Hi, F5 DevCentral team. I have a copyright question. Since the information in this video is covered by the Creative Commons License 3.0, is this video, by nature, available to re-use in educational material my company distributes? I've been trying to find good video content covering OWASP Top 10 (instead of making it in-house) and came across your videos. I would like to know if we can redistribute your UA-cam series as part of our product?
You can use the OWASP videos in your training…we only ask that you give proper attribution to F5/DevCentral so that the viewers will know who made these videos.
@@devcentral should've gone with writing backwards man, i'm kinda disappointed now. nonetheless, awesome videos, needed some of those to refresh some security knowledge!
Thanks for the comment! Here's the full OWASP Top 10 playlist ua-cam.com/video/uu7o6hEswVQ/v-deo.html&ab_channel=F5DevCentral and specifically Injection: ua-cam.com/video/GSuZPwsil0g/v-deo.html
SQL is a different thing yet if you would use a SQL injection to try to log in to a app and end up being succefull it would enter the category of broken access control.
The only thing in my head hearing that is HOW T.F. do you write ? I mean is there somewhere and somehow a mirror that let you write like this ? Or do you simple practice to write like that :P?
Basically you limit logged in users to access only the records they own.For example you can login to a system and try to change the Id so that you access another user's data. In this case the system should limit the logged in user to only have access to their own data
one of the best explanations so far. Thanks, Man.
Best explanation so far ,thank you
Is it possible to get F5's permission for us to convert the videos to MP4 for training our Devs?
that's fine as long as you keep attribution to F5
@@JasonRahm Absolutely! Your videos are fabulous, and we'll put you in the credits and keep attribution to F5
Hi, F5 DevCentral team. I have a copyright question. Since the information in this video is covered by the Creative Commons License 3.0, is this video, by nature, available to re-use in educational material my company distributes? I've been trying to find good video content covering OWASP Top 10 (instead of making it in-house) and came across your videos. I would like to know if we can redistribute your UA-cam series as part of our product?
You can use the OWASP videos in your training…we only ask that you give proper attribution to F5/DevCentral so that the viewers will know who made these videos.
Absolutely, we will give attribution and link to the original video to follow the Creative Commons license - thank you!
Very good❤
explained well - thx!
Thanks for the comment! Glad you enjoyed the video!
This is a really important question: is this guy really good at writing backwards, or did you get a special mirrored shirt made just for these videos?
Thanks for the comment! This is how we produce these: ua-cam.com/video/U7E_L4wCPTc/v-deo.html
@@devcentral So you do have special shirts. Nice! Thanks for the reply.
@@devcentral should've gone with writing backwards man, i'm kinda disappointed now. nonetheless, awesome videos, needed some of those to refresh some security knowledge!
Nice explaination brother.
Thanks for watching and we appreciate the comment!
how is it different from SQL injection? *new to cyber security*
Thanks for the comment! Here's the full OWASP Top 10 playlist ua-cam.com/video/uu7o6hEswVQ/v-deo.html&ab_channel=F5DevCentral
and specifically Injection: ua-cam.com/video/GSuZPwsil0g/v-deo.html
SQL is a different thing yet if you would use a SQL injection to try to log in to a app and end up being succefull it would enter the category of broken access control.
Thanks sir!
Most welcome!
The only thing in my head hearing that is HOW T.F. do you write ? I mean is there somewhere and somehow a mirror that let you write like this ? Or do you simple practice to write like that :P?
Thanks for the comment! Here's how we produce these: ua-cam.com/video/U7E_L4wCPTc/v-deo.html
Broken Volume Control
Can you illustrate a bit about Record Ownership? What does it mean?
Basically you limit logged in users to access only the records they own.For example you can login to a system and try to change the Id so that you access another user's data. In this case the system should limit the logged in user to only have access to their own data
bekar video kuch smj nhi aaya