ShmooCon

Results: 49



#Item
21Science / Information theory / Probability and statistics / Philosophy of thermal and statistical physics / Randomness / Entropy / Heuristic / Uncertainty / STING / Statistical theory / Thermodynamic entropy / Statistics

Simple entropy heuristics for log and traffic analysis Sergey Bratus Department of Computer Science Dartmouth College

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
22System software / Secure Shell / Port knocking / Firewall / Nmap / Vulnerability / OpenSSH / Exploit / Stateful firewall / Software / Computer network security / Computing

Advances In Single Packet Authorization Michael Rash Enterasys Networks, Inc. http://www.cipherdyne.org/ ShmooCon

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:38:56
23Antivirus software / Computing / Computer virus / Rootkit / Threat / Debugging / Software bug / Cyberwarfare / Computer security / Malware

Microsoft PowerPoint - shmoo-saffron.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:16
24Computer buses / ShmooCon / RS-422 / RS-485 / RS-232 / Differential signaling / Howell / Bus / Computer hardware / Electronic engineering / Electronics

What Is This? All Your Codes Belong To Me!! Keith Howell Electronics Engineer in the British Army Network Engineer and Security Engineer for UUNET Technologies

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2012-02-12 20:05:57
25Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Router / MD5 / IP hijacking / Network architecture / Internet / Computing

All your packets are belong to us – Attacking backbone technologies Daniel Mende & Enno Rey {dmende, erey}@ernw.de

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:40
26Data management / Computer network security / SQL / Netcat / Network management / Microsoft SQL Server / SQL injection / Penetration test / BackTrack / Computing / Software / Relational database management systems

Fast-Track Advanced penetration techniques made easy… February 7, 2009 securestate

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:38
27Computer network security / Botnets / Srizbi botnet / McColo / Rustock botnet / Mega-D botnet / Cutwail botnet / FireEye /  Inc. / Malware / Computing / Spamming / Multi-agent systems

The day the spam stood still  Julia Wolf (Fireeye, inc.)  Shmoocon Feb 6, [removed]

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:38
28Forensic science / Acquisition / Android / Computer security / Software / Digital forensics / Computing / Global Information Assurance Certification

Android Mind Reading: Memory Acquisition and Analysis with DMD and Volatility Joe Sylve [removed] @jtsylve

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2012-01-29 17:34:01
29Cryptographic hash functions / Salt / Rainbow table / Password cracking / Password / Dictionary attack / NTLM / Crack / MD5 / Cryptography / Computer security / Cyberwarfare

Enough with the Insanity Dictionary Based Rainbow Tables Matt Weir Florida State University Shmoocon 2009

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:40
30Software testing / Hacking / Cross-site scripting / SQL injection / Vulnerability / Privilege escalation / Computer network security / Patch / HP Application Security Center / Computer security / Cyberwarfare / Failure

Microsoft PowerPoint - shmoo2.ppt [Read-Only]

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:38:55
UPDATE