DEF CON 9 audio/DEF CON 9 Hacking Conference Awards Ceremony - Audio.m4b
2.63MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation - Credit Card - Audio.m4b
4.61MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation - Cyberethical Survivor - Audio.m4b
6.85MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Adam Bresson - Data Mining with PHP - Audio.m4b
3.57MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Anders Ingeborn - Designing Small Payloads - Audio.m4b
2.84MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Barry Stiefel - NAT for Newbies and Not-So-Newbies - Audio.m4b
7.05MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Biing Jong Lin And Chieh Chun Lin And Jan Che Su - Survey of Country-Wide Web Server Security - Audio.m4b
2.9MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Brenno de Winter - IPV6 Security - Audio.m4b
2.58MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Bruce Potter and Adam - The Captive Portal - Audio.m4b
4.39MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Bruce Schneier - Bruce Schneier Answers Questions - Audio.m4b
4.7MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Bryan Glancey - Weakest Link - Audio.m4b
5.57MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By CDC - Audio.m4b
4.89MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Cyrus Peikari - An Open Source International Attenuated Computer Virus - Audio.m4b
3.24MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Dan Kaminsky - Gateway Cryptography - Audio.m4b
4.05MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Dan Moniz - The Impact of P2P on Security in the Enterprise - Audio.m4b
2.49MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Dario Diaz - Digital Millenium Copyright Act - Audio.m4b
3.84MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Defendant - So You Got Your Lame Ass Sued - Audio.m4b
4.28MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Dennis Salguero - The Business Side of Starting Your Own Consulting Firm and How They Can Succeed - Audio.m4b
2.51MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Dmitry Skylarov - eBooks Security Theory and Practice - Audio.m4b
3.13MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Enrique Sanchez - Distributed Intrusion Detection System Evasion - Audio.m4b
2.67MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Freaky - OSX and Macintosh Security - Audio.m4b
3.5MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By HC - NTFS Alternate Data Streams - Audio.m4b
2.94MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Ian Goldberg - Arranging an Anonymous Rendezvous - Audio.m4b
4.5MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Jason Peel - Cypherpunk Grade Covert Network Channels - Audio.m4b
4.28MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Jay Beale - Attacking and Securing RedHat - Audio.m4b
4.12MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Jennifer Granick - European Cybercrime Treaty - Audio.m4b
3.8MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Jim Christy - Meet the FED Panel - Audio.m4b
5.21MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By John Dodge And Bernadette Schell - Laurentian University Hacker Study Update - Audio.m4b
4.25MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By K2 - Polymorphic Shell Code API - Audio.m4b
5.73MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Keith Nugent - Windows 2000 Security - Audio.m4b
8.25MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Kevin McPeake - Audio.m4b
6.69MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Len Sassaman - What is SSL a CA and FreeCert - Audio.m4b
3.57MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Lile Elam - Renagade Wireless Networks - Audio.m4b
4.88MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Marcus Andersson - Firewalling Wireless Devices - Audio.m4b
