The Hurricane Heist | 17 мая 2018 | Florence Kasumba
Stamp collecting of the digital age.
  • U: Anonymous
  • D: 2018-05-17 12:18:21
  • C: Unknown
This file is unconfirmed

IMPORTANT INFORMATION

RELEASE >

ReScene version
pyReScene Auto 0.6 File size CRC
Download
6,043
Stored files
870 B6B194CF
240 0F5216BC
RAR-files
pcsed-5f1f-xqzt.rar 50,000,000 7F889E20
pcsed-5f1f-xqzt.r00 50,000,000 651D7017
pcsed-5f1f-xqzt.r01 50,000,000 8DEC4E63
pcsed-5f1f-xqzt.r02 50,000,000 05EE6DD4
pcsed-5f1f-xqzt.r03 50,000,000 512ECE69
pcsed-5f1f-xqzt.r04 50,000,000 1534C592
pcsed-5f1f-xqzt.r05 50,000,000 B22E8238
pcsed-5f1f-xqzt.r06 29,144,466 CBD82490

Total size: 379,144,466
Archived files
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\14.Malware.mp4 [d36c5111566bd17d] 39,031,486 F4F1C225
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\15.Disaster Recovery.mp4 [3db7f3f9051d2e4f] 21,256,681 2FD700A8
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\11.Social Engineering Attacks.mp4 [23f4bc8176bd1ec3] 21,453,370 391F269B
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\13.Incident Response.mp4 [62d4accb3240effc] 17,518,770 2D284C67
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\12.BYOD - Bring Your Own Device.mp4 [53d2d2ad272d8c60] 12,047,391 B0A258E9
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\10.Backing Up Data.mp4 [95db5424849dd75d] 28,611,714 87F39F61
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\08.Data Loss Prevention.mp4 [df0444875dbc6c2a] 12,027,046 342C64A8
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\07.Data Encryption.mp4 [c81e80948842d83a] 53,347,418 0802B1C0
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\06.Data Classification.mp4 [4fc4243a3cb3b0cb] 9,788,634 88B5B27F
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\09.Application Vulnerability Assessment and Patching.mp4 [ce9a11819aab1f7c] 49,209,011 8BEC077B
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\05.Securing Wireless Networks.mp4 [7dc587a730a1a7df] 21,217,303 02E5BDF7
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\02.Security Posture.mp4 [57fc9c24945217b3] 6,461,964 67F769B7
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\03.Firewalls and IDS - Secure Your Network and Hosts.mp4 [30c34ad06ed83463] 46,950,655 F50BB8F0
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\01.The Course Overview.mp4 [1a92f71a1ee6647d] 15,102,538 5B590819
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\04.Server Hardening.mp4 [94253ad19509fc38] 25,116,686 41B6AD6C
Cyber Security - Endpoint Defense [Video]\3.Protecting Users 0 00000000
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data 0 00000000
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure 0 00000000
Cyber Security - Endpoint Defense [Video] 0 00000000

Total size: 379,140,667
RAR Recovery
Not Present
Labels UNKNOWN