] 8,150,358 4A855C02
AWS Enterprise Security\06 - Internal Detective Controls\09 - Exploring Amazon Detective.mp4 [1a2bd02c438f6403] 14,346,584 98C52E6F
AWS Enterprise Security\05 - Key Management\04 - Using KMS and an IAM role.srt 5,553 C7DD7686
AWS Enterprise Security\05 - Key Management\01 - Understanding Key Management Service.srt 4,422 E2772F80
AWS Enterprise Security\05 - Key Management\05 - Automating KMS key rotation.srt 4,781 9BEE3B4A
AWS Enterprise Security\05 - Key Management\02 - Creating a KMS key.mp4 [13612485fcedb06e] 13,397,507 8F626630
AWS Enterprise Security\05 - Key Management\05 - Automating KMS key rotation.mp4 [ca780e0ab09e9663] 5,846,531 93C11CFC
AWS Enterprise Security\05 - Key Management\07 - Understanding Secrets Manager.mp4 [57ffc4d92241f223] 3,269,636 BB481554
AWS Enterprise Security\05 - Key Management\06 - Deleting a KMS key.srt 5,002 994357F4
AWS Enterprise Security\05 - Key Management\08 - Using Secrets Manager.srt 6,347 674A2B2A
AWS Enterprise Security\05 - Key Management\04 - Using KMS and an IAM role.mp4 [3b745f10d596b868] 8,973,828 7C4FC133
AWS Enterprise Security\05 - Key Management\09 - Enabling auto-rotation with Secrets Manager.mp4 [1efd09923b847d5d] 11,538,263 8BBEC13F
AWS Enterprise Security\05 - Key Management\01 - Understanding Key Management Service.mp4 [c691206cf27b84fb] 5,223,937 2F88DFF5
AWS Enterprise Security\05 - Key Management\08 - Using Secrets Manager.mp4 [c0a83164dfbe7c76] 11,403,096 F8CBC6A7
AWS Enterprise Security\05 - Key Management\10 - Understanding AWS CloudHSM.mp4 [8458dfe83e2a2572] 4,214,363 60B5AD50
AWS Enterprise Security\05 - Key Management\06 - Deleting a KMS key.mp4 [312758bb8993618a] 7,075,329 93F40107
AWS Enterprise Security\05 - Key Management\03 - Using a KMS in S3.mp4 [eba730527ef9049b] 13,162,500 12D538F5
AWS Enterprise Security\04 - S3 Access Management\09 - Exploring presigned URLs.mp4 [bfa788f0b0a6d3e5] 11,961,808 A101D308
AWS Enterprise Security\04 - S3 Access Management\03 - Managing S3 with IAM.mp4 [a6bda498685c47b8] 3,956,228 C3B72C9C
AWS Enterprise Security\04 - S3 Access Management\02 - Accessing S3 privately.mp4 [639f625557f4ebf9] 8,219,267 7ABE9BDA
AWS Enterprise Security\04 - S3 Access Management\06 - S3 bucket policies.srt 6,033 22BCB557
AWS Enterprise Security\04 - S3 Access Management\04 - Restricting S3 access with IAM.mp4 [8c2c4453dc68acd7] 13,405,823 2C00C69F
AWS Enterprise Security\04 - S3 Access Management\08 - Understanding S3 access control lists.mp4 [e1aaa10f7a6dd6a] 10,949,977 41EDFAA1
AWS Enterprise Security\04 - S3 Access Management\03 - Managing S3 with IAM.srt 3,689 A65F1EF0
AWS Enterprise Security\04 - S3 Access Management\06 - S3 bucket policies.mp4 [ef4823e10fce4e64] 9,950,142 46F28F92
AWS Enterprise Security\04 - S3 Access Management\07 - Illustrating S3 bucket policies with CLI.srt 3,542 C0037EBA
AWS Enterprise Security\04 - S3 Access Management\07 - Illustrating S3 bucket policies with CLI.mp4 [f523f670995768bd] 4,577,526 23A27829
AWS Enterprise Security\04 - S3 Access Management\05 - Illustrating EC2 S3 access with IAM.srt 6,410 0296F784
AWS Enterprise Security\04 - S3 Access Management\01 - Managing S3 access.mp4 [757fa91ef52e8708] 3,721,560 CF537C23
AWS Enterprise Security\04 - S3 Access Management\05 - Illustrating EC2 S3 access with IAM.mp4 [72a45d1bbade606c] 10,518,704 B4C0D1B6
AWS Enterprise Security\09 - Conclusion\01 - Next steps.srt 3,295 926CFA93
AWS Enterprise Security\09 - Conclusion\01 - Next steps.mp4 [73536a4958f6c1bb] 3,963,564 2D89AAB6
AWS Enterprise Security\01 - Introduction\02 - What you should know.mp4 [83e0024cd1ee494a] 1,848,662 EF21FBCD
AWS Enterprise Security\01 - Introduction\01 - AWS security overview.mp4 [86c252b566aee31] 8,712,963 EA47817C
AWS Enterprise Security\08 - Security Audits in AWS 0 00000000
AWS Enterprise Security\Exercise Files 0 00000000
AWS Enterprise Security\07 - Additional Protective Tools 0 00000000
AWS Enterprise Security\02 - AWS Security Foundations 0 00000000
AWS Enterprise Security\03 - Identity and Access Management (IAM) Concepts in AWS 0 00000000
AWS Enterprise Security\06 - Internal Detective Controls 0 00000000
AWS Enterprise Security\05 - Key Management 0 00000000
AWS Enterprise Security\04 - S3 Access Management 0 00000000
AWS Enterprise Security\09 - Conclusion 0 00000000
AWS Enterprise Security\01 - Introduction 0 00000000
AWS Enterprise Security 0 00000000

Total size: 639,485,538
RAR Recovery
Not Present
Labels UNKNOWN