1 |
 |
Shmoocon 2012: All Your Codes Belong To Me! |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
6352 |
None |
2 |
 |
Shmoocon 2012: Part 1 Doing Infosec Right |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5657 |
1 |
3 |
 |
Shmoocon 2012: 0wn The Con |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5257 |
None |
4 |
 |
Shmoocon 2012: 37mm Aerial Surveillance: Romance Between A Camera And A Flare Launcher |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5569 |
None |
5 |
 |
Shmoocon 2012: A Fistful Of Fire Hoses: Putting Out Fires Without Crossing Streams Steve Werby |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4936 |
None |
6 |
 |
Shmoocon 2012: And That's How I Didn't Lose An Eye: Emergency Data Destruction |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5052 |
None |
7 |
 |
Shmoocon 2012: Attacking Proximity Card Access Systems |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
6041 |
None |
8 |
 |
Shmoocon 2012: Cyber Fast Track |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5151 |
None |
9 |
 |
Shmoocon 2012: Encryption, Passwords And Data Security: The Latest On The Law And Best Practices |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5217 |
None |
10 |
 |
Shmoocon 2012: Inside Apple's Mdm Black Box |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5788 |
None |
11 |
 |
Shmoocon 2012: Inside The Ooda Loop - Towards An Aggressive Defense |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5285 |
None |
12 |
 |
Shmoocon 2012: Intro To Near Field Communication (Nfc) Mobile Security |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5552 |
None |
13 |
 |
Shmoocon 2012: A Blackhat.S Tool Chest: How We Tear Into That Little Green Man |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5108 |
None |
14 |
 |
Shmoocon 2012: Java Backdoors And Cross Framework Abuse |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5110 |
None |
15 |
 |
Shmoocon 2012: Lessons Of The Kobayashi Maru: Cheating Is Fundamental |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5386 |
None |
16 |
 |
Shmoocon 2012: Malware As Art: Building And Animating Malware Network Graphs |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4865 |
None |
17 |
 |
Shmoocon 2012: New Cool Crypto |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5264 |
None |
18 |
 |
Shmoocon 2012: Android Mind Reading: Memory Acquisition And Analysis With Dmd And Volatility |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5339 |
None |
19 |
 |
Shmoocon 2012: Credit Card Fraud: The Contactless Generation |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5908 |
None |
20 |
 |
Shmoocon 2012: Building Measurement And Signature Intelligence (Masint) Capabilities On A Hacker.S |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5706 |
None |
21 |
 |
Shmoocon 2012: Soft Markers In Attack Attribution |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5327 |
None |
22 |
 |
Shmoocon 2012: Corrupting The Youth |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5458 |
None |
23 |
 |
Shmoocon 2012: Malware Visualization In 3d |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5644 |
None |
24 |
 |
Shmoocon 2012: Avm Inception: How We Can Use Avm Instrumenting In A Beneficial Way |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
6282 |
None |
25 |
 |
Shmoocon 2012: A New Model For Enterprise Defense |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5210 |
None |
26 |
 |
Shmoocon 2012: Ttl Of A Penetration |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5316 |
None |
27 |
 |
Shmoocon 2012: Keynote |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4742 |
None |
28 |
 |
Shmoocon 2012: Part 2 Doing Infosec Right |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4732 |
None |
29 |
 |
Shmoocon 2012: Ghz Or Bust! |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
5149 |
None |
30 |
 |
Shmoocon 2012: Destroying Evidence Before Its Evidence |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
6197 |
1 |
31 |
 |
Shmoocon 2012- The Shmoo Potter - Opening Remarks |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4473 |
None |
32 |
 |
Shmoocon 2012- The Shmoo Potter - Closing Remarks |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4383 |
None |
33 |
 |
Shmoocon 2012- Snscat: What You Don't Know About Sometimes Hurts The Most |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4555 |
None |
34 |
 |
Shmoocon 2012- Whack-A-Mobile: Getting A Handle On Mobile Testing With Mobisec Live Environment |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4726 |
None |
35 |
 |
Shmoocon 2012- Gathering All Of The Worlds Dns |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4805 |
None |
36 |
 |
Shmoocon 2012- Tracking Gps |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4655 |
None |
37 |
 |
Shmoocon 2012- Opfor Works Both Ways: How Offense And Defense Must Train Each Other |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4777 |
None |
38 |
 |
Shmoocon 2012- Sacrificial Computing For Land And Sky |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4454 |
None |
39 |
 |
Shmoocon 2012- The Science Of Insecurity |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4792 |
None |
40 |
 |
Shmoocon 2012- Raising The White Flag |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4576 |
None |
41 |
 |
Shmoocon 2012 - Firetalks |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4627 |
None |
42 |
 |
Shmoocon 2012 - Firetalks - 2 |
11 years, 2 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2012 |
4611 |
None |
43 |
 |
Shmoocon 2013 - Thin Slicing A Black Swan: A Search For The Unknowns |
10 years, 3 months |
Securitytube_Poster |
securitytube, shmoocon, shmoo con, hacking, hackers, information security, convention, computer security, shmoo 12, shmoocon 12, shmoocon-2013 |
2921 |
None |