/DEF CON 18/DEF CON 18 slides/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 18 Hacking Conference Presentation By - A.P. Delchi - Physical Security You Are Doing It Wrong - Slides.m4v182.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Adam Pridgen and Matt Wollenweber - Toolsmithing an IDA Bridge - Slides.m4v115.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Adrian Crenshaw - Programmable HID USB Keystroke Dongle - Slides.m4v138.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Ahn Ki-Chan and Ha Dong-Joo - Malware Migrating to Gaming Consoles - Slides.m4v155.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Andrew Kongs and Dr. Gerald Kane - Training the Next Generation of Hardware Hackers - Slides.m4v39.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - BONUS- BLACK HAT- Barnaby Jack - Jackpotting Automated Teller Machines Redux - Slides.m4v140.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Barnaby Jack - Jackpotting Automated Teller Machines Redux - Slides.m4v73.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Barrett Weisshaar and Garret Picchioni - The Night The Lights Went Out In Vegas - Slides.m4v97.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Blake Self and bitemytaco - Hacking DOCSIS For Fun and Profit - Slides.m4v140.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Blake Self with Wayne and Dolores Zage - SMART Project - Slides.m4v73.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Brad Smith - Weaponizing Lady GaGa - Slides.m4v105.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Brandon Nesbit - The Games We Play - Slides.m4v112.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Bruce Potter and Logan Lodge - This Needs to be Fixed - Slides.m4v83.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Cesar Cerrudo - Token Kidnappings Revenge - Slides.m4v174.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Chad Houck and Jason Lee - Decoding reCAPTCHA - Slides.m4v80.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Charlie Miller - Kim Jong-il and Me - Slides.m4v161.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Chema Alonso and Jose Palazon - Connection String Parameter Attacks - Slides.m4v121.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Chema Alonso and Jose Palazon - FOCA2 The FOCA Strikes Back - Slides.m4v126.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Chris Conley - Hacking Facebook Privacy - Slides.m4v87.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Chris Paget - Extreme-Range RFID Tracking - Slides.m4v85.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Chris Paget - Practical Cellphone Spying - Slides.m4v87.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Christopher Soghoian - Your ISP and the Government BFF - Slides.m4v114.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Craig Heffner - How to Hack Millions of Routers - Slides.m4v64.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Dan Kaminsky - Black Ops Of Defense Web Edition - Slides.m4v190.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Daniel Burroughs - Open Public Sensors and Trend Monitoring - Slides.m4v61.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Dark Tangent and Joe Grand - Welcome and Making the Badge - Slides.m4v130.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Dave King - Hardware Hacking for Software Guys - Slides.m4v160.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - David Bryan and Michael Anderson - Cloud Computing and a WMD - Slides.m4v95.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - David C Smith and Samuel Petreski - A New Approach to Forensic Methodology - Slides.m4v100.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - David Kennedy and Josh Kelley - Powershell omfg - Slides.m4v88.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - David Maynor and Paul Judge - Searching for Malware - Slides.m4v109.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Decius - Exploiting Internet Surveillance Systems - Slides.m4v128.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Dennis Brown - How Hackers Won the Zombie Apocalypse - Slides.m4v68.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Dennis Brown - Resilient Botnet Command and Control with Tor - Slides.m4v116.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Deviant Ollam and Toool - The Search for Perfect Handcuffs - Slides.m4v152.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Dondi West - Adequacy of the Laws Related to Cyber Warfare - Slides.m4v95.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Doug Mohney - HD Voice - The Overdue Revolution - Slides.m4v136.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Ed Schaller - Exploiting WebSphere Application Servers JSP Engine - Slides.m4v.m4v120.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Elie Bursztein and Jocelyn Lagarenne - Kartograph - Slides.m4v119.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Elie Bursztein and Panel - Bad Memories - Slides.m4v88.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Esteban Martinez Fayo - Hacking and Protecting Oracle Database Vault - Slides.m4v161.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Felix FX Lindner - Blitzableiter - Slides.m4v96.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Ferdinand Schober - Gaming in the Glass Safe - Slides.m4v124.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Francisco Amato and Federico Kirschbaum - Evilgrade and You Still Have Pending Upgrades - Slides.m4v73.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Frank Breedijk - Seccubus - Analyzing Vulnerability Assessment Data the Easy Way - Slides.m4v81.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Fyodor and David Fifield - Mastering the Nmap Scripting Engine - Slides.m4v125.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - G Mark Hardy - Tales from the Crypto - Slides.m4v147.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Garry Pejski - My Life as a Spyware Developer - Slides.m4v79.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Granick Bankston Hofmann and Opsahl - The Law of Laptop Search and Seizure - Slides.m4v166.