FileMood

Download SOURCE

SOURCE

Name

SOURCE

 DOWNLOAD Copy Link

Total Size

30.9 GB

Total Files

256

Last Seen

2024-11-13 00:10

Hash

1F7E6A3D5925788FF93A134D730A7A7D4CDF40BD

/SOURCE Barcelona 2010/

SOURCE Barcelona 2010 If Black Hats always win, why is Albert Gonzalez in prison.mp4

566.7 MB

SOURCE Barcelona 2010 Carders.cc, the Rise and Fall of an Underground Forum.mp4

377.2 MB

SOURCE Barcelona 2010 Cyber[Crime War] - Connecting the Dots.mp4

288.0 MB

SOURCE Barcelona 2010 ERP Security Myths, Problems, Solutions.mp4

235.4 MB

SOURCE Barcelona 2010 Hacking SAP BusinessObjects.mp4

188.3 MB

SOURCE Barcelona 2010 Building Bridges Forcing Hackers and Business to Hug it Out.mp4

342.2 MB

SOURCE Barcelona 2010 Implementing a CSIRT - Lessons Learnt from Setting Up the Irish CERT.mp4

214.5 MB

SOURCE Barcelona 2010 Jackpotting Automated Teller Machines.mp4

237.7 MB

SOURCE Barcelona 2010 Leveraging Social Networking While Mitigating Risk.mp4

174.4 MB

SOURCE Barcelona 2010 Passwords in Corporate Networks.mp4

182.7 MB

SOURCE Barcelona 2010 Revolution or Evolution Information Security 2020.mp4

265.6 MB

SOURCE Barcelona 2010 SCCP hacking Attacking the SS7 & SIGTRAN and Mapping the Phone System.mp4

234.1 MB

SOURCE Barcelona 2010 Security in Agile PLC - Practical navigational aid for speed boats.mp4

278.7 MB

SOURCE Barcelona 2010 Security in the SDLC IT Doesn t Have To Be Painful!.mp4

178.2 MB

SOURCE Barcelona 2010 Security Sucks.mp4

98.2 MB

SOURCE Barcelona 2010 Using the the 36 stratagems for Social Engineering.mp4

178.3 MB

/SOURCE Boston 2008/

SOURCE Boston 2008 A Security Metric for Software Developer.mp4

79.1 MB

SOURCE Boston 2008 Advanced Linux Firewalls.mp4

114.7 MB

SOURCE Boston 2008 All the Data That s Fit to Visualize.mp4

54.3 MB

SOURCE Boston 2008 Automated Structural Malware Classification.mp4

139.5 MB

SOURCE Boston 2008 Banking on education A case study on security training programs.mp4

136.5 MB

SOURCE Boston 2008 Business Logic Flaws.mp4

113.8 MB

SOURCE Boston 2008 CEO Panel.mp4

99.2 MB

SOURCE Boston 2008 Content Awareness A Cornerstone to Data Prote.mp4

115.7 MB

SOURCE Boston 2008 Deperimetrisation - Dream Or Nightmare For Network Security.mp4

143.7 MB

SOURCE Boston 2008 Detailed Thread Modeling.mp4

127.1 MB

SOURCE Boston 2008 Developing an Incident Response Plan.mp4

148.2 MB

SOURCE Boston 2008 Disruptive Innovation and the Future of Security.mp4

125.2 MB

SOURCE Boston 2008 Entrepreneur Panel.mp4

116.6 MB

SOURCE Boston 2008 Establishing a Security Metrics Program.mp4

100.8 MB

SOURCE Boston 2008 How Compliance Can Get You Killed.mp4

122.1 MB

SOURCE Boston 2008 Information Operations.mp4

57.7 MB

SOURCE Boston 2008 Investigation Techniques for Social Networking Sites.mp4

139.7 MB

SOURCE Boston 2008 Keynote - Dan Geer.mp4

57.6 MB

SOURCE Boston 2008 Keynote - Steven Levy.mp4

57.1 MB

SOURCE Boston 2008 Keynote Speaker - Richard Clarke.mp4

46.6 MB

SOURCE Boston 2008 L0pht Panel.mp4

74.7 MB

SOURCE Boston 2008 Managing Your Career in Infosec.mp4

69.2 MB

SOURCE Boston 2008 Not Dead But Twitching Anti-Virus Succumbs to the Scourge of Modern Malware.mp4

