/DEF CON 19/DEF CON 19 audio/

File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
DEF CON 19 Hacking Conference Presentation By - Abstrct - When Space Elephants Attack A DEFCON Challenge for Database Geeks - Audio.m4b59.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Adam Baldwin - Pillaging DVCS Repos For Fun And Profit - Audio.m4b26.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Adrian Crenshaw - Cipherspaces Darknets An Overview Of Attack Strategies - Audio.m4b85.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Alexander Kornbrust - Hacking and Securing DB2 LUW Databases - Audio.m4b50.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Alva Skip Duckwall - A Bridge Too Far Defeating Wired 8021x with a Transparent Bridge Using Linux - Audio.m4b137.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Andrew Wilson and Michael Brooks - Traps of Gold - Audio.m4b66.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Artem Dinaburg - Bit-squatting DNS Hijacking Without Exploitation - Audio.m4b73.6 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Aseem Jakhar - Jugaad Linux Thread Injection Kit - Audio.m4b35.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Barisani Laurie Franken and Bianco - Chip and PIN is Definitely Broken - Audio.m4b83.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Ben Feinstein and Jeff Jarmoc - Get Off of My Cloud Cloud Credential Compromise and Exposure - Audio.m4b83.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Brad Woodberg - Network Application Firewalls Exploits and Defense - Audio.m4b66.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Brian Kennish - Tracking the Trackers How Our Browsing History Is Leaking into the Cloud - Audio.m4b27.1 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Bruce Sutherland - How To Get Your Message Out When Your Government Turns Off The Internet - Audio.m4b63.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Carey Rude and Vandevanter - Metasploit vSploit Modules - Audio.m4b70.3 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Charlie Miller - Battery Firmware Hacking - Audio.m4b64.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Bosses Love Excel Hackers Too - Audio.m4b63.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Chema Alonso and Juan Garrido - Dust Your Feed RSS Belongs To You! Avoid Censorship! - Audio.m4b52.1 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Christopher Cleary - Operational Use of Offensive Cyber - Audio.m4b71.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Dan Kaminsky - Black Ops of TCPIP 2011 - Audio.m4b86.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Dan Rosenberg - Owned Over Amateur Radio Remote Kernel Exploitation in 2011 - Audio.m4b75.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Daniel Crowley - Speaking with Cryptographic Oracles - Audio.m4b82.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Daniel Garcia - UPnP Mapping - Audio.m4b45.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Dave Kennedy - Hacking Your Victims Over Power Lines - Audio.m4b48.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - David Bryan and Luiz Eduardo - Building The DEF CON Network Making A Sandbox For 10000 Hackers - Audio.m4b82.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - David Litchfield - Hacking and Forensicating an Oracle Database Server - Audio.m4b65.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Deral Heiland - From Printer To Pwnd Leveraging Multifunction Printers During Penetration Testing - Audio.m4b65.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Deviant Ollam - Safe to Armed in Seconds A Study of Epic Fails of Popular Gun Safes - Audio.m4b64.6 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Emmanuel Bouillon - Federation and Empire - Audio.m4b83.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Eric Fulton - Cellular Privacy A Forensic Analysis of Android Network Traffic - Audio.m4b67.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Eston Abraham and Johnson - Dont Drop the SOAP Real World Web Service Testing for Web Hackers - Audio.m4b86.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Foofus - Handicapping the US Supreme Court Can We Get Rich by Forceful Browsing - Audio.m4b36.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Ganesh Devarajan and Don LeBert - VDLDS All Your Voice Are Belong To Us - Audio.m4b68.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - George Chamales - Lives On The Line Securing Crisis Maps In Libya Sudan And Pakistan - Audio.m4b81.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Grayson Lenik - Im Your MACbDaddy - Audio.m4b62.3 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Greg Conti - The Art and Science of Security Research - Audio.m4b62.1 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Gregory Pickett - Port Scanning Without Sending Packets - Audio.m4b74.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Gus Fritschie and Mike Wright - Getting F On the River - Audio.m4b84.