QR Code
Copy to Clipboard
Open with BT Client
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
W3siaWQiOiJqYXZfYl9NRF9CXzcyOHg5MCIsImFkc3BvdCI6ImJfTURfQl83Mjh4OTAiLCJ3ZWlnaHQiOiI1IiwiZmNhcCI6ZmFsc2UsInNjaGVkdWxlIjpmYWxzZSwibWF4V2lkdGgiOmZhbHNlLCJtaW5XaWR0aCI6Ijc2OCIsInRpbWV6b25lIjpmYWxzZSwiZXhjbHVkZSI6ZmFsc2UsImRvbWFpbiI6ZmFsc2UsImNvZGUiOiI8YSBocmVmPVwiaHR0cHM6XC9cL3RlbGxtZS5wd1wvZ29cL2phdlwiIHRhcmdldD1cIl9ibGFua1wiPjxpbWcgc3JjPVwiXC9hcHBcL2phdlwvVmlld1wvaW1nXC9iNzI4OTAuanBnXCIgd2lkdGg9XCI3MjhcIiBoZWlnaHQ9XCI5MFwiIGJvcmRlcj1cIjBcIj48XC9hPiJ9LHsiaWQiOiJqYXZ1X2JfTURfQl83Mjh4OTAiLCJhZHNwb3QiOiJiX01EX0JfNzI4eDkwIiwid2VpZ2h0IjoiNCIsImZjYXAiOmZhbHNlLCJzY2hlZHVsZSI6ZmFsc2UsIm1heFdpZHRoIjpmYWxzZSwibWluV2lkdGgiOiI3NjgiLCJ0aW1lem9uZSI6ZmFsc2UsImV4Y2x1ZGUiOmZhbHNlLCJkb21haW4iOmZhbHNlLCJjb2RlIjoiPGEgaHJlZj1cImh0dHBzOlwvXC90ZWxsbWUucHdcL2dvXC9qYXZ1XC9cIiB0YXJnZXQ9XCJfYmxhbmtcIj48aW1nIHNyYz1cIlwvYXBwXC9qYXZ1XC9WaWV3XC9pbWdcL2I3Mjg5MC5qcGdcIj48XC9hPiJ9XQ==
DEF CON 8 Hacking Conference Presentation By Sinister - Energy Weapons - Audio.m4b
16.84MB
DEF CON 8 Hacking Conference Presentation By Aaron Grothe - Tunneling and Firewalls - Audio.m4b
4.52MB
DEF CON 8 Hacking Conference Presentation By Adam Bresson - Palm Data Protection - Audio.m4b
11.62MB
DEF CON 8 Hacking Conference Presentation By Arthur Money - Meet The Fed Panel - Audio.m4b
14.26MB
DEF CON 8 Hacking Conference Presentation By Bennett Haselton - A Protocol That Uses Steganography to Circumvent Network Level Censorship - Audio.m4b
13.28MB
DEF CON 8 Hacking Conference Presentation By Blanu - Freenet - Audio.m4b
11.09MB
DEF CON 8 Hacking Conference Presentation By Bruce Schneir - Session - Audio.m4b
13.39MB
DEF CON 8 Hacking Conference Presentation By Chris Goggans - Lotus Domino Vulerabilities - Audio.m4b
12.65MB
DEF CON 8 Hacking Conference Presentation By D-Krypt Web Application Security - Audio.m4b
7.33MB
DEF CON 8 Hacking Conference Presentation By Daremoe - System Profiling Target Analysis or How Crackers Find You - Audio.m4b
8.17MB
DEF CON 8 Hacking Conference Presentation By David J DiCenso - The Citizen Hacker Patriot or War Criminal - Audio.m4b
9.2MB
DEF CON 8 Hacking Conference Presentation By DDT - What PGP and Crypo is and How to use it - Audio.m4b
12.65MB
DEF CON 8 Hacking Conference Presentation By Ender - Demonstration and Presentation of the Autonomous Nodes - Audio.m4b
6.4MB
DEF CON 8 Hacking Conference Presentation By Eric Sinrod - Federal Computer Fraud and Abuse Act - Audio.m4b
10.17MB
DEF CON 8 Hacking Conference Presentation By Evil Wrangler - Building Backdoor Binary Featuring SSH 2 0 13 - Audio.m4b
7.52MB
DEF CON 8 Hacking Conference Presentation By Freaky - Macintosh Security - Audio.m4b
12.19MB
DEF CON 8 Hacking Conference Presentation By Ghandi - Dotcom Smashing Buffer Overflows on the SPARC - Audio.m4b
9.34MB
DEF CON 8 Hacking Conference Presentation By Greg Hoglund - Advanced Buffer Overflow Techniques - Audio.m4b
12.41MB
DEF CON 8 Hacking Conference Presentation By Gregory B White - The USAFA cadet Hacking Case - Audio.m4b
2.44MB
DEF CON 8 Hacking Conference Presentation By Ian Goldberg - Using The Internet Pseudonymously 3 Its Alive - Audio.m4b
12.14MB
DEF CON 8 Hacking Conference Presentation By Ian Vitek - Configuring Linux 2 for IP Spoofing and Source Routing - Audio.m4b
5.32MB
DEF CON 8 Hacking Conference Presentation By Jason Scott - TEXTFILESDOTCON One Year Later - Audio.m4b