127.3 MB

SOURCE Boston 2008 Panel Discussion - The tug-o-war between business and security.mp4

109.3 MB

SOURCE Boston 2008 Telephone Defenses Against the Dark Arts (part1).mp4

145.2 MB

SOURCE Boston 2008 The CERT C++ Secure Coding Standard.mp4

147.9 MB

SOURCE Boston 2008 Understanding and Preventing Data Breaches, The Real World Edition.mp4

46.9 MB

SOURCE Boston 2008 Understanding Emerging Threats The case of Nugache.mp4

68.9 MB

SOURCE Boston 2008 Vulnerability in the Real World Lessons from both sides of the fence.mp4

124.5 MB

SOURCE Boston 2008 Web Application Panel.mp4

126.1 MB

SOURCE Boston 2008 Your car passed inspection but what about your software.mp4

96.2 MB

SOURCE Boston 2008 Having a Defined Target for Software Security Testing.mp4

82.0 MB

/SOURCE Boston 2009/

SOURCE Boston 2009 400 Apps in 40 Days.mp4

121.6 MB

SOURCE Boston 2009 A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance.mp4

158.8 MB

SOURCE Boston 2009 Anti-Debugging - A Developer s Viewpoint.mp4

138.2 MB

SOURCE Boston 2009 Attacking Layer 8 Client Side Penetration Testing.mp4

97.2 MB

SOURCE Boston 2009 Career Management Workshop (part 1).mp4

192.8 MB

SOURCE Boston 2009 Career Management Workshop (part 2).mp4

224.9 MB

SOURCE Boston 2009 Chris Weber New Tools In Unicode Security1113944.mp4

96.5 MB

SOURCE Boston 2009 Dissecting Foreign Web Attacks.mp4

103.0 MB

SOURCE Boston 2009 Employing PCI Compliance Programs.mp4

110.5 MB

SOURCE Boston 2009 Encryption and Enterprise Data Security.mp4

118.9 MB

SOURCE Boston 2009 Erik Cabetas Vulnerabilities In Application Interpreters.mp4

78.6 MB

SOURCE Boston 2009 Exploiting Unicode-enable Software.mp4

124.2 MB

SOURCE Boston 2009 From The Garage To NASDAQ With Open Source The Sourcefire Experience.mp4

135.7 MB

SOURCE Boston 2009 Get Rich or Die Trying - Making Money on the Web the Black Hat Way.mp4

150.5 MB

SOURCE Boston 2009 Horseless Carriage Exploits and Eavesdropping Defenses.mp4

215.0 MB

SOURCE Boston 2009 How Microsoft Fixes Security Vulnerabilities.mp4

131.5 MB

SOURCE Boston 2009 How to Respond to an Unexpected Security Incident A Reality Check.mp4

88.7 MB

SOURCE Boston 2009 I Can Haz Privacy.mp4

108.3 MB

SOURCE Boston 2009 Information Security in Higher Education Baby Steps.mp4

145.7 MB

SOURCE Boston 2009 Introducing Heyoka DNS Tunneling 2.0.mp4

109.5 MB

SOURCE Boston 2009 L0phtCrack 6 Release.mp4

79.6 MB

SOURCE Boston 2009 Marcus Ranum Keynote.mp4

133.1 MB

SOURCE Boston 2009 Massachusetts Data Breach Laws, Regulations, and Responsibilities.mp4

62.0 MB

SOURCE Boston 2009 Maximizing ROI on Vulnerability Management.mp4

103.9 MB

SOURCE Boston 2009 Panel The Partial Disclosure Dilemma.mp4

214.3 MB

SOURCE Boston 2009 Panel Discussion 2009 And Beyond.mp4

114.9 MB

SOURCE Boston 2009 Peter Kuper - Keynote.mp4

117.4 MB

SOURCE Boston 2009 Peter Kuper Silver Linings Economic Meltdown And HowInformati.mp4

78.2 MB

SOURCE Boston 2009 Protecting Vulnerable Web Applications With IIS7.mp4

123.8 MB

SOURCE Boston 2009 Ron Gula Securing Your Data Assets.mp4

80.3 MB

SOURCE Boston 2009 Secure Voice Communications - The Missing Piece in Mobile Security.mp4

