/SOURCE Barcelona 2010/
|
SOURCE Barcelona 2010 Anti-Virus Product Testing Sessions.mp4
|
579.4 MB
|
SOURCE Barcelona 2010 Applied Threat Modeling -- Live.mp4
|
178.4 MB
|
SOURCE Barcelona 2010 Balancing the Pwn Trade Deficit.mp4
|
351.6 MB
|
SOURCE Barcelona 2010 Building Bridges Forcing Hackers and Business to Hug it Out.mp4
|
342.2 MB
|
SOURCE Barcelona 2010 Carders.cc, the Rise and Fall of an Underground Forum.mp4
|
377.2 MB
|
SOURCE Barcelona 2010 Cyber[Crime War] - Connecting the Dots.mp4
|
288.0 MB
|
SOURCE Barcelona 2010 ERP Security Myths, Problems, Solutions.mp4
|
235.4 MB
|
SOURCE Barcelona 2010 Hacking SAP BusinessObjects.mp4
|
188.3 MB
|
SOURCE Barcelona 2010 If Black Hats always win, why is Albert Gonzalez in prison.mp4
|
566.7 MB
|
SOURCE Barcelona 2010 Implementing a CSIRT - Lessons Learnt from Setting Up the Irish CERT.mp4
|
214.5 MB
|
SOURCE Barcelona 2010 Jackpotting Automated Teller Machines.mp4
|
237.7 MB
|
SOURCE Barcelona 2010 Leveraging Social Networking While Mitigating Risk.mp4
|
174.4 MB
|
SOURCE Barcelona 2010 Passwords in Corporate Networks.mp4
|
182.7 MB
|
SOURCE Barcelona 2010 Revolution or Evolution Information Security 2020.mp4
|
265.6 MB
|
SOURCE Barcelona 2010 SCCP hacking Attacking the SS7 & SIGTRAN and Mapping the Phone System.mp4
|
234.1 MB
|
SOURCE Barcelona 2010 Security in Agile PLC - Practical navigational aid for speed boats.mp4
|
278.7 MB
|
SOURCE Barcelona 2010 Security in the SDLC IT Doesn t Have To Be Painful!.mp4
|
178.2 MB
|
SOURCE Barcelona 2010 Security Sucks.mp4
|
98.2 MB
|
SOURCE Barcelona 2010 Using the the 36 stratagems for Social Engineering.mp4
|
178.3 MB
|
/SOURCE Boston 2008/
|
SOURCE Boston 2008 A Security Metric for Software Developer.mp4
|
79.1 MB
|
SOURCE Boston 2008 Advanced Linux Firewalls.mp4
|
114.7 MB
|
SOURCE Boston 2008 All the Data That s Fit to Visualize.mp4
|
54.3 MB
|
SOURCE Boston 2008 Automated Structural Malware Classification.mp4
|
139.5 MB
|
SOURCE Boston 2008 Banking on education A case study on security training programs.mp4
|
136.5 MB
|
SOURCE Boston 2008 Business Logic Flaws.mp4
|
113.8 MB
|
SOURCE Boston 2008 CEO Panel.mp4
|
99.2 MB
|
SOURCE Boston 2008 Content Awareness A Cornerstone to Data Prote.mp4
|
115.7 MB
|
SOURCE Boston 2008 Deperimetrisation - Dream Or Nightmare For Network Security.mp4
|
143.7 MB
|
SOURCE Boston 2008 Detailed Thread Modeling.mp4
|
127.1 MB
|
SOURCE Boston 2008 Developing an Incident Response Plan.mp4
|
148.2 MB
|
SOURCE Boston 2008 Disruptive Innovation and the Future of Security.mp4
|
125.2 MB
|
SOURCE Boston 2008 Entrepreneur Panel.mp4
|
116.6 MB
|
SOURCE Boston 2008 Establishing a Security Metrics Program.mp4
|
100.8 MB
|
SOURCE Boston 2008 How Compliance Can Get You Killed.mp4
|
122.1 MB
|
SOURCE Boston 2008 Information Operations.mp4
|
57.7 MB
|
SOURCE Boston 2008 Investigation Techniques for Social Networking Sites.mp4
|
139.7 MB
|
SOURCE Boston 2008 Keynote - Dan Geer.mp4
|
57.6 MB
|
SOURCE Boston 2008 Keynote - Steven Levy.mp4
|
57.1 MB
|
SOURCE Boston 2008 Keynote Speaker - Richard Clarke.mp4
|
46.6 MB
|
SOURCE Boston 2008 L0pht Panel.mp4
|
74.7 MB
|
SOURCE Boston 2008 Managing Your Career in Infosec.mp4
