DEFCON 8 audio

Torrent Hash:
4BC44FD0E6A57DD92416D40C83A1CF7A6218AC72
Number of Files:
51
Content Size:
512.58MB
Convert On:
2014-11-10
Keywords:
Magnet Link:
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
File Name
Size
DEF CON 8 Hacking Conference Presentation By Sinister - Energy Weapons - Audio.m4b
16.84MB
DEF CON 8 Hacking Conference Presentation By Aaron Grothe - Tunneling and Firewalls - Audio.m4b
4.52MB
DEF CON 8 Hacking Conference Presentation By Adam Bresson - Palm Data Protection - Audio.m4b
11.62MB
DEF CON 8 Hacking Conference Presentation By Arthur Money - Meet The Fed Panel - Audio.m4b
14.26MB
DEF CON 8 Hacking Conference Presentation By Bennett Haselton - A Protocol That Uses Steganography to Circumvent Network Level Censorship - Audio.m4b
13.28MB
DEF CON 8 Hacking Conference Presentation By Blanu - Freenet - Audio.m4b
11.09MB
DEF CON 8 Hacking Conference Presentation By Bruce Schneir - Session - Audio.m4b
13.39MB
DEF CON 8 Hacking Conference Presentation By Chris Goggans - Lotus Domino Vulerabilities - Audio.m4b
12.65MB
DEF CON 8 Hacking Conference Presentation By D-Krypt Web Application Security - Audio.m4b
7.33MB
DEF CON 8 Hacking Conference Presentation By Daremoe - System Profiling Target Analysis or How Crackers Find You - Audio.m4b
8.17MB
DEF CON 8 Hacking Conference Presentation By David J DiCenso - The Citizen Hacker Patriot or War Criminal - Audio.m4b
9.2MB
DEF CON 8 Hacking Conference Presentation By DDT - What PGP and Crypo is and How to use it - Audio.m4b
12.65MB
DEF CON 8 Hacking Conference Presentation By Ender - Demonstration and Presentation of the Autonomous Nodes - Audio.m4b
6.4MB
DEF CON 8 Hacking Conference Presentation By Eric Sinrod - Federal Computer Fraud and Abuse Act - Audio.m4b
10.17MB
DEF CON 8 Hacking Conference Presentation By Evil Wrangler - Building Backdoor Binary Featuring SSH 2 0 13 - Audio.m4b
7.52MB
DEF CON 8 Hacking Conference Presentation By Freaky - Macintosh Security - Audio.m4b
12.19MB
DEF CON 8 Hacking Conference Presentation By Ghandi - Dotcom Smashing Buffer Overflows on the SPARC - Audio.m4b
9.34MB
DEF CON 8 Hacking Conference Presentation By Greg Hoglund - Advanced Buffer Overflow Techniques - Audio.m4b
12.41MB
DEF CON 8 Hacking Conference Presentation By Gregory B White - The USAFA cadet Hacking Case - Audio.m4b
2.44MB
DEF CON 8 Hacking Conference Presentation By Ian Goldberg - Using The Internet Pseudonymously 3 Its Alive - Audio.m4b
12.14MB
DEF CON 8 Hacking Conference Presentation By Ian Vitek - Configuring Linux 2 for IP Spoofing and Source Routing - Audio.m4b
5.32MB
DEF CON 8 Hacking Conference Presentation By Jason Scott - TEXTFILESDOTCON One Year Later - Audio.m4b
14.09MB
DEF CON 8 Hacking Conference Presentation By Jennifer Granick - The Law and Hacking - Audio.m4b
11.97MB
DEF CON 8 Hacking Conference Presentation By Jeru - Advanced Evasion of IDS Buffer Overflow Detection - Audio.m4b
3.45MB
DEF CON 8 Hacking Conference Presentation By Jim McCoy - Building the Mojo Nation - Audio.m4b
15.35MB
DEF CON 8 Hacking Conference Presentation By John Q Newman - 10 Steps You Can Take to Protect Your Privacy - Audio.m4b
11.03MB
DEF CON 8 Hacking Conference Presentation By John Q Newman - Fake ID by Mail and Modem - Audio.m4b
14.13MB
DEF CON 8 Hacking Conference Presentation By John S Flowers - Network IDS Do Not Fold Spindle or Mutilate - Audio.m4b
12.41MB
DEF CON 8 Hacking Conference Presentation By Jon Erickson - Number Theory Complexity Theory Cryptography and Quantum Computing - Audio.m4b
9.77MB
DEF CON 8 Hacking Conference Presentation By Kent Radek - Puzzlenet Designing an Anonymous Network - Audio.m4b
12.67MB
DEF CON 8 Hacking Conference Presentation By Legal Panel Discussion - Audio.m4b
13.02MB
DEF CON 8 Hacking Conference Presentation By Mike Scher - What is DNS - Audio.m4b
7.71MB
DEF CON 8 Hacking Conference Presentation By MR Mojo - Windows 2000 Security - Audio.m4b
11.12MB
DEF CON 8 Hacking Conference Presentation By MR Nasty - Using Tools to Obtain Recon on NT Networks - Audio.m4b
6.77MB
DEF CON 8 Hacking Conference Presentation By Mythandir - Penetrating B1 Trusted Operating Systems - Audio.m4b
10.16MB
DEF CON 8 Hacking Conference Presentation By Natasha Grigori - Hacktivist to Activsts Making the Transition - Audio.m4b
5.68MB
DEF CON 8 Hacking Conference Presentation By Noise - Anonymous Remailser The Importance of Widley Availabel Anonymity in an Age of Big Brother - Audio.m4b
9.34MB
DEF CON 8 Hacking Conference Presentation By Phil King - 8 bit Redux Microcntroller Hacking - Audio.m4b
8.96MB
DEF CON 8 Hacking Conference Presentation By Phillip J Loranger - Army Biometrics - Audio.m4b
11.35MB
DEF CON 8 Hacking Conference Presentation By Pyr0 - FAQ The Kiddies - Audio.m4b
9.72MB
DEF CON 8 Hacking Conference Presentation By Richard Thieme - Social Engineering at Defcon Games Hackers Play - Audio.m4b
7.63MB
DEF CON 8 Hacking Conference Presentation By Robert Graham - Evading Network Based Intrusion Detection Systems - Audio.m4b
10.78MB
DEF CON 8 Hacking Conference Presentation By Ron Moritz - Proactive Defense Against Malicious Code - Audio.m4b
9.77MB
DEF CON 8 Hacking Conference Presentation By Sarah Gordon - Virus Writers The End Of Innocence - Audio.m4b
7.86MB
DEF CON 8 Hacking Conference Presentation By Simple Nomad - A How to Regarding Network Mapping - Audio.m4b
9.33MB
DEF CON 8 Hacking Conference Presentation By Syke - Opensource Utilities and How to Use Them to Test IDSes and Firewalls - Audio.m4b
11.14MB
DEF CON 8 Hacking Conference Presentation By Thomas Munn - The Need For Home Based Firewalls - Audio.m4b
877.45KB
DEF CON 8 Hacking Conference Presentation By Tim Lawless - Saint Jude Modeling Detecting and Responding to Unauthorized Root Transitions - Audio.m4b
10.39MB
DEF CON 8 Hacking Conference Presentation By V1ru5 - More Lock Picking - Audio.m4b
12.16MB
DEF CON 8 Hacking Conference Presentation By V1ru5 - Updated Computer Virus Class - Audio.m4b
13.27MB
DEF CON 8 Hacking Conference Presentation By Xs - LDAP - Audio.m4b
7.76MB

Latest Search:

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