Media Summary: An oldie but a goodie, Dr Mike Pound revisits the Poisoning the DNS cache is a sure way to serve malware to unsuspecting users. Dr Mike Pound explains some of the ways this ... Denial of service usually relies on a flood of data. Slow Loris takes a more elegant approach, and almost bores a server to death.

Logjam Attack Computerphile - Detailed Analysis & Overview

An oldie but a goodie, Dr Mike Pound revisits the Poisoning the DNS cache is a sure way to serve malware to unsuspecting users. Dr Mike Pound explains some of the ways this ... Denial of service usually relies on a flood of data. Slow Loris takes a more elegant approach, and almost bores a server to death. Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr ... Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow Just how bad is it if your site is vulnerable to an SQL Injection? Dr Mike Pound shows us how they work. Cookie Stealing: ...

How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ... How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science ... It's absolutely everywhere, but what is TLS and where did it come from? Dr Mike Pound explains the background behind this ... Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains ... Websites can still be hacked using SQL injection - Tom explains how sites written in PHP (and other languages too) can be ... How do huge websites keep track of the traffic numbers? Buck Shlegeris outlines the probabilistic counting algorithm 'Hyperloglog ...

Lenovo sold thousands of computers all carrying the Superfish software. Tom Scott explains what a security nightmare this ... The "most critical vulnerability of the last decade?" - Dr Bagley and Dr Pound explain why it's so pervasive, and even affected ...

Photo Gallery

LogJam Attack - Computerphile
The Attack That Could Disrupt The Whole Internet - Computerphile
DNS Cache Poisoning - Computerphile
Slow Loris Attack - Computerphile
Power LED Attack - Computerphile
Running a Buffer Overflow Attack - Computerphile
Running an SQL Injection Attack - Computerphile
Secret Key Exchange (Diffie-Hellman) - Computerphile
Defining Harm for Ai Systems - Computerphile
Transport Layer Security (TLS) - Computerphile
Generative AI's Greatest Flaw - Computerphile
logjam tls vulnerablity
View Detailed Profile
LogJam Attack - Computerphile

LogJam Attack - Computerphile

An oldie but a goodie, Dr Mike Pound revisits the

The Attack That Could Disrupt The Whole Internet - Computerphile

The Attack That Could Disrupt The Whole Internet - Computerphile

Audible free book: http://www.audible.com/

DNS Cache Poisoning - Computerphile

DNS Cache Poisoning - Computerphile

Poisoning the DNS cache is a sure way to serve malware to unsuspecting users. Dr Mike Pound explains some of the ways this ...

Slow Loris Attack - Computerphile

Slow Loris Attack - Computerphile

Denial of service usually relies on a flood of data. Slow Loris takes a more elegant approach, and almost bores a server to death.

Power LED Attack - Computerphile

Power LED Attack - Computerphile

Extracting a secret key by simply watching the flickering of an LED? Sounds implausible but that's what we're discussing with Dr ...

Running a Buffer Overflow Attack - Computerphile

Running a Buffer Overflow Attack - Computerphile

Making yourself the all-powerful "Root" super-user on a computer using a buffer overflow

Running an SQL Injection Attack - Computerphile

Running an SQL Injection Attack - Computerphile

Just how bad is it if your site is vulnerable to an SQL Injection? Dr Mike Pound shows us how they work. Cookie Stealing: ...

Secret Key Exchange (Diffie-Hellman) - Computerphile

Secret Key Exchange (Diffie-Hellman) - Computerphile

How do we exchange a secret key in the clear? Spoiler: We don't - Dr Mike Pound shows us exactly what happens. Mathematics ...

Defining Harm for Ai Systems - Computerphile

Defining Harm for Ai Systems - Computerphile

How do we measure harm to improve the performance of Ai in the real world? Dr Hana Chockler is a Reader in Computer Science ...

Transport Layer Security (TLS) - Computerphile

Transport Layer Security (TLS) - Computerphile

It's absolutely everywhere, but what is TLS and where did it come from? Dr Mike Pound explains the background behind this ...

Generative AI's Greatest Flaw - Computerphile

Generative AI's Greatest Flaw - Computerphile

Described as GenAIs greatest flaw, indirect prompt injection is a big problem, Mike Pound from University of Nottingham explains ...

logjam tls vulnerablity

logjam tls vulnerablity

What is

Hacking Websites with SQL Injection - Computerphile

Hacking Websites with SQL Injection - Computerphile

Websites can still be hacked using SQL injection - Tom explains how sites written in PHP (and other languages too) can be ...

HyperLogLog Hit Counter - Computerphile

HyperLogLog Hit Counter - Computerphile

How do huge websites keep track of the traffic numbers? Buck Shlegeris outlines the probabilistic counting algorithm 'Hyperloglog ...

Man in the Middle Attacks & Superfish - Computerphile

Man in the Middle Attacks & Superfish - Computerphile

Lenovo sold thousands of computers all carrying the Superfish software. Tom Scott explains what a security nightmare this ...

Log4J & JNDI Exploit: Why So Bad? - Computerphile

Log4J & JNDI Exploit: Why So Bad? - Computerphile

The "most critical vulnerability of the last decade?" - Dr Bagley and Dr Pound explain why it's so pervasive, and even affected ...

Cracking Websites with Cross Site Scripting - Computerphile

Cracking Websites with Cross Site Scripting - Computerphile

Audible free book: http://www.audible.com/