|
69.2 MB
|
SOURCE Boston 2008 Not Dead But Twitching Anti-Virus Succumbs to the Scourge of Modern Malware.mp4
|
127.3 MB
|
SOURCE Boston 2008 Panel Discussion - The tug-o-war between business and security.mp4
|
109.3 MB
|
SOURCE Boston 2008 Telephone Defenses Against the Dark Arts (part1).mp4
|
145.2 MB
|
SOURCE Boston 2008 The CERT C++ Secure Coding Standard.mp4
|
147.9 MB
|
SOURCE Boston 2008 Understanding and Preventing Data Breaches, The Real World Edition.mp4
|
46.9 MB
|
SOURCE Boston 2008 Understanding Emerging Threats The case of Nugache.mp4
|
68.9 MB
|
SOURCE Boston 2008 Vulnerability in the Real World Lessons from both sides of the fence.mp4
|
124.5 MB
|
SOURCE Boston 2008 Web Application Panel.mp4
|
126.1 MB
|
SOURCE Boston 2008 Your car passed inspection but what about your software.mp4
|
96.2 MB
|
SOURCE Boston 2008 Having a Defined Target for Software Security Testing.mp4
|
82.0 MB
|
/SOURCE Boston 2009/
|
SOURCE Boston 2009 400 Apps in 40 Days.mp4
|
121.6 MB
|
SOURCE Boston 2009 A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance.mp4
|
158.8 MB
|
SOURCE Boston 2009 Anti-Debugging - A Developer s Viewpoint.mp4
|
138.2 MB
|
SOURCE Boston 2009 Attacking Layer 8 Client Side Penetration Testing.mp4
|
97.2 MB
|
SOURCE Boston 2009 Career Management Workshop (part 1).mp4
|
192.8 MB
|
SOURCE Boston 2009 Career Management Workshop (part 2).mp4
|
224.9 MB
|
SOURCE Boston 2009 Chris Weber New Tools In Unicode Security1113944.mp4
|
96.5 MB
|
SOURCE Boston 2009 Dissecting Foreign Web Attacks.mp4
|
103.0 MB
|
SOURCE Boston 2009 Employing PCI Compliance Programs.mp4
|
110.5 MB
|
SOURCE Boston 2009 Encryption and Enterprise Data Security.mp4
|
118.9 MB
|
SOURCE Boston 2009 Erik Cabetas Vulnerabilities In Application Interpreters.mp4
|
78.6 MB
|
SOURCE Boston 2009 Exploiting Unicode-enable Software.mp4
|
124.2 MB
|
SOURCE Boston 2009 From The Garage To NASDAQ With Open Source The Sourcefire Experience.mp4
|
135.7 MB
|
SOURCE Boston 2009 Get Rich or Die Trying - Making Money on the Web the Black Hat Way.mp4
|
150.5 MB
|
SOURCE Boston 2009 Horseless Carriage Exploits and Eavesdropping Defenses.mp4
|
215.0 MB
|
SOURCE Boston 2009 How Microsoft Fixes Security Vulnerabilities.mp4
|
131.5 MB
|
SOURCE Boston 2009 How to Respond to an Unexpected Security Incident A Reality Check.mp4
|
88.7 MB
|
SOURCE Boston 2009 I Can Haz Privacy.mp4
|
108.3 MB
|
SOURCE Boston 2009 Information Security in Higher Education Baby Steps.mp4
|
145.7 MB
|
SOURCE Boston 2009 Introducing Heyoka DNS Tunneling 2.0.mp4
|
109.5 MB
|
SOURCE Boston 2009 L0phtCrack 6 Release.mp4
|
79.6 MB
|
SOURCE Boston 2009 Marcus Ranum Keynote.mp4
|
133.1 MB
|
SOURCE Boston 2009 Massachusetts Data Breach Laws, Regulations, and Responsibilities.mp4
|
62.0 MB
|
SOURCE Boston 2009 Maximizing ROI on Vulnerability Management.mp4
|
103.9 MB
|
SOURCE Boston 2009 Panel The Partial Disclosure Dilemma.mp4
|
214.3 MB
|
SOURCE Boston 2009 Panel Discussion 2009 And Beyond.mp4
|
114.9 MB
|
SOURCE Boston 2009 Peter Kuper - Keynote.mp4
|
117.4 MB
|
SOURCE Boston 2009 Peter Kuper Silver Linings Economic Meltdown And HowInformati.mp4
|
