/DEF CON 18/DEF CON 18 audio/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 18 Hacking Conference Presentation By - A.P. Delchi - Physical Security You Are Doing It Wrong - Audio.m4b19.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Adam Pridgen and Matt Wollenweber - Toolsmithing an IDA Bridge - Audio.m4b8.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Adrian Crenshaw - Programmable HID USB Keystroke Dongle - Audio.m4b12.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Ahn Ki-Chan and Ha Dong-Joo - Malware Migrating to Gaming Consoles - Audio.m4b9.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Andrew Kongs and Dr. Gerald Kane - Training the Next Generation of Hardware Hackers - Audio.m4b3.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Barnaby Jack - Jackpotting Automated Teller Machines Redux - Audio.m4b8.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Barrett Weisshaar and Garret Picchioni - The Night The Lights Went Out In Vegas - Audio.m4b10.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Blake Self and bitemytaco - Hacking DOCSIS For Fun and Profit - Audio.m4b10.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Blake Self with Wayne and Dolores Zage - SMART Project - Audio.m4b4.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Brad Smith - Weaponizing Lady GaGa - Audio.m4b9.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Brandon Nesbit - The Games We Play - Audio.m4b9.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Bruce Potter and Logan Lodge - This Needs to be Fixed - Audio.m4b8.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Cesar Cerrudo - Token Kidnappings Revenge - Audio.m4b12.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Chad Houck and Jason Lee - Decoding reCAPTCHA - Audio.m4b7.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Charlie Miller - Kim Jong-il and Me - Audio.m4b10.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Chema Alonso and Jose Palazon - Connection String Parameter Attacks - Audio.m4b8.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Chema Alonso and Jose Palazon - FOCA2 The FOCA Strikes Back - Audio.m4b8.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Chris Conley - Hacking Facebook Privacy - Audio.m4b6.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Chris Paget - Extreme-Range RFID Tracking - Audio.m4b10.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Chris Paget - Practical Cellphone Spying - Audio.m4b11.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Christopher Soghoian - Your ISP and the Government BFF - Audio.m4b9.4 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Craig Heffner - How to Hack Millions of Routers - Audio.m4b7.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Dan Kaminsky - Black Ops Of Defense Web Edition - Audio.m4b12.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Daniel Burroughs - Open Public Sensors and Trend Monitoring - Audio.m4b5.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Dark Tangent and Joe Grand - Welcome and Making the Badge - Audio.m4b15.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Dave King - Hardware Hacking for Software Guys - Audio.m4b10.4 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - David Bryan and Michael Anderson - Cloud Computing and a WMD - Audio.m4b6.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - David C Smith and Samuel Petreski - A New Approach to Forensic Methodology - Audio.m4b10.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - David Kennedy and Josh Kelley - Powershell omfg - Audio.m4b8.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - David Maynor and Paul Judge - Searching for Malware - Audio.m4b9.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Decius - Exploiting Internet Surveillance Systems - Audio.m4b9.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Dennis Brown - How Hackers Won the Zombie Apocalypse - Audio.m4b7.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Dennis Brown - Resilient Botnet Command and Control with Tor - Audio.m4b9.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Deviant Ollam and Toool - The Search for Perfect Handcuffs - Audio.m4b10.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Dondi West - Adequacy of the Laws Related to Cyber Warfare - Audio.m4b7.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Doug Mohney - HD Voice - The Overdue Revolution - Audio.m4b10.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Ed Schaller - Exploiting WebSphere Application Servers JSP Engine - Audio.m4b7.4 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Elie Bursztein and Jocelyn Lagarenne - Kartograph - Audio.m4b9.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Elie Bursztein and Panel - Bad Memories - Audio.m4b9.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Esteban Martinez Fayo - Hacking and Protecting Oracle Database Vault - Audio.m4b12.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Felix FX Lindner - Blitzableiter - Audio.m4b11.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Ferdinand Schober - Gaming in the Glass Safe - Audio.m4b11.4 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Francisco Amato and Federico Kirschbaum - Evilgrade and You Still Have Pending Upgrades - Audio.m4b4.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Frank Breedijk - Seccubus - Analyzing Vulnerability Assessment Data the Easy Way - Audio.m4b6.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Fyodor and David Fifield - Mastering the Nmap Scripting Engine - Audio.m4b9.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - G Mark Hardy - Tales from the Crypto - Audio.m4b10.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Garry Pejski - My Life as a Spyware Developer - Audio.m4b8.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Granick Bankston Hofmann and Opsahl - The Law of Laptop Search and Seizure - Audio.m4b10.