109.5 MB

SOURCE Boston 2009 Security Start-Up Event (showcase).mp4

114.1 MB

SOURCE Boston 2009 Security Startup Showcase.mp4

106.6 MB

SOURCE Boston 2009 So You Want To Train An Army Of Ninjas.mp4

107.7 MB

SOURCE Boston 2009 Splunk.mp4

112.4 MB

SOURCE Boston 2009 Tenable Network Security.mp4

105.9 MB

SOURCE Boston 2009 The Crisis in Information Security.mp4

112.8 MB

SOURCE Boston 2009 Turning Science into Sound Bites Lessons from Prototype This!.mp4

105.1 MB

SOURCE Boston 2009 Venture Capital For Information Security Start Ups.mp4

80.8 MB

SOURCE Boston 2009 Ward Spangenburg Compliance Programs As A Springboard For Enterprise.mp4

80.5 MB

SOURCE Boston 2009 Wireless Sensor Networking As An Asset And A Liability.mp4

146.6 MB

/Presentation Slides/

10-04-SOURCE-DetectingPenTesters.pptx

4.0 MB

Adobe_SOURCEBoston.pptx

1.6 MB

BillBlunden.pdf

2.3 MB

Broken Arrows Source.pdf

2.0 MB

Brueggemann.pptx

1.2 MB

carmen.pdf

3.9 MB

DanK.pptx

783.5 KB

Dino.pdf

1.8 MB

HDKeynote.pdf

5.3 MB

iSEC_Securely_Moving_Into_The_Cloud.pdf

648.8 KB

Managed Code Rootkits - Erez Metula.ppt

2.5 MB

MonkeyBerries-SourceBoston-2010.pdf

1.6 MB

Moxie.pdf

4.5 MB

NSSLabs - SourceBoston.ppt

2.2 MB

NT Object (In)Security.pdf

613.7 KB

PCI-right_wrong_2010-04-22.pdf

1.1 MB

RandyBarr.pptx

1.8 MB

Robert Clark.ppt

322.6 KB

Rugged Software Development_20100311(2).pdf

7.9 MB

sb2010-schedule.htm

145.8 KB

SOURCE Boston 2010 Clark slides.ppt

320.5 KB

SOURCE-Boston-2010.pdf

3.0 MB

source10-linuxkernel-jonoberheide.pdf

895.7 KB

SteveChristey.pptx

1.3 MB

VulnPanel.pptx

168.6 KB

Windows File Pseudonyms.pptx

726.7 KB

/Videos/

Adam Meyers - Reverse Engineering Broken Arrows.mp4

159.2 MB

Adam Meyers - Security Sucks.mp4

208.6 MB

Allison Miller - Protecting Customers from Online Threats.mp4

232.6 MB

Andy Purdy - Keynote.mp4

258.9 MB

Bill Blunden - An Uninvited Guest.mp4

248.9 MB

Brian Holyfield - Cracking the Foundation.mp4

210.6 MB

Carole Fennelly - Vulnerability Management Panel.mp4

216.6 MB

Chris Clark and Townsend Ladd Harris - Attacking WebOS.mp4

214.8 MB

Chris Hoff - Cloudiforniturtles.mp4

270.8 MB

Colin Ames - Neurosurgery With Meterpreter.mp4

132.5 MB

Dan Crowley - Windows File Pseudonyms.mp4

174.0 MB

David Mortman - Too Many Cooks Spoil the Broth.mp4

220.3 MB

Deviant Ollam - The Four Types of Locks.mp4

235.0 MB

Dino Dai Zovi - Practical Return-Oriented Programming.mp4

217.5 MB

Dov Yoran and Chris Hoff - Cloud Security.mp4

210.7 MB

Erez Metula - Managed Code Rootkits.mp4

225.8 MB

HD Moore - Keynote.mp4

210.7 MB

HD Moore - Making Penetration Testing Mainstream.mp4

278.5 MB

Jake Appelbaum - Anonymity, Privacy, and Cirvumvention with Tor.mp4

289.1 MB

John Cran - Realities of Starting a Security Company - Entrepreneurs Panel.mp4

224.3 MB

Jon Oberheide - Linux Kernel Exploitation.mp4

172.5 MB

Josh Corman - Realities of Starting a Security Company - Investors Panel.mp4

247.7 MB

Josh Corman - Rugged Software.mp4

230.1 MB

Lenny Zeltser - Knock Knock.mp4

196.5 MB

Mary Ann Davidson - Keynote.mp4

237.0 MB

Mike Kershaw - Wifi Security.mp4

201.7 MB

Moxie Marlinspike - Changing Threats to Privacy.mp4

237.1 MB

Paul Asadoorian - Embedded System Hacking.mp4

209.9 MB

Rafal Los and Matt Wood - Into the Rabbit Hole.mp4

244.5 MB

Randolph Barr - Gain Comfort in Losing Control to the Cloud.mp4

195.9 MB

Rich Mogull - Involuntary Case Studies in Data Breaches.mp4

293.2 MB

Riley Hassell - NT Object Insecurity.mp4

191.8 MB

Robert Clark - Legal Aspects of Computer Network Security and Privacy.mp4

209.0 MB

Ron Gula - Detecting Penetration Testing.mp4

203.7 MB

Timothy Brueggemann - Understanding The Key to Protecting Highly Sensitive PII.mp4

