Podcasts

FX and Halvar - Take it from here

Published: Jan. 7, 2013, 10:57 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Chris Eagle - Attacking Obfuscated Code

Published: Jan. 7, 2013, 10:57 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Panel - Meet the Feds

Published: Jan. 7, 2013, 10:57 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Max Mullen - Hack Your Car

Published: Jan. 7, 2013, 10:56 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Ian Clarke, Freenet: Taming the World's Largest Tamagotchi

Published: May 28, 2006, 12:34 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Jon Callas, How Do We Get The World To Use Message Security

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 47 seconds

Listed in: Technology

n0namehere, Real World Privacy, How to Leave Less of A Trail in Life

Published: May 28, 2006, 12:34 a.m.
Duration: 46 minutes 33 seconds

Listed in: Technology

Scott Fullam, Introduction to Hardware Hacking

Published: May 28, 2006, 12:34 a.m.
Duration: 41 minutes 23 seconds

Listed in: Technology

Dead Addict, Hacking the Media, and Avoiding Being Hacked by the Media

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 1 second

Listed in: Technology

Dark Tangent, Award Ceremonies

Published: May 28, 2006, 12:34 a.m.
Duration: 2 hours 7 minutes 16 seconds

Listed in: Technology

Cameron nummish Hotchkies,Blind SQL Injection Automation Techniques

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 31 seconds

Listed in: Technology

Ian Vitek, Exploring Terminal Services, The Last 12 Month of Research. Or, The Evil Admin And His Tools

Published: May 28, 2006, 12:34 a.m.
Duration: 47 minutes 35 seconds

Listed in: Technology

Foofus, Old Tricks

Published: May 28, 2006, 12:34 a.m.
Duration: 45 minutes 38 seconds

Listed in: Technology

Rakan El-Khalil, Information Hiding in Executable Binaries

Published: May 28, 2006, 12:34 a.m.
Duration: 41 minutes 58 seconds

Listed in: Technology

Michael Davis, The Open-Source Security Myth and How to Make It A Reality

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 23 seconds

Listed in: Technology

Deral Heiland,The Insecure Workstation

Published: May 28, 2006, 12:34 a.m.
Duration: 43 minutes 3 seconds

Listed in: Technology

Maximillian Dornseif, Far More Than You Ever Wanted To Tell - Hidden Data In Document Formats

Published: May 28, 2006, 12:34 a.m.
Duration: 51 minutes 17 seconds

Listed in: Technology

Brett Neilson ,The Advantages of Being an Amateur

Published: May 28, 2006, 12:34 a.m.
Duration: 51 minutes 54 seconds

Listed in: Technology

j0hnny long, Google Hacking- The Return of the Googledorks

Published: May 28, 2006, 12:34 a.m.
Duration: 40 minutes 58 seconds

Listed in: Technology

Michael T. Raggo , Steganography, Steganalysis and Cryptanalysis

Published: May 28, 2006, 12:34 a.m.
Duration: 34 minutes 11 seconds

Listed in: Technology

Wavyhill and Andre Goldman,Toward a Private Digital Economy (Trusted Transactions In An Anonymous World)

Published: May 28, 2006, 12:34 a.m.
Duration: 54 minutes 1 second

Listed in: Technology

Greg Conti, Network Attack Visualization

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 24 seconds

Listed in: Technology

Lucky 225, Phreaking in the Age of Voice Over IP

Published: May 28, 2006, 12:34 a.m.
Duration: 29 minutes 2 seconds

Listed in: Technology

Tony Arcieri, PDTP :The Peer Distributed Transfer Protocol

Published: May 28, 2006, 12:34 a.m.
Duration: 38 minutes 58 seconds

Listed in: Technology

Wendy Seltzer and Seth Schoen, Hacking the Spectrum: Open Source Software vs. the Broadcast Flag

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 1 second

Listed in: Technology

Dan Kaminsky, Black Ops of TCP/IP 2004

Published: May 28, 2006, 12:34 a.m.
Duration: 53 minutes 54 seconds

Listed in: Technology

Nathan Hamiel (Ichabod Ver7),Down with the RIAA, Musicians against the Recording Industry

Published: May 28, 2006, 12:34 a.m.
Duration: 45 minutes 10 seconds

Listed in: Technology

Grifter, Russ Rogers and Tierra, Project Prometheus

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 8 seconds

Listed in: Technology

IcE tRe, Virus, Worms and Trojans: Where are we going?