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Greg Conti - Our Instrumented Lives - Audio.m4b8.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - HONEY - Ripping Media Off Of the Wire - Audio.m4b15.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Huang Chiu and Wu - 0box Analyzer - Audio.m4b7.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Iftach Ian Amit- Cyber Crime War Charting Dangerous Waters - Audio.m4b11.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Itzhak Avraham Exploitation on ARM - Audio.m4b7.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - JP Dunning - Breaking Bluetooth by Being Bored - Audio.m4b8.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - JP Dunning - Katana Portable Multi-Boot Security Suite - Audio.m4b8.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jack Daniel and Panel - PCI and Compromising Controls and Compromising Security - Audio.m4b12.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - James Arlen - SCADA and ICS How to Avoid Cyberdouchery - Audio.m4b10.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - James Shewmaker - Browser Based Defenses - Audio.m4b11.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jason Scott - You are Stealing It Wrong 30 Years of Inter-Pirate Battles - Audio.m4b12.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jayson E Street - Deceiving the Heavens to Cross the Sea - Audio.m4b10.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jeff Bryner - Google Toolbar The NARC Within - Audio.m4b2.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jennifer Granick and Matt Zimmerman - Legal Developments in Hardware Hacking - Audio.m4b10.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jeongwook Oh - Exploit Spotting Locating Vulnerabilities Out of Vendor Patches Automatically - Audio.m4b11.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jeremy Brown - Exploiting SCADA Systems - Audio.m4b6.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jim Rennie and Eric Rachner - Search & Seizure & Golfballs - Audio.m4b10.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jimi Fiekert - The Anatomy of Drug Testing - Audio.m4b11.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Joe Damato - Function Hooking for Mac OSX and Linux - Audio.m4b7.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - John Curran - IPv6 No Longer Optional - Audio.m4b10.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - John McNabb - Cyberterrorism and the Security of the National Drinking Water Infrastructure - Audio.m4b10.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jon McCoy - Hacking Net Applications A Dynamic Attack - Audio.m4b15.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jon Oberheide - Antique Exploitation aka Terminator - Audio.m4b3.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Jonathan Lee and Neil Pahl - Bypassing Smart-Card Authentication and Blocking Debiting - Audio.m4b6.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Joseph McCray - You Spent All That Money and You Still Got Owned - Audio.m4b7.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Josh Pyorre and Chris McKenney - Build Your Own Security Ops Center - Audio.m4b9.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Joshua Marpet - Facial Recognition - Audio.m4b10.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Joshua Wise - From No Way to 0-day - Audio.m4b11.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Justin Morehouse and Tony Flick - Getting Social with the Smart Grid - Audio.m4b15.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Kenneth Geers - Live Fire Exercise Baltic Cyber Shield 2010 - Audio.m4b9.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Kevin Mahaffey and John Hering - App Attack - Audio.m4b8.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Lai Appelbaum and Oberheide - The Power of Chinese Security - Audio.m4b9.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Leigh Honeywell and follower - Physical Computing and Virtual Security - Audio.m4b9.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Lineberry Richardson and Wyatt - These Aren't the Permissions - Audio.m4b11.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Luiz Eduardo -Your Boss is a Douchebag How About You - Audio.m4b5.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Mage2 - Electronic Weaponry - Audio.m4b4.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Marcia Hofmann - How To Get Your FBI File - Audio.m4b9.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Marco Bonetti - Mobile Privacy - Audio.m4b5.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Marisa Fagan - Be a Mentor - Audio.m4b4.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Matias Madou and Jacob West - Repelling the Wily Insider - Audio.m4b11.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Matt Krick - DCFluX in Moon-Bouncer - Audio.m4b10.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Matt Ryanczak - Implementing IPv6 at ARIN - Audio.m4b10.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Max Kelly - Perspectives in Cybersecurity and Cyberwarfare - Audio.m4b8.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Md Sohail Ahmad - WPA Too - Audio.m4b9.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Michael Brooks - masSEXploitation - Audio.m4b14.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Michael Schearer - SHODAN for Penetration Testers - Audio.m4b9.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Mike Bailey - Web Services We Just Do Not Need - Audio.m4b11.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Mike Metzger - Letting the Air Out of Tire Pressure Monitoring Systems - Audio.m4b4.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Monta Elkins - Hacking with Hardware Introducing URFUKED - Audio.m4b7.