14.09MB
DEF CON 8 Hacking Conference Presentation By Jennifer Granick - The Law and Hacking - Audio.m4b
11.97MB
DEF CON 8 Hacking Conference Presentation By Jeru - Advanced Evasion of IDS Buffer Overflow Detection - Audio.m4b
3.45MB
DEF CON 8 Hacking Conference Presentation By Jim McCoy - Building the Mojo Nation - Audio.m4b
15.35MB
DEF CON 8 Hacking Conference Presentation By John Q Newman - 10 Steps You Can Take to Protect Your Privacy - Audio.m4b
11.03MB
DEF CON 8 Hacking Conference Presentation By John Q Newman - Fake ID by Mail and Modem - Audio.m4b
14.13MB
DEF CON 8 Hacking Conference Presentation By John S Flowers - Network IDS Do Not Fold Spindle or Mutilate - Audio.m4b
12.41MB
DEF CON 8 Hacking Conference Presentation By Jon Erickson - Number Theory Complexity Theory Cryptography and Quantum Computing - Audio.m4b
9.77MB
DEF CON 8 Hacking Conference Presentation By Kent Radek - Puzzlenet Designing an Anonymous Network - Audio.m4b
12.67MB
DEF CON 8 Hacking Conference Presentation By Legal Panel Discussion - Audio.m4b
13.02MB
DEF CON 8 Hacking Conference Presentation By Mike Scher - What is DNS - Audio.m4b
7.71MB
DEF CON 8 Hacking Conference Presentation By MR Mojo - Windows 2000 Security - Audio.m4b
11.12MB
DEF CON 8 Hacking Conference Presentation By MR Nasty - Using Tools to Obtain Recon on NT Networks - Audio.m4b
6.77MB
DEF CON 8 Hacking Conference Presentation By Mythandir - Penetrating B1 Trusted Operating Systems - Audio.m4b
10.16MB
DEF CON 8 Hacking Conference Presentation By Natasha Grigori - Hacktivist to Activsts Making the Transition - Audio.m4b
5.68MB
DEF CON 8 Hacking Conference Presentation By Noise - Anonymous Remailser The Importance of Widley Availabel Anonymity in an Age of Big Brother - Audio.m4b
9.34MB
DEF CON 8 Hacking Conference Presentation By Phil King - 8 bit Redux Microcntroller Hacking - Audio.m4b
8.96MB
DEF CON 8 Hacking Conference Presentation By Phillip J Loranger - Army Biometrics - Audio.m4b
11.35MB
DEF CON 8 Hacking Conference Presentation By Pyr0 - FAQ The Kiddies - Audio.m4b
9.72MB
DEF CON 8 Hacking Conference Presentation By Richard Thieme - Social Engineering at Defcon Games Hackers Play - Audio.m4b
7.63MB
DEF CON 8 Hacking Conference Presentation By Robert Graham - Evading Network Based Intrusion Detection Systems - Audio.m4b
10.78MB
DEF CON 8 Hacking Conference Presentation By Ron Moritz - Proactive Defense Against Malicious Code - Audio.m4b
9.77MB
DEF CON 8 Hacking Conference Presentation By Sarah Gordon - Virus Writers The End Of Innocence - Audio.m4b
7.86MB
DEF CON 8 Hacking Conference Presentation By Simple Nomad - A How to Regarding Network Mapping - Audio.m4b
9.33MB
DEF CON 8 Hacking Conference Presentation By Syke - Opensource Utilities and How to Use Them to Test IDSes and Firewalls - Audio.m4b
11.14MB
DEF CON 8 Hacking Conference Presentation By Thomas Munn - The Need For Home Based Firewalls - Audio.m4b
877.45KB
DEF CON 8 Hacking Conference Presentation By Tim Lawless - Saint Jude Modeling Detecting and Responding to Unauthorized Root Transitions - Audio.m4b
10.39MB
DEF CON 8 Hacking Conference Presentation By V1ru5 - More Lock Picking - Audio.m4b
12.16MB
DEF CON 8 Hacking Conference Presentation By V1ru5 - Updated Computer Virus Class - Audio.m4b
13.27MB
DEF CON 8 Hacking Conference Presentation By Xs - LDAP - Audio.m4b
7.76MB
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