4.09MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Mark Grimes - TCPIP Intelligent Agents The Future of Electronic Warfare and Defense - Audio.m4b
5.72MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Michael Wilson - Hacker Doctrine in Information Warfare - Audio.m4b
4.1MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Nick Farr - Designing Secure Interfaces for Dummies - Audio.m4b
4.34MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Ofir Arkin - Introducing X Playing Tricks With ICMP - Audio.m4b
4.38MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Optyx - Kernel Intrusion System - Audio.m4b
2.72MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Peter Shipley - 802.11b War Driving and LAN Jacking - Audio.m4b
4.89MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Phil King - 8 bits and 8 pins More Fun with Microcontroller Hacking - Audio.m4b
4.74MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Raven Alder - A Perl Script That Tracks DoS Attacks Across Cisco Backbones - Audio.m4b
2.96MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Richard Thieme - Hacking a Trans-Planetary Net - Audio.m4b
5.68MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Rob Schein - Evaluating VPN Solutions - Audio.m4b
6.53MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Robert Graham - The Principals of Cyber-Anarchy - Audio.m4b
2.84MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Robert Grill And Michael Cohen - Windows NT and Novell Host Based Intrusion Detection - Audio.m4b
3.14MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Robert Muncy - Securing Cisco Routers - Audio.m4b
2.41MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Ryan Lackey - HavenCo One Year Later - Audio.m4b
4.23MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Sharad - Security & Privacy are Critically Important Issues in Todays Digitally Connected Age - Audio.m4b
4.02MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Shatter - FAQ The Newbies - Audio.m4b
4.62MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Simple Nomad - Widdershins De-evolution and the Politics of Technology - Audio.m4b
4.19MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Stephen Hsu - IP Spoofing and Strong Encryption in Service of a Free Internet - Audio.m4b
2.91MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Technodragon - Hardware Mods - Audio.m4b
4.54MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Thomas Munn - Using OpenBSD Snort Linux and A Few Other Tricks To Set Up A Transparent ACTIVE IDS - Audio.m4b
4.3MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Thor - Grabbing User Credentials via W2k ODBC Libraries - Audio.m4b
2.93MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By Tim Mullen- Audio.m4b
2.18MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By White Knight - Audio.m4b
2.7MB
DEF CON 9 audio/DEF CON 9 Hacking Conference Presentation By William Tafoya - Hacking the Mind - Audio.m4b
3.74MB
DEF CON 9 audio/DEF CON Hacking Conference Presentation By FX - Attacking Control Routing and Tunneling Protocols - Audio.m4b
3.49MB
DEF CON 9 logos/DEF CON 9 - 99thbone-dc-9-1.jpg
19.49KB
DEF CON 9 logos/DEF CON 9 - AdrenelineRush-dc-9-1.jpg
18.21KB
DEF CON 9 logos/DEF CON 9 - Almus-dc-9-1.gif
16.08KB
DEF CON 9 logos/DEF CON 9 - Almus-dc-9-2.gif
74.08KB
DEF CON 9 logos/DEF CON 9 - CelticRaven-dc-9-1.gif
64.07KB
DEF CON 9 logos/DEF CON 9 - Cyberpir8-dc-9-4.jpg
177.35KB
DEF CON 9 logos/DEF CON 9 - DarthLordViper-dc-9-1.jpg
17.85KB
DEF CON 9 logos/DEF CON 9 - Devil-Dust-dc-9-1.gif
23.01KB
DEF CON 9 logos/DEF CON 9 - FIBEROPTIC-dc-9-1.jpg
215.13KB
DEF CON 9 logos/DEF CON 9 - Froggy-dc-9-3.jpg
28.58KB
DEF CON 9 logos/DEF CON 9 - Gakker-dc-9-1.gif
9.28KB
DEF CON 9 logos/DEF CON 9 - GriffJon-dc-9-1.jpg