174.8 MB

Travis Goodspeed - Breaking Zigbee Crypto.mp4

189.3 MB

Trend Micro - Measuring Security.mp4

321.1 MB

Wendy Poland and David Lenoe - Bullseye on Your Back.mp4

246.3 MB

/SOURCE Boston 2012/

Advanced SQL Injection with SQLol The Configurable SQLi Testbed.mp4

111.2 MB

Behind The Scenes Pwning Satellite Cable TV.mp4

87.4 MB

Celebrating Bad Crypto.mp4

96.7 MB

Criticality, Rejectionists, Risk Tolerance - Keynote at Source Boston 2012.mp4

126.4 MB

De-constructing the Cost of a Data Breach.mp4

82.8 MB

Finding the Weak Link in Windows Binaries.mp4

81.9 MB

Games We Play Defenses and Disincentives.mp4

130.0 MB

Inside the Duqu Command and Control Servers,.mp4

119.5 MB

Lessons Of Static Binary Analysis.mp4

140.7 MB

Media Hype in the Information Security Industry.mp4

81.5 MB

Microsoft s Response Process 10 Years of Hard Knock Learning.mp4

150.3 MB

Mobile Snitch - Devices telling the world about you.mp4

86.6 MB

No Victims How to Measure & Communicate Risk.mp4

104.7 MB

Perspectives of How to Develop a Winning Career in Infosec.mp4

82.6 MB

Reverse Engineering Mobile Applications.mp4

89.7 MB

SCAP for Everyone A case study in transforming configurations.mp4

90.5 MB

SexyDefense - Maximizing the home-field advantage.mp4

96.8 MB

SOURCE Boston 2012 - Keynote - Anonymous 20 20 The Beginning is Near.mp4

127.6 MB

Successful Application Security Programs in an Uncertain Landscape.mp4

86.2 MB

Using capture-the-flag to enhance teaching and training.mp4

62.7 MB

Voight-Kampff ing The BlackBerry PlayBook.mp4

119.4 MB

Watchtowers of the Internet Analysis of Outbound Malware Communication.mp4

137.1 MB

What Permissions Does Your Database User REALLY Need.mp4

115.4 MB

/SOURCE Boston 2013/

A Brief History of Physical Security.mp4

66.6 MB

Achievement Unlocked Designing a compelling security awareness program.mp4

68.9 MB

Adversarial Resilience at the Planetary Scale.mp4

90.7 MB

Analysis of The BroBot DDOS Attack.mp4

105.2 MB

Analyzing the Chemistry of Data.mp4

100.6 MB

Android Modding for the Security Practitioner.mp4

75.3 MB

Attacking Cloud Services with Source Code (2).mp4

66.8 MB

Attacking Cloud Services with Source Code.mp4

80.6 MB

Avoiding Android App Security Pitfalls.mp4

52.8 MB

Big Data Big Liability!.mp4

80.7 MB

Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques.mp4

97.1 MB

Blitzing with your Defense.mp4

108.3 MB

Bring Your Own Device Keeping it Simple and Effective.mp4

106.7 MB

Browser Extensions - The Backdoor To Stealth Malware.mp4

130.1 MB

Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4

114.3 MB

Building Your Own Packet Capture Platform.mp4

117.6 MB

BYOD - The Risks, Rewards and Challenges.mp4

95.3 MB

ColdFusion for Penetration Testers.mp4

190.0 MB

Covering your aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS.mp4

86.1 MB

Data Breach - Let The Finger Pointing Begin.mp4

123.3 MB

Distributed Security Expanding the Toolkit for Institutional Resilience.mp4

107.2 MB

Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics).mp4

135.1 MB

Games We Play Payoffs & Chaos Monkeys.mp4

76.7 MB

Hacking Back is a Bad Idea.mp4

68.4 MB

Hiring Recruitment.mp4

167.9 MB

Inside the Black Hole Exploit Kit (BHEK).mp4

82.1 MB