78.2 MB
|
SOURCE Boston 2009 Protecting Vulnerable Web Applications With IIS7.mp4
|
123.8 MB
|
SOURCE Boston 2009 Ron Gula Securing Your Data Assets.mp4
|
80.3 MB
|
SOURCE Boston 2009 Secure Voice Communications - The Missing Piece in Mobile Security.mp4
|
109.5 MB
|
SOURCE Boston 2009 Security Start-Up Event (showcase).mp4
|
114.1 MB
|
SOURCE Boston 2009 Security Startup Showcase.mp4
|
106.6 MB
|
SOURCE Boston 2009 So You Want To Train An Army Of Ninjas.mp4
|
107.7 MB
|
SOURCE Boston 2009 Splunk.mp4
|
112.4 MB
|
SOURCE Boston 2009 Tenable Network Security.mp4
|
105.9 MB
|
SOURCE Boston 2009 The Crisis in Information Security.mp4
|
112.8 MB
|
SOURCE Boston 2009 Turning Science into Sound Bites Lessons from Prototype This!.mp4
|
105.1 MB
|
SOURCE Boston 2009 Venture Capital For Information Security Start Ups.mp4
|
80.8 MB
|
SOURCE Boston 2009 Ward Spangenburg Compliance Programs As A Springboard For Enterprise.mp4
|
80.5 MB
|
SOURCE Boston 2009 Wireless Sensor Networking As An Asset And A Liability.mp4
|
146.6 MB
|
/Presentation Slides/
|
10-04-SOURCE-DetectingPenTesters.pptx
|
4.0 MB
|
Adobe_SOURCEBoston.pptx
|
1.6 MB
|
BillBlunden.pdf
|
2.3 MB
|
Broken Arrows Source.pdf
|
2.0 MB
|
Brueggemann.pptx
|
1.2 MB
|
carmen.pdf
|
3.9 MB
|
DanK.pptx
|
783.5 KB
|
Dino.pdf
|
1.8 MB
|
HDKeynote.pdf
|
5.3 MB
|
iSEC_Securely_Moving_Into_The_Cloud.pdf
|
648.8 KB
|
Managed Code Rootkits - Erez Metula.ppt
|
2.5 MB
|
MonkeyBerries-SourceBoston-2010.pdf
|
1.6 MB
|
Moxie.pdf
|
4.5 MB
|
NSSLabs - SourceBoston.ppt
|
2.2 MB
|
NT Object (In)Security.pdf
|
613.7 KB
|
PCI-right_wrong_2010-04-22.pdf
|
1.1 MB
|
RandyBarr.pptx
|
1.8 MB
|
Robert Clark.ppt
|
322.6 KB
|
Rugged Software Development_20100311(2).pdf
|
7.9 MB
|
sb2010-schedule.htm
|
145.8 KB
|
SOURCE Boston 2010 Clark slides.ppt
|
320.5 KB
|
SOURCE-Boston-2010.pdf
|
3.0 MB
|
source10-linuxkernel-jonoberheide.pdf
|
895.7 KB
|
SteveChristey.pptx
|
1.3 MB
|
VulnPanel.pptx
|
168.6 KB
|
Windows File Pseudonyms.pptx
|
726.7 KB
|
/Videos/
|
Adam Meyers - Reverse Engineering Broken Arrows.mp4
|
159.2 MB
|
Adam Meyers - Security Sucks.mp4
|
208.6 MB
|
Allison Miller - Protecting Customers from Online Threats.mp4
|
232.6 MB
|
Andy Purdy - Keynote.mp4
|
258.9 MB
|
Bill Blunden - An Uninvited Guest.mp4
|
248.9 MB
|
Brian Holyfield - Cracking the Foundation.mp4
|
210.6 MB
|
Carole Fennelly - Vulnerability Management Panel.mp4
|
216.6 MB
|
Chris Clark and Townsend Ladd Harris - Attacking WebOS.mp4
|
214.8 MB
|
Chris Hoff - Cloudiforniturtles.mp4
|
270.8 MB
|
Colin Ames - Neurosurgery With Meterpreter.mp4
|
132.5 MB
|
Dan Crowley - Windows File Pseudonyms.mp4
|
174.0 MB
|
David Mortman - Too Many Cooks Spoil the Broth.mp4
|
220.3 MB
|
Deviant Ollam - The Four Types of Locks.mp4
|
235.0 MB
|
Dino Dai Zovi - Practical Return-Oriented Programming.mp4
|
217.5 MB
|
Dov Yoran and Chris Hoff - Cloud Security.mp4
|
210.7 MB
|
Erez Metula - Managed Code Rootkits.mp4
|
225.8 MB
|
HD Moore - Keynote.mp4
|
210.7 MB
|
HD Moore - Making Penetration Testing Mainstream.mp4
|
278.5 MB
|
Jake Appelbaum - Anonymity, Privacy, and Cirvumvention with Tor.mp4
|
289.1 MB
|
