Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Philip R. Zimmermann: The Unveiling of My Next Big Project
|
Jun 04, 2006 |
|
Adam L. Young: Building Robust Backdoors In Secret Symmetric Ciphers
|
Jun 04, 2006 |
|
Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component
|
Jun 04, 2006 |
|
Paul Vixie: Preventing Child Neglect in DNSSEC-bis using Lookaside Validation
|
Jun 04, 2006 |
|
Andrew van der Stock: World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0
|
Jun 04, 2006 |
|
Eugene Tsyrklevich: Ozone HIPS: Unbreakable Windows
|
Jun 04, 2006 |
|
Michael Sutton and Adam Greene: The Art of File Format Fuzzing
|
Jun 04, 2006 |
|
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
|
Jun 04, 2006 |
|
spoonm and skape: Beyond EIP
|
Jun 04, 2006 |
|
Sherri Sparks and Jamie Butler: "Shadow Walker" - Raising The Bar For Rootkit Detection
|
Jun 04, 2006 |
|
Derek Soeder and Ryan Permeh: eEye BootRoot
|
Jun 04, 2006 |
|
Paul Simmonds: The Jericho Challenge - Finalist Architecture Presentations and Awards
|
Jun 04, 2006 |
|
SensePost: Automation - Deus ex Machina or Rube Goldberg Machine?
|
Jun 04, 2006 |
|
Mike Pomraning: Injection Flaws: Stop Validating Your Input
|
Jun 04, 2006 |
|
Ejovi Nuwere and Mikko Varpiola: The Art of SIP fuzzing and Vulnerabilities Found in VoIP
|
Jun 04, 2006 |
|
Mudge aka Peiter Mudge Zatko: Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence/Counter Espionage Within Information Security
|
Jun 04, 2006 |
|
Shawn Moyer: Owning the C-suite: Corporate Warfare as a Social Engineering Problem
|
Jun 04, 2006 |
|
Panel: CISO QA with Jeff Moss
|
Jun 04, 2006 |
|
Panel: The National ID Debate
|
Jun 04, 2006 |
|
Robert Morris: The Non-Cryptographic Ways of Losing Information
|
Jun 04, 2006 |
|
David Maynor: NX: How Well Does It Say NO to Attacker's eXecution Attempts?
|
Jun 04, 2006 |
|
Kevin Mandia: Performing Effective Incident Response
|
Jun 04, 2006 |
|
Simple Nomad and MadHat Unspecific: SPA: Single Packet Authorization
|
Jun 04, 2006 |
|
Johnny Long: Google Hacking for Penetration Testers
|
Jun 04, 2006 |
|
David Litchfield: All New 0-Day
|
Jun 04, 2006 |
|
Ben Laurie: CaPerl: Running Hostile Code Safely
|
Jun 04, 2006 |
|
Alexander Kornbrust: Circumvent Oracle's Database Encryption and Reverse Engineering of Oracle Key Management Algorithms
|
Jun 04, 2006 |
|
Joseph Klein: The Social Engineering Engagement Methodology - A Formal Testing process of the People and Process
|
Jun 04, 2006 |
|
Barnaby Jack: Remote Windows Kernel Exploitation - Step In To the Ring 0
|
Jun 04, 2006 |
|
Ken Hines: Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment
|
Jun 04, 2006 |
|
Allen Harper and Edward Balas: GEN III Honeynets: The birth of roo
|
Jun 04, 2006 |
|
Robert J. Hansen and Meredith L. Patterson: Stopping Injection Attacks with Computational Theory
|
Jun 04, 2006 |
|
The Grugq: The Art of Defiling: Defeating Forensic Analysis
|
Jun 04, 2006 |
|
Jeremiah Grossman: Phishing with Super Bait
|
Jun 04, 2006 |
|
Jennifer Stisa Granick: Top Ten Legal Issues in Computer Security
|
Jun 04, 2006 |
|
Joe Grand: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices
|
Jun 04, 2006 |
|
Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)
|
Jun 04, 2006 |
|
James C. Foster and Vincent T. Liu: Catch Me If You Can:Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch.
|
Jun 04, 2006 |
|
James C. Foster: BlackHat Standup: "Yea I'm a Hacker"
|
Jun 04, 2006 |
|
Esteban Martinez Fayo: Advanced SQL Injection in Oracle Databases
|
Jun 04, 2006 |
|
Yuan Fan: Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection
|
Jun 04, 2006 |
|
Arian J. Evans and Daniel Thompson: Building Self-Defending Web Applications: Secrets of Session Hacking and Protecting Software Sessions
|
Jun 04, 2006 |
|
Himanshu Dwivedi: iSCSI Security (Insecure SCSI)
|
Jun 04, 2006 |
|
Bryan Cunningham and C. Forrest Morgan: U.S National Security, Individual and Corporate Information Security, and Information Security Providers
|
Jun 04, 2006 |
|
Greg Conti: Beyond Ethereal: Crafting A Tivo for Security Datastreams
|
Jun 04, 2006 |
|
Tyler Close: Shatter-proofing Windows
|
Jun 04, 2006 |
|
Ian Clarke and Oskar Sandberg: Routing in the Dark: Scalable Searches in Dark P2P Networks.
|
Jun 04, 2006 |
|
Robert W. Clark: Legal Aspects of Computer Network Defense-A Government Perspective and A Year in Review Important Precedents in Computer and Internet Security Law 2004 - 2005
|
Jun 04, 2006 |
|
Jim Christy: The Defense Cyber Crime Center
|
Jun 04, 2006 |
|
Tzi-cker Chiueh: Checking Array Bound Violation Using Segmentation Hardware
|
Jun 04, 2006 |
|
Cesar Cerrudo:Demystifying MS SQL Server and Oracle Database Server Security
|
Jun 04, 2006 |
|
Kevin Cardwell:Toolkits: All-in-One Approach to Security
|
Jun 04, 2006 |
|
Adam Boileau: Trust Transience: Post Intrusion SSH Hijacking
|
Jun 04, 2006 |
|
Renaud Bidou: A Dirty BlackMail DoS Story
|
Jun 04, 2006 |
|
Bruce Potter and Beetle: Rogue Squadron: Evil Twins, 802.11intel, Radical RADIUS, and Wireless Weaponry for Windows
|
Jun 04, 2006 |
|
Darrin Barrall:Shakespearean Shellcode
|
Jun 04, 2006 |
|
Darrin Barrall and David Dewey: Plug and Root, the USB Key to the Kingdom
|
Jun 04, 2006 |
|
Ofir Arkin: A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control
|
Jun 04, 2006 |
|
Panel: The Future of Personal Information
|
Jun 04, 2006 |
|
Akshay Aggarwal: Rapid Threat Modeling
|
Jun 04, 2006 |
|
Gilman Louie: Investing in Our Nation's Security
|
Jun 04, 2006 |