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Hackajar - Economics of Password Cracking in the GPU Era - Audio.m4b75.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Itzik Kotler and Iftach Ian Amit - Sounds Like Botnet - Audio.m4b72.6 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - James Myrcurial Arlen - Security When Nano Seconds Count - Audio.m4b74.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jamie Butler - Physical Memory Forensics for Cache - Audio.m4b83.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jason Ostrom - VoIP Hopping the Hotel Attacking the Crown Jewels through VoIP - Audio.m4b79.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jason Scott - Archive Team A Distributed Preservation of Service Attack - Audio.m4b57.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jayson E Street - Steal Everything Kill Everyone Cause Total Financial Ruin - Audio.m4b69.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jeff Bryner - Kinectasploit Metasploit Meets Kinect - Audio.m4b18.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jimmy Shah - Mobile App Moolah Profit taking with Mobile Malware - Audio.m4b72.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Joey Maresca - Were Here To Help A Look At How FIPS 140 Helps And Hurts Security - Audio.m4b70.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Joey Zhu - Phishing and Online Scam in China - Audio.m4b28.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - John McNabb - Vulnerabilities of Wireless Water Meter Networks - Audio.m4b72.3 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jon McCoy - Hacking Net Applications The Black Arts - Audio.m4b77.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Jos Weyers - Key Impressioning - Audio.m4b55.3 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit - Audio.m4b85.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Justin Searle - Attacking and Defending the Smart Grid - Audio.m4b80.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Katy Levinson - Dont Fix It In Software - Audio.m4b67.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Kees Cook - Kernel Exploitation Via Uninitialized Stack - Audio.m4b23.6 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Kyle Osborn and Matt Johanson - Hacking Google Chrome OS - Audio.m4b71.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Lai Wu Chiu PK - Balancing The Pwn Trade Deficit APT Secrets in Asia - Audio.m4b120.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Lawson Potter and Deviant Ollam - And Thats How I Lost My Eye Exploring Emergency Data Destruction - Audio.m4b84.3 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Mahmud Ab Rahman - Sneaky PDF - Audio.m4b65.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Marketa Trimble - The Future of Cybertravel Legal Implications of the Evasion of Geolocation - Audio.m4b65.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Martin Holst Swende and Patrik Karlsson - Web Application Analysis With Owasp Hatkit - Audio.m4b69.6 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Matt Joyce - The Art of Trolling - Audio.m4b55.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Matt Krick - DCFluX in License to Transmit - Audio.m4b72.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Michael Robinson - What Time Are You Anyway - Audio.m4b29.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Michael Scarito - Build your own Synthetic Aperture Radar - Audio.m4b76.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Michael theprez98 Schearer - WTF Happened to the Constitution The Right to Privacy in the Digital Age - Audio.m4b70.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Mike Arpaia and Ted Reed - Beat to 1337 Creating A Successful University Cyber Defense Organization - Audio.m4b36.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Mike Tassey and Rich Perkins - Wireless Aerial Surveillance Platform - Audio.m4b75.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Mikko Hypponen - The History and the Evolution of Computer Viruses - Audio.m4b74.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Ming Chow - Abusing HTML5 - Audio.m4b54.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Mouse and Renderman - Familiarity Breeds Contempt - Audio.m4b64.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Moxie Marlinspike - SSL And The Future Of Authenticity - Audio.m4b65.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Nelson Elhage - Virtualization Under Attack Breaking out of KVM - Audio.m4b85.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Jibran Ilyas - Malware Freak Show 3 Theyre pwning erbody out there - Audio.m4b68.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Paul Kehrer - Getting SSLizzard - Audio.m4b61.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Nicholas Percoco and Sean Schulte - This is REALLY not the droid youre looking for - Audio.m4b54.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Nicole Ozer - Big Brother on the Big Screen - Audio.m4b93.1 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - Fingerbank Open DHCP Fingerprints Database - Audio.m4b30.