99.99KB
DEF CON 9 logos/DEF CON 9 - GriffJon-dc-9-2.jpg
12.26KB
DEF CON 9 logos/DEF CON 9 - GriffJon-dc-9-3.jpg
47.74KB
DEF CON 9 logos/DEF CON 9 - Hei-di-dc-9-3.jpg
36.87KB
DEF CON 9 logos/DEF CON 9 - JediBob1-dc-9-1.gif
26.73KB
DEF CON 9 logos/DEF CON 9 - JustaBill-dc-9-1.gif
11.85KB
DEF CON 9 logos/DEF CON 9 - LoRd-dc-9-1.jpg
27.38KB
DEF CON 9 logos/DEF CON 9 - MemphisMojo-dc-9-1.gif
8.83KB
DEF CON 9 logos/DEF CON 9 - Mikel-dc-9-1.jpg
35.75KB
DEF CON 9 logos/DEF CON 9 - MindShadow-dc-9-1.gif
1.67KB
DEF CON 9 logos/DEF CON 9 - RaT-dc-9-1.gif
14.32KB
DEF CON 9 logos/DEF CON 9 - Rogue-AI-dc-9-1.jpg
84.23KB
DEF CON 9 logos/DEF CON 9 - Sucoyant-dc-9-1.jpg
33.43KB
DEF CON 9 logos/DEF CON 9 - apollyon-dc-9-1.gif
32.2KB
DEF CON 9 logos/DEF CON 9 - aristides-dc-9-1.jpg
8.31KB
DEF CON 9 logos/DEF CON 9 - aristides-dc-9-2.jpg
8.32KB
DEF CON 9 logos/DEF CON 9 - ax0n-dc-9-1.gif
5.46KB
DEF CON 9 logos/DEF CON 9 - bad-ger-dc-9-1.gif
16.37KB
DEF CON 9 logos/DEF CON 9 - bad-ger-dc-9-2.gif
13.78KB
DEF CON 9 logos/DEF CON 9 - boogah-dc-9-3.gif
32.2KB
DEF CON 9 logos/DEF CON 9 - boogah-dc-9-4.gif
37.39KB
DEF CON 9 logos/DEF CON 9 - boogah-dc-9-5.gif
27.8KB
DEF CON 9 logos/DEF CON 9 - cyberpir8-dc-9-1.jpg
137.81KB
DEF CON 9 logos/DEF CON 9 - cyberpir8-dc-9-2.jpg
171.65KB
DEF CON 9 logos/DEF CON 9 - cyberpir8-dc-9-3.jpg
31.74KB
DEF CON 9 logos/DEF CON 9 - cypri0ss-dc-9-1.jpg
142.29KB
DEF CON 9 logos/DEF CON 9 - dc-9-invader-1.gif
40.97KB
DEF CON 9 logos/DEF CON 9 - dc-9-node-1.jpg
21.25KB
DEF CON 9 logos/DEF CON 9 - dcon9-vapor1.gif
18.67KB
DEF CON 9 logos/DEF CON 9 - deciple51-dc-9-1.gif
4.49KB
DEF CON 9 logos/DEF CON 9 - defhal.jpg
52.06KB
DEF CON 9 logos/DEF CON 9 - delirious-dc-9-1.jpg
26.5KB
DEF CON 9 logos/DEF CON 9 - enemydj-dc-9-1.jpg
53.99KB
DEF CON 9 logos/DEF CON 9 - enemydj-dc-9-2.jpg
72.27KB
DEF CON 9 logos/DEF CON 9 - enemydj-dc-9-3.jpg
60.27KB
DEF CON 9 logos/DEF CON 9 - flip-matrix-dc-9-1.jpg
52.99KB
DEF CON 9 logos/DEF CON 9 - froggy-dc-9-1.jpg
21.88KB
DEF CON 9 logos/DEF CON 9 - froggy-dc-9-2.jpg
12.8KB
DEF CON 9 logos/DEF CON 9 - goddess-dc-9-1.jpg
17.52KB
DEF CON 9 logos/DEF CON 9 - hei-di-dc-9-1.jpg
36.87KB
DEF CON 9 logos/DEF CON 9 - hei-di-dc-9-2.jpg
40.85KB
DEF CON 9 logos/DEF CON 9 - jinx-dc-9-1.jpg
34.13KB
DEF CON 9 logos/DEF CON 9 - krI5-dc-9-1.jpg
17.99KB
DEF CON 9 logos/DEF CON 9 - krI5-dc-9-2.jpg
65.46KB
DEF CON 9 logos/DEF CON 9 - l-garner-dc-9-1.gif
106.22KB
DEF CON 9 logos/DEF CON 9 - leash-dc-9-1.gif
4.94KB
DEF CON 9 logos/DEF CON 9 - linerror-DC-9-1.jpg
64.59KB
DEF CON 9 logos/DEF CON 9 - lord-dc-9-2.jpg
13.67KB
DEF CON 9 logos/DEF CON 9 - luxx-dc-9-1.GIF
3.39KB
DEF CON 9 logos/DEF CON 9 - luxx-dc-9-2.GIF
4.83KB
DEF CON 9 logos/DEF CON 9 - mr-candyman-dc-9-1.jpg
23.22KB
DEF CON 9 logos/DEF CON 9 - null-fusion-dc-9-1.gif
29.76KB
DEF CON 9 logos/DEF CON 9 - null-fusion-dc-9-2.gif
29.56KB
DEF CON 9 logos/DEF CON 9 - pid0-dc-9-1.jpg
22.16KB
DEF CON 9 logos/DEF CON 9 - pinky-dc-9-1.jpg
74.28KB
DEF CON 9 logos/DEF CON 9 - pinky-dc-9-2.jpg
187.92KB
DEF CON 9 logos/DEF CON 9 - prodigen-dc-9-1.jpg
21.4KB
DEF CON 9 logos/DEF CON 9 - radioacti-dc-9-1.gif
102.62KB
DEF CON 9 logos/DEF CON 9 - rat-dc-9-1.jpg
17.04KB
DEF CON 9 logos/DEF CON 9 - reptile-dc-9-1.jpg
25.1KB
DEF CON 9 logos/DEF CON 9 - reptile-dc-9-2.jpg
17.08KB
DEF CON 9 logos/DEF CON 9 - revlust-dc-9-1.gif
18.06KB
DEF CON 9 logos/DEF CON 9 - revlust-dc-9-2.gif
591.25KB
DEF CON 9 logos/DEF CON 9 - revlust-dc-9-4.gif
414.2KB
DEF CON 9 logos/DEF CON 9 - sohail-dc-9-1.jpg
44.99KB
DEF CON 9 logos/DEF CON 9 - swoop-dc-9-1.JPG
16.99KB
DEF CON 9 logos/DEF CON 9 - syntax-dc-9-1.jpg
29.07KB
DEF CON 9 logos/DEF CON 9 - theMedik-dc-9-1.gif
1.29KB
DEF CON 9 logos/DEF CON 9 - theMedik-dc-9-2.jpg
55.95KB
DEF CON 9 logos/DEF CON 9 - theMedik-dc-9-3.jpg
34.11KB