John Cran - Realities of Starting a Security Company - Entrepreneurs Panel.mp4
|
224.3 MB
|
Jon Oberheide - Linux Kernel Exploitation.mp4
|
172.5 MB
|
Josh Corman - Realities of Starting a Security Company - Investors Panel.mp4
|
247.7 MB
|
Josh Corman - Rugged Software.mp4
|
230.1 MB
|
Lenny Zeltser - Knock Knock.mp4
|
196.5 MB
|
Mary Ann Davidson - Keynote.mp4
|
237.0 MB
|
Mike Kershaw - Wifi Security.mp4
|
201.7 MB
|
Moxie Marlinspike - Changing Threats to Privacy.mp4
|
237.1 MB
|
Paul Asadoorian - Embedded System Hacking.mp4
|
209.9 MB
|
Rafal Los and Matt Wood - Into the Rabbit Hole.mp4
|
244.5 MB
|
Randolph Barr - Gain Comfort in Losing Control to the Cloud.mp4
|
195.9 MB
|
Rich Mogull - Involuntary Case Studies in Data Breaches.mp4
|
293.2 MB
|
Riley Hassell - NT Object Insecurity.mp4
|
191.8 MB
|
Robert Clark - Legal Aspects of Computer Network Security and Privacy.mp4
|
209.0 MB
|
Ron Gula - Detecting Penetration Testing.mp4
|
203.7 MB
|
Timothy Brueggemann - Understanding The Key to Protecting Highly Sensitive PII.mp4
|
174.8 MB
|
Travis Goodspeed - Breaking Zigbee Crypto.mp4
|
189.3 MB
|
Trend Micro - Measuring Security.mp4
|
321.1 MB
|
Wendy Poland and David Lenoe - Bullseye on Your Back.mp4
|
246.3 MB
|
/SOURCE Boston 2012/
|
Advanced SQL Injection with SQLol The Configurable SQLi Testbed.mp4
|
111.2 MB
|
Behind The Scenes Pwning Satellite Cable TV.mp4
|
87.4 MB
|
Celebrating Bad Crypto.mp4
|
96.7 MB
|
Criticality, Rejectionists, Risk Tolerance - Keynote at Source Boston 2012.mp4
|
126.4 MB
|
De-constructing the Cost of a Data Breach.mp4
|
82.8 MB
|
Finding the Weak Link in Windows Binaries.mp4
|
81.9 MB
|
Games We Play Defenses and Disincentives.mp4
|
130.0 MB
|
Inside the Duqu Command and Control Servers,.mp4
|
119.5 MB
|
Lessons Of Static Binary Analysis.mp4
|
140.7 MB
|
Media Hype in the Information Security Industry.mp4
|
81.5 MB
|
Microsoft s Response Process 10 Years of Hard Knock Learning.mp4
|
150.3 MB
|
Mobile Snitch - Devices telling the world about you.mp4
|
86.6 MB
|
No Victims How to Measure & Communicate Risk.mp4
|
104.7 MB
|
Perspectives of How to Develop a Winning Career in Infosec.mp4
|
82.6 MB
|
Reverse Engineering Mobile Applications.mp4
|
89.7 MB
|
SCAP for Everyone A case study in transforming configurations.mp4
|
90.5 MB
|
SexyDefense - Maximizing the home-field advantage.mp4
|
96.8 MB
|
SOURCE Boston 2012 - Keynote - Anonymous 20 20 The Beginning is Near.mp4
|
127.6 MB
|
Successful Application Security Programs in an Uncertain Landscape.mp4
|
86.2 MB
|
Using capture-the-flag to enhance teaching and training.mp4
|
62.7 MB
|
Voight-Kampff ing The BlackBerry PlayBook.mp4
|
119.4 MB
|
Watchtowers of the Internet Analysis of Outbound Malware Communication.mp4
|
137.1 MB
|
What Permissions Does Your Database User REALLY Need.mp4
|
115.4 MB
|
/SOURCE Boston 2013/
|
A Brief History of Physical Security.mp4
|
66.6 MB
|
Achievement Unlocked Designing a compelling security awareness program.mp4
|
68.9 MB
|
Adversarial Resilience at the Planetary Scale.mp4
|
90.7 MB
|
Analysis of The BroBot DDOS Attack.mp4
|
105.2 MB
|
Analyzing the Chemistry of Data.mp4
|
100.6 MB
|
Android Modding for the Security Practitioner.mp4