Insider Threat Hunting for Authorized Evil.mp4

86.9 MB

JavaScript Pitfalls.mp4

110.4 MB

Just Another Day at the Office... September 11, 2001, The White House.mp4

118.1 MB

Keynote Andy Ellis.mp4

92.5 MB

Keynote Dan Geer & Richard Thieme.mp4

81.1 MB

Keynote Gene Kim.mp4

53.5 MB

Lessons Of Binary Analysis.mp4

245.2 MB

Lessons of the Kobayashi Maru If You re Not Cheating, You re Not Trying.mp4

66.8 MB

Leveraging Collective Intelligence To Combat Cyber Crime.mp4

182.3 MB

Mapping And Evolution Of Android Permissions.mp4

109.8 MB

PLC SCADA Vulnerabilities in Correctional Facilities.mp4

122.2 MB

Practical Exploitation of Embedded Systems.mp4

88.2 MB

Privacy at the Border A Guide for Traveling with Devices.mp4

113.9 MB

Proactive Defense.mp4

123.8 MB

Protecting sensitive information on iOS devices.mp4

111.7 MB

Pwnie Express presents Practical MitM Pentesting.mp4

89.6 MB

RESTful Services, The Web Security Blind Spot.mp4

109.5 MB

Rise In ATM Compromises.mp4

55.5 MB

Scoring PDF Structure To Detect Malicious Files.mp4

71.2 MB

Strategic Analysis of the iOS Jailbreak Development Community.mp4

82.4 MB

Suicide Risk Assessment and Intervention Tactics.mp4

98.4 MB

The Base Rate Fallacy Information Security Needs To Understand This..mp4

102.6 MB

The Interim Years Of Cyberspace - Security In A Domain Of Warfare.mp4

101.4 MB

Theory and Application of Realistic Capture the Flag Competitions.mp4

91.5 MB

Unified Communications Information Loss Through the Front Door.mp4

124.9 MB

Vulnerabilities of Control Systems in Drinking Water Utilities.mp4

208.3 MB

We See The Future And It s Not Pretty.mp4

114.0 MB

Why Developers And Vulnerability Researchers Should Collaborate.mp4

74.1 MB

Your PCI Assessor Best Friend or Worst Enemy You Choose....mp4

86.7 MB

/SOURCE Boston 2014/

A Brief History of Physical Security.mp4

77.7 MB

Adversarial Resilience at the Planetary Scale.mp4

70.8 MB

Analysis of The BroBot DDOS Attack.mp4

80.5 MB

Attacking Cloud Services with Source Code.mp4

62.5 MB

Big Data Big Liability!.mp4

67.2 MB

Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques.mp4

94.3 MB

Blitzing with your Defense.mp4

81.6 MB

Building Your Own Packet Capture Platform.mp4

98.9 MB

Distributed Security Expanding the Toolkit for Institutional Resilience.mp4

94.2 MB

Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics).mp4

114.7 MB

Games We Play Payoffs & Chaos Monkeys.mp4

61.3 MB

Hacking Back is a Bad Idea.mp4

58.0 MB

Hiring Recruitment.mp4

171.3 MB

Inside the Black Hole Exploit Kit (BHEK).mp4

81.8 MB

Insider Threat Hunting for Authorized Evil.mp4

72.3 MB

JavaScript Pitfalls.mp4

124.3 MB

Practical Exploitation of Embedded Systems.mp4

63.2 MB

Protecting sensitive information on iOS devices.mp4

82.1 MB

Rise In ATM Compromises.mp4

54.7 MB

Strategic Analysis of the iOS Jailbreak Development Community.mp4

62.2 MB

Suicide Risk Assessment and Intervention Tactics.mp4

70.5 MB

The Base Rate Fallacy Information Security Needs To Understand This..mp4

81.9 MB

Theory and Application of Realistic Capture the Flag Competitions.mp4

82.2 MB

We See The Future And It s Not Pretty.mp4

91.6 MB

/

SOURCE thank you.txt

0.6 KB

 

Total files 256


Copyright © 2024 FileMood.com