Philip R. Zimmermann: ZFONE
The time for secure encrypted VoIP for the masses is upon us. The Zfone Project has come a long way in the two years since Phil Zimmermann demoed a prototype at Black Hat. It's now a family of...
View ArticlePaul Sebastian Ziegler: Multiplatform malware within the .NET-Framework
Multiplatform Malware - many of us have heard that term. Discussions on this matter arose a few month ago and they didn't cease yet. But while many people have taken interest in this matter there...
View ArticleAgent X: 44 Lines about 22 Things that keep me up at Night
What keeps a hacker up at night? What issues and projects keep Agent X from getting a good night's sleep? This turbo-rant will present 22 things that make the night seem long and morning far off....
View ArticleThomas Wilhelm: Turn-Key PenTest Labs
Currently, those interested in learning how to professionally conduct Information System Penetration Tests have very little options available to them - they can either illegally attack...
View ArticleJacob West: How I Learned to Stop Fuzzing and Find More Bugs
Fuzzing and other runtime testing techniques are great at finding certain kinds of bugs. The trick is, effective fuzzing requires a lot of customization. The fuzzer needs to understand the protocol...
View ArticleSquidly1- Theresa Verity: Thinking Outside the Console (box)
Having seen the ads this last holiday season, you think you might know all there is to know about the new crop of console game systems. But are these, and other console game systems, just for fun and...
View ArticleI)ruidm: Real-time Steganography with RTP
Real-time Transfer Protocol (RTP) is used almost ubiquitously by Voice over IP technologies to provide an audio channel for calls. As such, it provides ample opportunity for creation of a covert...
View ArticleSchuyler Towne: Locksport: An emerging subculture
Locksport is nothing new, but it's recent attention in the media and sudden growth have made it a popular topic. This talk will settle some of the bigger debates about the Locksport community. Are we...
View ArticleSteve "Arrakis" Topletz: Portable Privacy
Privacy is an increasingly scarce commodity. It is a state that must be preserved, and in many cases, enforced. In prior history, you could expect your person and affects to be relatively private,...
View ArticleRichard Thieme: Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors
You're over the line," an intelligence professional told Richard Thieme recently. "You know enough to know what's not true but you can't know enough to know what is. You're well into the wilderness of...
View ArticleSubere: Fingerprinting and Cracking Java Obfuscated Code
The process of obfuscating intermediate platform independent code, such as Java bytecode or Common Intermediate Language (CIL) code aims to make the source code generated by reverse engineering much...
View ArticleRobert Stoudt: When Tapes Go Missing
We hear it in the news all too frequently, "26 IRS tapes containing taxpayer information potentially contain taxpayers' names, SSNs, bank account numbers, or employer information", "tapes containing...
View ArticleMatthew "Pilgrim" Shuchman: How to be a WiFi Ninja
As one of the founders of WarDrivingWorld.com, where over the past few years we have sold thousands of WiFi devices and antennas for Pen testing and extended range WiFi, I will be presenting simple,...
View ArticleZed A. Shaw: Saving The Internet With Hate
Utu is the Maori word for a system of revenge used by Maori society to provide social controls and retribution. Utu is also a protocol that uses cryptographic models of social interaction to allow...
View ArticleDror Shalev: A Crazy Toaster: Can Home Devices turn against us?
A Crazy Toaster: Can Home Devices turn against us?" Home networking devices, wireless equivalents, hardware and technology raise new privacy and trust issues. Can Home Devices turn against us and spy...
View ArticleJason Scott: THE EDGE OF FOREVER - MAKING COMPUTER HISTORY
Too often, "Computer History" gets shoved into a forgotten bin of irrelevancy, devoid of use for lessons and understanding. Even more often, people often fail to realize they're making history...
View ArticleMichael Schrenk: The Executable Image Exploit
domain images; like MySpace or eBay. By uploading the following line of HTML to a community website,[img src="http://www.mydomain.com/executable.jpg?] you can launch a dynamic program that masquerades...
View ArticleBruce Schneier: Q&A with Bruce Schneier
Security is both a feeling and a reality. You can feel secure without actually being secure, and you can be secure even though you don't feel secure. In the industry, we tend to discount the feeling in...
View ArticleMichael Schearer : The Church of WiFi Presents: Hacking Iraq
What in the world is a U.S. Navy officer (a Naval Flight Officer, no less) doing in the middle of Iraq? Electronic warfare, of course! The Church of WiFi presents an unclassified presentation of...
View ArticleOskar Sandberg: Network Mathematics: Why is it a Small World?
Networks are central do almost everything that hackers do. Be they computer networks, peer-to-peer networks, information networks, or social networks, they are all around us and understanding them is...
View Article
More Pages to Explore .....