DEF CON 9 logos/DEF CON 9 - theORB-dc-9-1.gif
9.93KB
DEF CON 9 logos/DEF CON 9 - theORB-dc-9-3.gif
78.22KB
DEF CON 9 logos/DEF CON 9 - theORG-dc-9-2.gif
9.33KB
DEF CON 9 logos/DEF CON 9 - vapor-dc-9-1.gif
18.67KB
DEF CON 9 logos/DEF CON 9 - xiqtion-dc-9-1.jpg
31.86KB
DEF CON 9 logos/DEF CON 9 - xiqtion-dc-9-2.jpg
92.32KB
DEF CON 9 logos/DEF CON 9 - xr0x-dc-9-1.jpg
72.24KB
DEF CON 9 logos/DEF CON 9 - zcero-dc-9-1.jpg
31.7KB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Friday 01 Minibosses.m4a
67.7MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Friday 02 DJ Slow Monkey.m4a
103.28MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 01 Iceberg.m4a
64.62MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 02 Felix K.m4a
86.36MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 03 Yellowsmiley.m4a
60.43MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 04 Jackalope.m4a
91.8MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 05 DJ CMOS.m4a
31.04MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 06 DJ WYSE.m4a
33.81MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 07 Corrupt Data.m4a
92.5MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 08 Kris Klink.m4a
88.63MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 09 Dr Shadowvex.m4a
88.78MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 10 Psytrip.m4a
88.04MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 11 Max.m4a
105.73MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 12 Thomas Ocrens.m4a
40.34MB
DEF CON 9 music/DEF CON 9 Live Music - aac 224k/DEF CON 9 Hacking Music - Saturday 13 Winamute.m4a
98.98MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Friday 01 Minibosses.flac
217.88MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Friday 02 DJ Slow Monkey.flac
375.98MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 01 Iceberg.flac
235.32MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 02 Felix K.flac
175.3MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 03 Yellowsmiley.flac
236.71MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 04 Jackalope.flac
337.77MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 05 DJ CMOS.flac
117.35MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 06 DJ WYSE.flac
91.72MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 07 Corrupt Data.flac
360.51MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 08 Kris Klink.flac
364.34MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 09 Dr Shadowvex.flac
336.29MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 10 Psytrip.flac
305.93MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 11 Max.flac
359.37MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 12 Thomas Ocrens.flac
133.28MB
DEF CON 9 music/DEF CON 9 Live Music - flac/DEF CON 9 Hacking Music - Saturday 13 Winamute.flac
340.07MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Friday 01 Minibosses.opus
77.75MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Friday 02 DJ Slow Monkey.opus
115.07MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 01 Iceberg.opus
73.71MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 02 Felix K.opus
189.88MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 03 Yellowsmiley.opus
66.34MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 04 Jackalope.opus
107.27MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 05 DJ CMOS.opus
34.41MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 06 DJ WYSE.opus
41.86MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 07 Corrupt Data.opus
112.92MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 08 Kris Klink.opus
102.23MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 09 Dr Shadowvex.opus
105.14MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 10 Psytrip.opus
