Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Philip R. Zimmermann: The Unveiling of My Next Big Project
|
Jun 04, 2006 |
Adam L. Young: Building Robust Backdoors In Secret Symmetric Ciphers
|
Jun 04, 2006 |
Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component
|
Jun 04, 2006 |
Paul Vixie: Preventing Child Neglect in DNSSEC-bis using Lookaside Validation
|
Jun 04, 2006 |
Andrew van der Stock: World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0
|
Jun 04, 2006 |
Eugene Tsyrklevich: Ozone HIPS: Unbreakable Windows
|
Jun 04, 2006 |
Michael Sutton and Adam Greene: The Art of File Format Fuzzing
|
Jun 04, 2006 |
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
|
Jun 04, 2006 |
spoonm and skape: Beyond EIP
|
Jun 04, 2006 |
Sherri Sparks and Jamie Butler: "Shadow Walker" - Raising The Bar For Rootkit Detection
|
Jun 04, 2006 |
Derek Soeder and Ryan Permeh: eEye BootRoot
|
Jun 04, 2006 |
Paul Simmonds: The Jericho Challenge - Finalist Architecture Presentations and Awards
|
Jun 04, 2006 |
SensePost: Automation - Deus ex Machina or Rube Goldberg Machine?
|
Jun 04, 2006 |
Mike Pomraning: Injection Flaws: Stop Validating Your Input
|
Jun 04, 2006 |
Ejovi Nuwere and Mikko Varpiola: The Art of SIP fuzzing and Vulnerabilities Found in VoIP
|
Jun 04, 2006 |
Mudge aka Peiter Mudge Zatko: Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence/Counter Espionage Within Information Security
|
Jun 04, 2006 |
Shawn Moyer: Owning the C-suite: Corporate Warfare as a Social Engineering Problem
|
Jun 04, 2006 |
Panel: CISO QA with Jeff Moss
|
Jun 04, 2006 |
Panel: The National ID Debate
|
Jun 04, 2006 |
Robert Morris: The Non-Cryptographic Ways of Losing Information
|
Jun 04, 2006 |
David Maynor: NX: How Well Does It Say NO to Attacker's eXecution Attempts?
|
Jun 04, 2006 |
Kevin Mandia: Performing Effective Incident Response
|
Jun 04, 2006 |
Simple Nomad and MadHat Unspecific: SPA: Single Packet Authorization
|
Jun 04, 2006 |
Johnny Long: Google Hacking for Penetration Testers
|
Jun 04, 2006 |
David Litchfield: All New 0-Day
|
Jun 04, 2006 |
Ben Laurie: CaPerl: Running Hostile Code Safely
|
Jun 04, 2006 |
Alexander Kornbrust: Circumvent Oracle's Database Encryption and Reverse Engineering of Oracle Key Management Algorithms
|
Jun 04, 2006 |
Joseph Klein: The Social Engineering Engagement Methodology - A Formal Testing process of the People and Process
|
Jun 04, 2006 |
Barnaby Jack: Remote Windows Kernel Exploitation - Step In To the Ring 0
|
Jun 04, 2006 |
Ken Hines: Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment
|
Jun 04, 2006 |
Allen Harper and Edward Balas: GEN III Honeynets: The birth of roo
|
Jun 04, 2006 |
Robert J. Hansen and Meredith L. Patterson: Stopping Injection Attacks with Computational Theory
|
Jun 04, 2006 |
The Grugq: The Art of Defiling: Defeating Forensic Analysis
|
Jun 04, 2006 |
Jeremiah Grossman: Phishing with Super Bait
|
Jun 04, 2006 |
Jennifer Stisa Granick: Top Ten Legal Issues in Computer Security
|
Jun 04, 2006 |
Joe Grand: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices
|
Jun 04, 2006 |
Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)
|
Jun 04, 2006 |
James C. Foster and Vincent T. Liu: Catch Me If You Can:Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch.
|
Jun 04, 2006 |
James C. Foster: BlackHat Standup: "Yea I'm a Hacker"
|
Jun 04, 2006 |
Esteban Martinez Fayo: Advanced SQL Injection in Oracle Databases
|
Jun 04, 2006 |
Yuan Fan: Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection
|
Jun 04, 2006 |
Arian J. Evans and Daniel Thompson: Building Self-Defending Web Applications: Secrets of Session Hacking and Protecting Software Sessions
|
Jun 04, 2006 |
Himanshu Dwivedi: iSCSI Security (Insecure SCSI)
|
Jun 04, 2006 |
Bryan Cunningham and C. Forrest Morgan: U.S National Security, Individual and Corporate Information Security, and Information Security Providers
|
Jun 04, 2006 |
Greg Conti: Beyond Ethereal: Crafting A Tivo for Security Datastreams
|
Jun 04, 2006 |
Tyler Close: Shatter-proofing Windows
|
Jun 04, 2006 |
Ian Clarke and Oskar Sandberg: Routing in the Dark: Scalable Searches in Dark P2P Networks.
|
Jun 04, 2006 |
Robert W. Clark: Legal Aspects of Computer Network Defense-A Government Perspective and A Year in Review Important Precedents in Computer and Internet Security Law 2004 - 2005
|
Jun 04, 2006 |
Jim Christy: The Defense Cyber Crime Center
|
Jun 04, 2006 |
Tzi-cker Chiueh: Checking Array Bound Violation Using Segmentation Hardware
|
Jun 04, 2006 |
Cesar Cerrudo:Demystifying MS SQL Server and Oracle Database Server Security
|
Jun 04, 2006 |
Kevin Cardwell:Toolkits: All-in-One Approach to Security
|
Jun 04, 2006 |
Adam Boileau: Trust Transience: Post Intrusion SSH Hijacking
|
Jun 04, 2006 |
Renaud Bidou: A Dirty BlackMail DoS Story
|
Jun 04, 2006 |
Bruce Potter and Beetle: Rogue Squadron: Evil Twins, 802.11intel, Radical RADIUS, and Wireless Weaponry for Windows
|
Jun 04, 2006 |
Darrin Barrall:Shakespearean Shellcode
|
Jun 04, 2006 |
Darrin Barrall and David Dewey: Plug and Root, the USB Key to the Kingdom
|
Jun 04, 2006 |
Ofir Arkin: A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control
|
Jun 04, 2006 |
Panel: The Future of Personal Information
|
Jun 04, 2006 |
Akshay Aggarwal: Rapid Threat Modeling
|
Jun 04, 2006 |
Gilman Louie: Investing in Our Nation's Security
|
Jun 04, 2006 |