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Olivier Bilodeau - PacketFence The Open Source Nac What Weve Done In The Last Two Years - Audio.m4b78.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Ask EFF The Year in Digital Civil Liberties - Audio.m4b80.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - DEF CON Comedy Jam IV A New Hope For The Fail Whale - Audio.m4b156.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Former Keynotes The Future - Audio.m4b73.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Is it 0-day or 0-care - Audio.m4b91.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Meet The Federal Agent 2.0 - Audio.m4b72.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Net Neutrality Panel - Audio.m4b69.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Network Security Podcast - Audio.m4b85.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - PCI 2 Still Compromising Controls and Compromising Security - Audio.m4b174.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Represent Defcon Groups Hackerspaces and You - Audio.m4b62.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - SCADA and PLCs in Correctional Facilities The Nightmare Before Christmas - Audio.m4b86.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Smartfuzzing the Web Carpe Vestra Foramina - Audio.m4b82.6 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Panel - Whoever Fights Monsters Aaron Barr Anonymous and Ourselves - Audio.m4b82.2 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Patrick Engebretson and Josh Pauli - Mamma Dont Let Your Babies Grow Up to be Pen Testers - Audio.m4b57.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Paul Craig - Internet Kiosk Terminals The Redux - Audio.m4b77.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Ramon Gomez - Bulletproofing The Cloud Are We Any Closer To Security - Audio.m4b57.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Reeves Smith - How Haunters Void Warranties - Audio.m4b23.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Rezchikov Wang and Engelman - Why Airport Security Cant Be Done FAST - Audio.m4b83.3 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Rick Howard - An Insiders Look at International Cyber Security Threats and Trends - Audio.m4b50.1 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Ryan Linn - PIG Finding Truffles Without Leaving A Trace - Audio.m4b74.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Sam Bowne - Three Generations of DoS Attacks - Audio.m4b79.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Schuyler Towne - DIY Non-Destructive Entry - Audio.m4b68.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Shawn Webb - Runtime Process Insemination - Audio.m4b66.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Shrdlu - Are You In Yet The CISOs View of Pentesting - Audio.m4b34.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Skunkworks - Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin - Audio.m4b35.9 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Sterling Archer and Freaksworth - IP4 TRUTH The IPocalypse is a LIE - Audio.m4b66.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Steve Ocepek - Blinkie Lights Network Monitoring with Arduino - Audio.m4b82.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Steven Levy - We Owe it All to the Hackers - Audio.m4b73.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and LosTboY - Welcome - Making of the badge - Audio.m4b72.3 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - The Dark Tangent and Russ Rogers - DEF CON Awards - Audio.m4b55.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Thomas Wilhelm - Staying Connected during a Revolution or Disaster - Audio.m4b77.1 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Tim Elrod and Stefan Morris - I Am Not a Doctor but I Play One on Your Network - Audio.m4b47.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Tyler Cohen - Look At What My Car Can Do - Audio.m4b82.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Vlad Gostom and Joshua Marpet - Smile for the Grenade Camera Go Bang - Audio.m4b47.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Wesley McGrew - Covert Post-Exploitation Forensics With Metasploit - Audio.m4b73.5 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Whitfield Diffie and Moxie Marlinspike - Audio.m4b90.8 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - William Manning - Pervasive Cloaking - Audio.m4b47.0 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Yekaterina Tsipenyuk ONeil and Erika Chin - Seven Ways to Hang Yourself with Google Android - Audio.m4b79.7 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - Zoz and Andrea Bianchi - Vanquishing Voyeurs Secure Ways To Authenticate Insecurely - Audio.m4b82.3 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - datagram - Introduction to Tamper Evident Devices - Audio.m4b92.4 MiB2013-Jun-02 07:00
DEF CON 19 Hacking Conference Presentation By - eskimo - Steganography and Cryptography 101 - Audio.m4b30.3 MiB2013-Jun-02 07:00