|
75.3 MB
|
Attacking Cloud Services with Source Code (2).mp4
|
66.8 MB
|
Attacking Cloud Services with Source Code.mp4
|
80.6 MB
|
Avoiding Android App Security Pitfalls.mp4
|
52.8 MB
|
Big Data Big Liability!.mp4
|
80.7 MB
|
Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques.mp4
|
97.1 MB
|
Blitzing with your Defense.mp4
|
108.3 MB
|
Bring Your Own Device Keeping it Simple and Effective.mp4
|
106.7 MB
|
Browser Extensions - The Backdoor To Stealth Malware.mp4
|
130.1 MB
|
Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4
|
114.3 MB
|
Building Your Own Packet Capture Platform.mp4
|
117.6 MB
|
BYOD - The Risks, Rewards and Challenges.mp4
|
95.3 MB
|
ColdFusion for Penetration Testers.mp4
|
190.0 MB
|
Covering your aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS.mp4
|
86.1 MB
|
Data Breach - Let The Finger Pointing Begin.mp4
|
123.3 MB
|
Distributed Security Expanding the Toolkit for Institutional Resilience.mp4
|
107.2 MB
|
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics).mp4
|
135.1 MB
|
Games We Play Payoffs & Chaos Monkeys.mp4
|
76.7 MB
|
Hacking Back is a Bad Idea.mp4
|
68.4 MB
|
Hiring Recruitment.mp4
|
167.9 MB
|
Inside the Black Hole Exploit Kit (BHEK).mp4
|
82.1 MB
|
Insider Threat Hunting for Authorized Evil.mp4
|
86.9 MB
|
JavaScript Pitfalls.mp4
|
110.4 MB
|
Just Another Day at the Office... September 11, 2001, The White House.mp4
|
118.1 MB
|
Keynote Andy Ellis.mp4
|
92.5 MB
|
Keynote Dan Geer & Richard Thieme.mp4
|
81.1 MB
|
Keynote Gene Kim.mp4
|
53.5 MB
|
Lessons Of Binary Analysis.mp4
|
245.2 MB
|
Lessons of the Kobayashi Maru If You re Not Cheating, You re Not Trying.mp4
|
66.8 MB
|
Leveraging Collective Intelligence To Combat Cyber Crime.mp4
|
182.3 MB
|
Mapping And Evolution Of Android Permissions.mp4
|
109.8 MB
|
PLC SCADA Vulnerabilities in Correctional Facilities.mp4
|
122.2 MB
|
Practical Exploitation of Embedded Systems.mp4
|
88.2 MB
|
Privacy at the Border A Guide for Traveling with Devices.mp4
|
113.9 MB
|
Proactive Defense.mp4
|
123.8 MB
|
Protecting sensitive information on iOS devices.mp4
|
111.7 MB
|
Pwnie Express presents Practical MitM Pentesting.mp4
|
89.6 MB
|
RESTful Services, The Web Security Blind Spot.mp4
|
109.5 MB
|
Rise In ATM Compromises.mp4
|
55.5 MB
|
Scoring PDF Structure To Detect Malicious Files.mp4
|
71.2 MB
|
Strategic Analysis of the iOS Jailbreak Development Community.mp4
|
82.4 MB
|
Suicide Risk Assessment and Intervention Tactics.mp4
|
98.4 MB
|
The Base Rate Fallacy Information Security Needs To Understand This..mp4
|
102.6 MB
|
The Interim Years Of Cyberspace - Security In A Domain Of Warfare.mp4
|
101.4 MB
|
Theory and Application of Realistic Capture the Flag Competitions.mp4
|
91.5 MB
|
Unified Communications Information Loss Through the Front Door.mp4
|
124.9 MB
|
Vulnerabilities of Control Systems in Drinking Water Utilities.mp4
|
208.3 MB
|
We See The Future And It s Not Pretty.mp4
|
114.0 MB
|
Why Developers And Vulnerability Researchers Should Collaborate.mp4
|
74.1 MB
|
Your PCI Assessor Best Friend or Worst Enemy You Choose....mp4
|
86.7 MB
|
/
|
SOURCE thank you.txt
|
0.6 KB
|
Total files 235
|