DEF CON 101
Con Kung-Fu: Defending Yourself @ DEF CON
So You Got Arrested in Vegas...
Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Q & A with Bruce Schneier
More Tricks For Defeating SSL
 
                        
                        
                        
                    
                    The Year In Computer Crime Cases
Making Fun of Your Malware
 
                        
                        
                        
                    
                    Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Malware Freak Show
 
                        
                        
                        
                    
                    Criminal Charges are not pursued: Hacking PKI
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Something about Network Security
"Smart" Parking Meter Implementations, Globalism, and You(aka Meter Maids Eat Their Young)
A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera
RFID MythBusting
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Failure
The Projects of "Prototype This!"
Picking Electronic Locks Using TCP Sequence Prediction
Sniff Keystrokes With Lasers/Voltmeters
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Bluetooth, Smells Like Chicken
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Router Exploitation
Hello, My Name is /hostname/
eXercise in Messaging and Presence Pwnage
Unmasking You
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Search And Seizure Explained - They Took My Laptop!
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Hackerspaces: The Legal Bases
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Robot Shark Laser! What Hackerspaces Do
 
                        
                        
                        
                    
                    Introduction to WiMAX Hacking