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Greg Conti - Our Instrumented Lives - Slides.m4v95.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - HONEY - Ripping Media Off Of the Wire - Slides.m4v105.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Huang Chiu and Wu - 0box Analyzer - Slides.m4v96.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Iftach Ian Amit- Cyber Crime War Charting Dangerous Waters - Slides.m4v178.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - JP Dunning - Breaking Bluetooth by Being Bored - Slides.m4v120.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - JP Dunning - Katana Portable Multi-Boot Security Suite - Slides.m4v83.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jack Daniel and Panel - PCI and Compromising Controls and Compromising Security - Slides.m4v82.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - James Arlen - SCADA and ICS How to Avoid Cyberdouchery - Slides.m4v163.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - James Shewmaker - Browser Based Defenses - Slides.m4v98.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jason Scott - You are Stealing It Wrong 30 Years of Inter-Pirate Battles - Slides.m4v143.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jayson E Street - Deceiving the Heavens to Cross the Sea - Slides.m4v125.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jeff Bryner - Google Toolbar The NARC Within - Slides.m4v41.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jennifer Granick and Matt Zimmerman - Legal Developments in Hardware Hacking - Slides.m4v69.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jeongwook Oh - Exploit Spotting Locating Vulnerabilities Out of Vendor Patches Automatically - Slides.m4v173.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jeremy Brown - Exploiting SCADA Systems - Slides.m4v92.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jim Rennie and Eric Rachner - Search & Seizure & Golfballs - Slides.m4v129.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jimi Fiekert - The Anatomy of Drug Testing - Slides.m4v67.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Joe Damato - Function Hooking for Mac OSX and Linux - Slides.m4v74.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - John Curran - IPv6 No Longer Optional - Slides.m4v98.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - John McNabb - Cyberterrorism and the Security of the National Drinking Water Infrastructure - Slides.m4v144.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jon McCoy - Hacking Net Applications A Dynamic Attack - Slides.m4v124.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jon Oberheide - Antique Exploitation aka Terminator - Slides.m4v32.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Jonathan Lee and Neil Pahl - Bypassing Smart-Card Authentication and Blocking Debiting - Slides.m4v88.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Joseph McCray - You Spent All That Money and You Still Got Owned - Slides.m4v93.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Josh Pyorre and Chris McKenney - Build Your Own Security Ops Center - Slides.m4v126.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Joshua Marpet - Facial Recognition - Slides.m4v155.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Joshua Wise - From No Way to 0-day - Slides.m4v117.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Justin Morehouse and Tony Flick - Getting Social with the Smart Grid - Slides.m4v73.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Kenneth Geers - Live Fire Exercise Baltic Cyber Shield 2010 - Slides.m4v73.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Kevin Mahaffey and John Hering - App Attack - Slides.m4v124.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Lai Appelbaum and Oberheide - The Power of Chinese Security - Slides.m4v94.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Leigh Honeywell and follower - Physical Computing and Virtual Security - Slides.m4v120.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Lineberry Richardson and Wyatt - These Aren't the Permissions - Slides.m4v158.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Luiz Eduardo -Your Boss is a Douchebag How About You - Slides.m4v56.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Mage2 - Electronic Weaponry - Slides.m4v60.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Marcia Hofmann - How To Get Your FBI File - Slides.m4v111.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Marco Bonetti - Mobile Privacy - Slides.m4v82.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Marisa Fagan - Be a Mentor - Slides.m4v35.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Matias Madou and Jacob West - Repelling the Wily Insider - Slides.m4v133.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Matt Krick - DCFluX in Moon-Bouncer - Slides.m4v167.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Matt Ryanczak - Implementing IPv6 at ARIN - Slides.m4v81.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Max Kelly - Perspectives in Cybersecurity and Cyberwarfare - Slides.m4v103.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Md Sohail Ahmad - WPA Too - Slides.m4v141.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Michael Brooks - masSEXploitation - Slides.m4v138.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Michael Schearer - SHODAN for Penetration Testers - Slides.m4v96.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Mike Bailey - Web Services We Just Do Not Need - Slides.m4v174.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Mike Metzger - Letting the Air Out of Tire Pressure Monitoring Systems - Slides.m4v41.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Monta Elkins - Hacking with Hardware Introducing URFUKED - Slides.m4v86.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Moxie Marlinspike - Changing Threats To Privacy From TIA to Google - Slides.m4v146.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Nathan Hamiel and Marcin Wielgoszewski - Constricting the Web - Slides.m4v117.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Nguyen Anh Quynh - Operating System Fingerprinting for Virtual Machines - Slides.m4v58.