Jump to content
pyth0n3

DOJOCON 2010 Videos

Recommended Posts

Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping

John Strauchs, @strauchs: Security and IT Convergence

Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in Information Security Work

Jon McCoy: Ninja Patching .NET

Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending You Network using Nepenthes/Shaolin Tools

Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn Your Victims

Brian Baskin, @bbaskin: P2P Forensics

Brian Baskin, @bbaskin: Internationalized Domain Names & Investigations in the Networked World

Deviant Ollam, @deviantollam: Don't Punch My Junk

Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes

Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap

Ben Smith: Printer Exploitation

Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?

Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS Dead?

Chris Nickerson, @indi303: The State of (In)Security

Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk Professions

Michael Smith, @rybolov: DDoS

Source: Irongeek

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...