Defcon

Results: 69



#Item
41Medical terms / Cardiac electrophysiology / Defibrillation / Medical device / Patient safety / Vulnerability / Medicine / Health / Medical equipment

JUST WHAT THE DOCTOR ORDERED? SCOTT ERVEN Founder/President – SecMedic @scotterven SHAWN MERDINGER

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2014-08-22 21:55:50
42Computing / Cyberterrorism / Cyberwarfare / Border Gateway Protocol / Newbie / Looking Glass / Internet / Digital media / Computer crimes

Through the lookingglass, and what Eve found there

Add to Reading List

Source URL: media.defcon.org

Language: English - Date: 2014-07-19 21:02:14
43

DEFCON CTF ’08 Binary 400 FreeBSD 6.x Kernel Module Hacking Binary 400: http://nopsr.us/ctf2008qual/reversing400-b05c8059389c8ade8e1a10314f458be5

Add to Reading List

Source URL: ruffnex.oc.to

Language: Japanese - Date: 2009-01-21 11:21:57
    44System Shock / Software testing / SHODAN / Penetration test / Firefox / Bing / Software / Free software / Michael Schearer

    SHODAN for Penetration Testers

    Add to Reading List

    Source URL: www.defcon.org

    Language: English - Date: 2010-08-20 14:22:44
    45

    世界最高峰のセキュリティコンテスト DEFCON CTFとは ネットエージェント株式会社 愛甲健二 自己紹介

    Add to Reading List

    Source URL: ruffnex.oc.to

    Language: Japanese - Date: 2011-02-07 19:33:23
      46Secure communication / Electronic commerce / Certificate authorities / Comodo Group / HTTP Secure / StartCom / Public key certificate / Code signing / Cryptography / Public-key cryptography / Key management

      Criminal Charges are not pursued: Hacking PKI

      Add to Reading List

      Source URL: www.defcon.org

      Language: English - Date: 2009-08-21 16:17:22
      47Network architecture / TCP/IP stack fingerprinting / TCP/IP / Transmission Control Protocol / Port knocking / P0f / Ip / Port / SYN cookies / Computer network security / Computing / Internet

      Advanced Netfilter: Content Replacement (ala  Snort_inline) and Combining Port Knocking with  p0f Michael Rash DEFCON 12

      Add to Reading List

      Source URL: www.cipherdyne.org

      Language: English - Date: 2013-11-03 15:37:36
      48

      Attacking the Internet of Things using Time

      Add to Reading List

      Source URL: defcon.org

      - Date: 2014-08-22 21:56:57
        49Software / Unified Extensible Firmware Interface / Booting / Advanced Configuration and Power Interface / Personal computer hardware / Windows Vista startup process / Windows 8 / Unified EFI Forum / Coreboot / BIOS / System software / Computing

        Summary of Attacks Against BIOS and Secure Boot Yuriy Bulygin, John Loucaides, Andrew Furtak, Oleksandr Bazhaniuk, Alexander Matrosov Intel Security

        Add to Reading List

        Source URL: www.defcon.org

        Language: English - Date: 2014-09-11 00:12:09
        50Domain name system / Computer network security / Internet protocols / Email / Virtual hosting / Name server / Network address translation / Metasploit Project / HD Moore / Internet / Computing / Network architecture

        Tactical Exploitation ”The Other Way to Pen-Test” http://metasploit.com/confs/ H D Moore (hdm[at]metasploit.com)

        Add to Reading List

        Source URL: www.defcon.org

        Language: English - Date: 2009-11-16 20:47:36
        UPDATE