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Nicholas J. Percoco and Christian Papathanasiou - This is Not the Droid You are Looking For - Slides.m4v86.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Nicholas J. Percoco and Jibran Ilyas - Malware Freak Show 2 - Slides.m4v128.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Nicole Ozer and Kevin Bankston - Big Brother on the Big Screen - Slides.m4v171.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Oren Isacson and Alfredo Ortega - Exploiting Digital Cameras - Slides.m4v93.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - ChaosVPN for Playing CTFs - Slides.m4v79.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - DNS Systemic Vulnerabilities and Risk Management - Slides.m4v173.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Defcon Security Jam III Now in 3-D - Slides.m4v275.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Meet the Feds - CSI TCP IP - Slides.m4v179.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Meet the Feds - Policy Privacy Deterrence and Cyber War - Slides.m4v142.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Of Bytes and Bullets - Slides.m4v185.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - Open Letter - Call to Action - Slides.m4v163.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel - oCTF 5 years in 50 minutes - Slides.m4v150.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Panel- Meet the EFF - Slides.m4v174.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Patrick Mullen and Ryan Pentney - Open Source Framework for Advanced IDS - Slides.m4v112.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Paul Haas - Advanced Format String Attacks - Slides.m4v71.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Peter Eckersley - How Unique Is Your Browser - Slides.m4v96.4 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Peter Eckersley and Jesse Burns - An Observatory for the SSLiverse - Slides.m4v90.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Pierce Goldy aSmig and sanitybit - WiMAX Hacking 2010 - Slides.m4v107.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Polk Malkewicz and Novak - Industrial Cyber Security - Slides.m4v169.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Rain and urbanmonkey -Build a Lie Detector - Slides.m4v116.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Rich Smith - In-memory Reverse Engineering for Obfuscated Python - Slides.m4v120.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Richard Thieme - Getting Root Remote Viewing and Non-Local Consciousness - Slides.m4v185.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Righter Kunkel - Air Traffic Control Insecurity - Slides.m4v54.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Riley Repko - Enough Cyber Talk Already - Slides.m4v132.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Rob Ragan and Francis Brown - Lord of the Bing - Slides.m4v100.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Robert Edmonds and Paul Vixie - Passive DNS Hardening - Slides.m4v142.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Ryan Linn - Multiplayer Metasploit - Slides.m4v129.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Sam Bowne - Who Cares About IPv6 - Slides.m4v78.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Samy Kamkar - How I Met Your Girlfriend - Slides.m4v106.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Schuyler Towne and datagram - Attack the Key and Own the Lock - Slides.m4v173.2 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Scott Wolchok - Crawling BitTorrent DHTs for Fun - Slides.m4v44.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Shawn Merdinger - We Dont Need No Stinkin Badges - Slides.m4v99.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Shawn Moyer and Nathan Keltner - Wardriving the Smart Grid - Slides.m4v115.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Sho Ho - FOE The Release of Feed Over Email - Slides.m4v36.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Smith Ames and Lai - Balancing the Pwn Trade Deficit - Slides.m4v137.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Stracener Barnum and Peterson - So Many Ways to Slap A Yo-Ho - Slides.m4v145.1 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Sumit Siddharth - Hacking Oracle From Web Apps - Slides.m4v171.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - The Suggmeister - Social Networking Special Ops - Slides.m4v97.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Tobias Bluzmanis and Fiddler - Locks Lies and Videotape - Slides.m4v154.3 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Tottenkoph - VirGraff101 An Intro to Virtual Graffiti - Slides.m4v77.7 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Tyler Krpata - Like a Boss Attacking JBoss - Slides.m4v43.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Wayne Huang - Drivesploit - Slides.m4v134.6 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Wayne Huang and Kuon Ding - No SQL No Injection - Slides.m4v72.9 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Weigand Renderman and Kershaw - Build your own UAV 2.0 - Slides.m4v169.0 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - Zoz - Pwned By The Owner - Slides.m4v74.8 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - frank^2 - Trolling Reverse-Engineers with Math - Slides.m4v140.5 MiB2013-Jun-01 07:00
DEF CON 18 Hacking Conference Presentation By - metr0 - Securing MMOs - Slides.m4v76.0 MiB2013-Jun-01 07:00
DEFCON 18 Hacking Conference Presentation By Barnaby Jack - Jackpotting Automated Teller Machines Redux - Slides.m4v40.6 MiB2013-Jun-01 07:00
DEFCON 18 Hacking Conference Presentation By Chris Paget - Practical Cellphone Spying - Slides.m4v93.7 MiB2013-Jun-01 07:00
DEFCON 18 Hacking Conference Presentation By David Maynor and Paul Judge - Searching For Malware - Slides.m4v150.4 MiB2013-Jun-01 07:00
DEFCON 18 Hacking Conference Presentation By Joe Grand and Dark Tangent - Welcome And Behind The Scenes Of The DEFCON Badge - Slides.m4v175.7 MiB2013-Jun-01 07:00
DEFCON 18 Hacking Conference Presentation By Md Sohail Ahmad - WPA Too! - Slides.m4v118.5 MiB2013-Jun-01 07:00