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Moxie Marlinspike - Changing Threats To Privacy From TIA to Google - Audio.m4b9.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Nathan Hamiel and Marcin Wielgoszewski - Constricting the Web - Audio.m4b17.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Nguyen Anh Quynh - Operating System Fingerprinting for Virtual Machines - Audio.m4b3.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Nicholas J. Percoco and Christian Papathanasiou - This is Not the Droid You are Looking For - Audio.m4b8.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Nicholas J. Percoco and Jibran Ilyas - Malware Freak Show 2 - Audio.m4b9.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Nicole Ozer and Kevin Bankston - Big Brother on the Big Screen - Audio.m4b19.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Oren Isacson and Alfredo Ortega - Exploiting Digital Cameras - Audio.m4b6.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - ChaosVPN for Playing CTFs - Audio.m4b15.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - DNS Systemic Vulnerabilities and Risk Management - Audio.m4b11.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Defcon Security Jam III Now in 3-D - Audio.m4b22.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Meet the Feds - CSI TCP IP - Audio.m4b11.4 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Meet the Feds - Policy Privacy Deterrence and Cyber War - Audio.m4b9.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Of Bytes and Bullets - Audio.m4b11.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Open Letter - Call to Action - Audio.m4b10.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - oCTF 5 years in 50 minutes - Audio.m4b10.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Panel- Meet the EFF - Audio.m4b11.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Patrick Mullen and Ryan Pentney - Open Source Framework for Advanced IDS - Audio.m4b10.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Patrick Thomas - Web Application Fingerprinting with Static Files - Audio.m4b4.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Paul Haas - Advanced Format String Attacks - Audio.m4b6.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Peter Eckersley - How Unique Is Your Browser - Audio.m4b7.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Peter Eckersley and Jesse Burns - An Observatory for the SSLiverse - Audio.m4b11.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Pierce Goldy aSmig and sanitybit - WiMAX Hacking 2010 - Audio.m4b9.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Polk Malkewicz and Novak - Industrial Cyber Security - Audio.m4b10.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Rain and urbanmonkey -Build a Lie Detector - Audio.m4b8.4 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Rich Smith - In-memory Reverse Engineering for Obfuscated Python - Audio.m4b9.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Richard Thieme - Getting Root Remote Viewing and Non-Local Consciousness - Audio.m4b19.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Righter Kunkel - Air Traffic Control Insecurity - Audio.m4b4.7 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Riley Repko - Enough Cyber Talk Already - Audio.m4b9.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Rob Ragan and Francis Brown - Lord of the Bing - Audio.m4b10.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Robert Edmonds and Paul Vixie - Passive DNS Hardening - Audio.m4b11.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Ryan Linn - Multiplayer Metasploit - Audio.m4b9.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Sam Bowne - Who Cares About IPv6 - Audio.m4b5.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Samy Kamkar - How I Met Your Girlfriend - Audio.m4b14.2 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Schuyler Towne and datagram - Attack the Key and Own the Lock - Audio.m4b18.4 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Scott Wolchok - Crawling BitTorrent DHTs for Fun - Audio.m4b4.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Shawn Merdinger - We Dont Need No Stinkin Badges - Audio.m4b8.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Shawn Moyer and Nathan Keltner - Wardriving the Smart Grid - Audio.m4b11.1 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Sho Ho - FOE The Release of Feed Over Email - Audio.m4b3.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Smith Ames and Lai - Balancing the Pwn Trade Deficit - Audio.m4b9.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Stracener Barnum and Peterson - So Many Ways to Slap A Yo-Ho - Audio.m4b15.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Sumit Siddharth - Hacking Oracle From Web Apps - Audio.m4b11.5 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - The Suggmeister - Social Networking Special Ops - Audio.m4b11.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Tobias Bluzmanis and Fiddler - Locks Lies and Videotape - Audio.m4b9.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Tottenkoph - VirGraff101 An Intro to Virtual Graffiti - Audio.m4b8.6 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Tyler Krpata - Like a Boss Attacking JBoss - Audio.m4b4.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Wayne Huang - Drivesploit - Audio.m4b10.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Wayne Huang and Kuon Ding - No SQL No Injection - Audio.m4b7.0 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Weigand Renderman and Kershaw - Build your own UAV 2.0 - Audio.m4b10.9 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - Zoz - Pwned By The Owner - Audio.m4b4.8 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - frank^2 - Trolling Reverse-Engineers with Math - Audio.m4b12.3 MiB2013-May-30 07:00
DEF CON 18 Hacking Conference Presentation By - metr0 - Securing MMOs - Audio.m4b10.2 MiB2013-May-30 07:00