105.57MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 11 Max.opus
133.33MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 12 Thomas Ocrens.opus
44.5MB
DEF CON 9 music/DEF CON 9 Live Music - opus 256k/DEF CON 9 Hacking Music - Saturday 13 Winamute.opus
118.55MB
DEF CON 9 open letter to the community.txt
11.58KB
DEF CON 9 pictures/DEF CON 9 - dc1.jpg
113.04KB
DEF CON 9 pictures/DEF CON 9 - dc10.jpg
81.34KB
DEF CON 9 pictures/DEF CON 9 - dc11.jpg
89.38KB
DEF CON 9 pictures/DEF CON 9 - dc12.jpg
69.04KB
DEF CON 9 pictures/DEF CON 9 - dc13.jpg
48.53KB
DEF CON 9 pictures/DEF CON 9 - dc14.jpg
45.69KB
DEF CON 9 pictures/DEF CON 9 - dc2.jpg
110.5KB
DEF CON 9 pictures/DEF CON 9 - dc3.jpg
89.23KB
DEF CON 9 pictures/DEF CON 9 - dc4.jpg
108.1KB
DEF CON 9 pictures/DEF CON 9 - dc5.jpg
83.08KB
DEF CON 9 pictures/DEF CON 9 - dc6.jpg
104.79KB
DEF CON 9 pictures/DEF CON 9 - dc7.jpg
39.1KB
DEF CON 9 pictures/DEF CON 9 - dc8.jpg
78.43KB
DEF CON 9 pictures/DEF CON 9 - dc9.jpg
159.69KB
DEF CON 9 pictures/DEF CON 9 - ntf1.jpg
86.86KB
DEF CON 9 pictures/DEF CON 9 - ntf2.jpg
74.31KB
DEF CON 9 program.pdf
20.21MB
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation - Credit Card - Video.mp4
61.28MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation - Cyberethical Survivor - Video.mp4
78.56MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Adam Bresson - Data Mining with PHP - Video.mp4
42.12MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Anders Ingeborn - Designing Small Payloads - Video.mp4
41.91MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Barry Stiefel - NAT for Newbies and Not-So-Newbies - Video.mp4
105.97MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Biing Jong Lin And Chieh Chun Lin And Jan Che Su - Survey of Country-Wide Web Server Security - Video.mp4
34.8MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Brenno de Winter - IPV6 Security - Video.mp4
31MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Bruce Schneier - Bruce Schneier Answers Questions - Video.mp4
45.53MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Bryan Glancey - Weakest Link - Video.mp4
78.65MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By CDC - Video.mp4
46.72MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Cyrus Peikari - An Open Source International Attenuated Computer Virus - Video.mp4
46.56MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Dan Kaminsky - Gateway Cryptography - Video.mp4
55.59MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Dario Diaz - Digital Millenium Copyright Act - Video.mp4
69.8MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Defendant - So You Got Your Lame Ass Sued - Video.mp4
64.93MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Dennis Salguero - The Business Side of Starting Your Own Consulting Firm and How They Can Succeed - Video.mp4
37.3MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Enrique Sanchez - Distributed Intrusion Detection System Evasion - Video.mp4
26.84MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By FX - Attacking Control Routing and Tunneling Protocols - Video.mp4
43.54MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Freaky - OSX and Macintosh Security - Video.mp4
65.91MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Ian Goldberg - Arranging an Anonymous Rendezvous - Video.mp4
43.78MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Jason Peel - Cypherpunk Grade Covert Network Channels - Video.mp4
85.68MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Jay Beale - Attacking and Securing RedHat - Video.mp4
56.43MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Jennifer Granick - European Cybercrime Treaty - Video.mp4
55.63MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Jim Christy - Meet the FED Panel - Video.mp4
