Jump to content
pyth0n3

DOJOCON 2010 Videos

Recommended Posts

Posted

Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping

John Strauchs, @strauchs: Security and IT Convergence

Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in Information Security Work

Jon McCoy: Ninja Patching .NET

Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending You Network using Nepenthes/Shaolin Tools

Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn Your Victims

Brian Baskin, @bbaskin: P2P Forensics

Brian Baskin, @bbaskin: Internationalized Domain Names & Investigations in the Networked World

Deviant Ollam, @deviantollam: Don't Punch My Junk

Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes

Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap

Ben Smith: Printer Exploitation

Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?

Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS Dead?

Chris Nickerson, @indi303: The State of (In)Security

Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk Professions

Michael Smith, @rybolov: DDoS

Source: Irongeek

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...