Hardware Black Magic - Building devices with FPGAs
 
                        
                        
                        
                    
                    DEF CON 1 - A Personal Account
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Jailbreaking and the Law of Reversing
0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
Hacking WITH the iPod Touch
Advancing Video Application Attacks with Video Interception, Recording, and Replay
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Computer and Internet Security Law - A Year in Review 2008 - 2009
Why Tor is Slow, and What We're Doing About It
BitTorrent Hacks
Attacking Tor at the Application Layer
 
                        
                        
                        
                    
                        
                        
                        
                        
                    
                    10,000¢ Hacker Pyramid
Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival
 
                        
                        
                        
                    
                    Personal Survival Preparedness
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community
FOE -- Feeding Controversial News to Censored Countries (Without Using Proxy Servers)
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    PLA Information Warfare Development Timeline and Nodal Analysis
 
                        
                        
                        
                    
                    MSF Telephony
"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks"
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
Managed Code Rootkits - Hooking into Runtime Environments
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Win at Reversing: Tracing and Sandboxing through Inline Hooking
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Dradis Framework - Sharing Information will get you Root
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
 
                        
                        
                        
                    
                        
                         
                        
                        
                    
                    Screen Scraper Tricks: Extracting Data from Difficult Websites
 
                        
                        
                        
                    
                    Dangerous Minds: The Art of Guerrilla Data Mining
 
                        
                        
                        
                    
                    Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
 
                        
                        
                        
                    
                        
                        