56.02MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By K2 - Polymorphic Shell Code API - Video.mp4
71.78MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Keith Nugent - Windows 2000 Security - Video.mp4
94.75MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Kevin McPeake - Video.mp4
92.93MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Len Sassaman - What is SSL a CA and FreeCert - Video.mp4
60.59MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Marcus Andersson - Firewalling Wireless Devices - Video.mp4
54.29MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Mark Grimes - TCPIP Intelligent Agents The Future of Electronic Warfare and Defense - Video.mp4
57.65MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Michael Wilson - Hacker Doctrine in Information Warfare - Video.mp4
62.51MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Nick Farr - Designing Secure Interfaces for Dummies - Video.mp4
45.19MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Ofir Arkin - Introducing X Playing Tricks With ICMP - Video.mp4
50.88MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Optyx - Kernel Intrusion System - Video.mp4
38.6MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Peter Shipley - 802.11b War Driving and LAN Jacking - Video.mp4
57.58MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Phil King - 8 bits and 8 pins More Fun with Microcontroller Hacking - Video.mp4
75.8MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Raven Alder - A Perl Script That Tracks DoS Attacks Across Cisco Backbones - Video.mp4
45.67MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Richard Thieme - Hacking a Trans-Planetary Net - Video.mp4
79.12MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Rob Schein - Evaluating VPN Solutions - Video.mp4
71.62MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Robert Graham - The Principals of Cyber-Anarchy - Video.mp4
33.29MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Robert Grill And Michael Cohen - Windows NT and Novell Host Based Intrusion Detection - Video.mp4
38.59MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Robert Muncy - Securing Cisco Routers - Video.mp4
38.07MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Sharad - Security & Privacy are Critically Important Issues in Todays Digitally Connected Age - Video.mp4
54.4MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Shatter - FAQ The Newbies - Video.mp4
66.75MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Simple Nomad - Widdershins De-evolution and the Politics of Technology - Video.mp4
39.72MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Technodragon - Hardware Mods - Video.mp4
48.53MB
W3siaWQiOiJleG9jX2JfUExBWSIsImFkc3BvdCI6ImJfUExBWSIsIndlaWdodCI6IjEiLCJmY2FwIjpmYWxzZSwic2NoZWR1bGUiOmZhbHNlLCJtYXhXaWR0aCI6ZmFsc2UsIm1pbldpZHRoIjpmYWxzZSwidGltZXpvbmUiOmZhbHNlLCJleGNsdWRlIjpmYWxzZSwiZG9tYWluIjpmYWxzZSwiY29kZSI6IjwhLS1cclxuPGEgaHJlZj1cImh0dHBzOlwvXC9zeW5kaWNhdGlvbi5keW5zcnZ0YmcuY29tXC9zcGxhc2gucGhwP2lkem9uZT0xOTYxMDkyJnJldHVybl91cmw9aHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2J0c1wiICBjbGFzcz1cImJ0biBidG4td2FybmluZ1wiIHRhcmdldD1cIl9ibGFua1wiPjxzcGFuIGNsYXNzPVwiZ2x5cGhpY29uIGdseXBoaWNvbi1wbGF5XCI+PFwvc3Bhbj4gUGxheSBOb3c8XC9hPlxyXG4tLT4ifV0=
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Thomas Munn - Using OpenBSD Snort Linux and A Few Other Tricks To Set Up A Transparent ACTIVE IDS - Video.mp4
52.61MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Thor - Grabbing User Credentials via W2k ODBC Libraries - Video.mp4
39.9MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By Tim Mullen - Video.mp4
24.69MB
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
DEF CON 9 video/DEF CON 9 Hacking Conference Presentation By William Tafoya - Hacking the Mind - Video.mp4
40.2MB
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