1 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/1868.jpg) |
Nullcon Goa 2011: Penetration Testing A Biometric System - By Rahul Sasi |
13 years, 2 months |
nullcon |
null, nullcon, security conference, conference, biometric, hardware, exploit, exploits, hacker, hack, hacking, exploitation, retina, fingerprint, scanner, scanning, biometrics |
8402 |
4 |
2 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/1882.jpg) |
Nullcon Goa 2011: Fuzzing With Complexities - By Vishwas Sharma |
13 years, 2 months |
nullcon |
null, nullcon, fuzz. fuzzer, fuzzing, fuzz testing, vulnerability, vulnerability research, vulnerabilities, exploit, security, conference, hacker, hacking, hack, hacker conference, security conference, buffer overflow, overflow |
8329 |
None |
3 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/1902.jpg) |
Nullcon Goa 2011: Exploiting Scada Systems - By Jeremy Brown |
13 years, 2 months |
nullcon |
null, nullcon, security, conference, security conference, hack, hacker, hacking, hacking conference, hacker conference, scada, exploit, exploitation, exploiting scada, scada systems, cyberwar, cyber warfare, information warfare, critical infrastructure, national critical infrastructure, scada security |
8121 |
1 |
4 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/2876.jpg) |
Hitb2011kul - Privacy, Secrecy, Freedom And Power |
12 years, 5 months |
Securitytube_Poster |
security conference, privacy, hitb |
3351 |
None |
5 |
![](http://videothumbs.securitytube.net.s3.amazonaws.com/2877.jpg) |
Hitb2011kul - Post Memory Corruption Analysis And Exploitation |
12 years, 5 months |
Securitytube_Poster |
security conference, hitb |
3963 |
None |