Published: May 28, 2006, 12:34 a.m.
Duration: 30 minutes 40 seconds

Listed in: Technology

Panel, Ask EFF: Discussion and Q/A on the State of Digital Liberties

Published: May 28, 2006, 12:34 a.m.
Duration: 1 hour 48 minutes 16 seconds

Listed in: Technology

CrimethInc, Electronic Civil Disobedience and the Republican National Convention

Published: May 28, 2006, 12:34 a.m.
Duration: 27 minutes 1 second

Listed in: Technology

Gene Cronk, Pv6 Primer

Published: May 28, 2006, 12:34 a.m.
Duration: 43 minutes 50 seconds

Listed in: Technology

Elonka Dunin,Kryptos and the Cracking of the Cyrillic Projector Cipher

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 27 seconds

Listed in: Technology

Richard Thieme,Quantum Hacking: In Search of a Unified Theory

Published: May 28, 2006, 12:34 a.m.
Duration: 20 minutes 19 seconds

Listed in: Technology

Todd Moore, Cracking Net2Phone

Published: May 28, 2006, 12:34 a.m.
Duration: 13 minutes 56 seconds

Listed in: Technology

Sarah Gordon,What Do You Mean, Privacy?

Published: May 28, 2006, 12:34 a.m.
Duration: 15 minutes 22 seconds

Listed in: Technology

Kathy Wang, Frustrating OS Fingerprinting with Morph

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 27 seconds

Listed in: Technology

Kevin Mahaffey, Smile, You"re on Candid Camera: The Changing Notions of Surveillance in Postmodern America

Published: May 28, 2006, 12:34 a.m.
Duration: 11 minutes 37 seconds

Listed in: Technology

Jesee Krembs and Nicholas Farr, The Hacker Foundation: An Introduction

Published: May 28, 2006, 12:34 a.m.
Duration: 26 minutes 10 seconds

Listed in: Technology

Brett Moore, Shoot the Messenger Using Window Messages to Exploit Local win32 Applications

Published: May 28, 2006, 12:34 a.m.
Duration: 49 minutes 21 seconds

Listed in: Technology

Jason Scott, Digitizations And Documentary

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 43 seconds

Listed in: Technology

Sean O'Toole, Mutating the Mutators

Published: May 28, 2006, 12:34 a.m.
Duration: 12 minutes 51 seconds

Listed in: Technology

Sensepost, When the Tables Turn

Published: May 28, 2006, 12:34 a.m.
Duration: 47 minutes 20 seconds

Listed in: Technology

Doug Mohney, DIGEX At the Dawn of the Commercial Internet

Published: May 28, 2006, 12:34 a.m.
Duration: 45 minutes 45 seconds

Listed in: Technology

Nothingface, Automotive Networks

Published: May 28, 2006, 12:34 a.m.
Duration: 46 minutes 36 seconds

Listed in: Technology

Thorsten Holz and Others NoSEBrEaK Defeating Honeynets

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 38 seconds

Listed in: Technology

h1kari,Smart Card Security: From GSM to Parking Meters

Published: May 28, 2006, 12:34 a.m.
Duration: 51 minutes 30 seconds

Listed in: Technology

spoonm andHD Moore, Bubonic Buffer Overflow

Published: May 28, 2006, 12:34 a.m.
Duration: 1 hour 6 minutes 40 seconds

Listed in: Technology

Adam Bresson, Identification Evasion: Knowledge and Countermeasures

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 22 seconds

Listed in: Technology

Jamie Butler,VICE - Catch the Hookers!

Published: May 28, 2006, 12:34 a.m.
Duration: 36 minutes 12 seconds

Listed in: Technology

Nick Mathewson,Snake Oil Anonymity: How To Spot It, And How Not To Write It

Published: May 28, 2006, 12:34 a.m.
Duration: 40 minutes 50 seconds

Listed in: Technology

Lukas Grunwald, RF-ID and Smart-Labes: Myth, Technology and Attacks

Published: May 28, 2006, 12:34 a.m.
Duration: 30 minutes 57 seconds

Listed in: Technology

Tzi-cker Chiueh, Program Semantics Aware Intrusion Detection

Published: May 28, 2006, 12:34 a.m.
Duration: 38 minutes 53 seconds

Listed in: Technology

Len Sassaman,Mixmaster vs. Reliable: A Comparison of Two Anonymous Remailer Applications

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 35 seconds

Listed in: Technology

The Shmoo Group, Wireless Weaponry

Published: May 28, 2006, 12:34 a.m.
Duration: 35 minutes 34 seconds

Listed in: Technology

Joshua Teitelbaum and Peter Leung, CryptoMail Encrypted E-Mail for All (Including Grandma)

Published: May 28, 2006, 12:34 a.m.
Duration: 33 minutes

Listed in: Technology

Rebecca Mercuri, Ph.D., Hack the Vote: Election 2004

Published: May 28, 2006, 12:34 a.m.
Duration: 1 hour 3 minutes 41 seconds

Listed in: Technology

Adam Laurie and Martin Herfurt,Bluesnarfing The Risk From Digital Pickpockets

Published: May 28, 2006, 12:34 a.m.
Duration: 34 minutes 3 seconds

Listed in: Technology