DEF CON 12: [Audio] Speakers from the hacking convention

DEF CON 12: [Audio] Speakers from the hacking convention

61 episodes

The DEF CON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. Video, audio and supporting materials from past conferences are available on our website at: https://www.defcon.org/html/links/dc-archives.html This RSS includes audio from the speeches at DEF CON 12. Additional versions including: video only, and music from the DEF CON DJ's, will be uploaded separately. We hope you enjoy.

Podcasts

FX and Halvar - Take it from here

Published: Jan. 7, 2013, 10:57 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Chris Eagle - Attacking Obfuscated Code

Published: Jan. 7, 2013, 10:57 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Panel - Meet the Feds

Published: Jan. 7, 2013, 10:57 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Max Mullen - Hack Your Car

Published: Jan. 7, 2013, 10:56 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Ian Clarke, Freenet: Taming the World's Largest Tamagotchi

Published: May 28, 2006, 12:34 a.m.
Duration: 51 minutes 15 seconds

Listed in: Technology

Jon Callas, How Do We Get The World To Use Message Security

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 47 seconds

Listed in: Technology

n0namehere, Real World Privacy, How to Leave Less of A Trail in Life

Published: May 28, 2006, 12:34 a.m.
Duration: 46 minutes 33 seconds

Listed in: Technology

Scott Fullam, Introduction to Hardware Hacking

Published: May 28, 2006, 12:34 a.m.
Duration: 41 minutes 23 seconds

Listed in: Technology

Dead Addict, Hacking the Media, and Avoiding Being Hacked by the Media

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 1 second

Listed in: Technology

Dark Tangent, Award Ceremonies

Published: May 28, 2006, 12:34 a.m.
Duration: 2 hours 7 minutes 16 seconds

Listed in: Technology

Cameron nummish Hotchkies,Blind SQL Injection Automation Techniques

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 31 seconds

Listed in: Technology

Ian Vitek, Exploring Terminal Services, The Last 12 Month of Research. Or, The Evil Admin And His Tools

Published: May 28, 2006, 12:34 a.m.
Duration: 47 minutes 35 seconds

Listed in: Technology

Foofus, Old Tricks

Published: May 28, 2006, 12:34 a.m.
Duration: 45 minutes 38 seconds

Listed in: Technology

Rakan El-Khalil, Information Hiding in Executable Binaries

Published: May 28, 2006, 12:34 a.m.
Duration: 41 minutes 58 seconds

Listed in: Technology

Michael Davis, The Open-Source Security Myth and How to Make It A Reality

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 23 seconds

Listed in: Technology

Deral Heiland,The Insecure Workstation

Published: May 28, 2006, 12:34 a.m.
Duration: 43 minutes 3 seconds

Listed in: Technology

Maximillian Dornseif, Far More Than You Ever Wanted To Tell - Hidden Data In Document Formats

Published: May 28, 2006, 12:34 a.m.
Duration: 51 minutes 17 seconds

Listed in: Technology

Brett Neilson ,The Advantages of Being an Amateur

Published: May 28, 2006, 12:34 a.m.
Duration: 51 minutes 54 seconds

Listed in: Technology

j0hnny long, Google Hacking- The Return of the Googledorks

Published: May 28, 2006, 12:34 a.m.
Duration: 40 minutes 58 seconds

Listed in: Technology

Michael T. Raggo , Steganography, Steganalysis and Cryptanalysis

Published: May 28, 2006, 12:34 a.m.
Duration: 34 minutes 11 seconds

Listed in: Technology

Wavyhill and Andre Goldman,Toward a Private Digital Economy (Trusted Transactions In An Anonymous World)

Published: May 28, 2006, 12:34 a.m.
Duration: 54 minutes 1 second

Listed in: Technology

Greg Conti, Network Attack Visualization

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 24 seconds

Listed in: Technology

Lucky 225, Phreaking in the Age of Voice Over IP

Published: May 28, 2006, 12:34 a.m.
Duration: 29 minutes 2 seconds

Listed in: Technology

Tony Arcieri, PDTP :The Peer Distributed Transfer Protocol

Published: May 28, 2006, 12:34 a.m.
Duration: 38 minutes 58 seconds

Listed in: Technology

Wendy Seltzer and Seth Schoen, Hacking the Spectrum: Open Source Software vs. the Broadcast Flag

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 1 second

Listed in: Technology

Dan Kaminsky, Black Ops of TCP/IP 2004

Published: May 28, 2006, 12:34 a.m.
Duration: 53 minutes 54 seconds

Listed in: Technology

Nathan Hamiel (Ichabod Ver7),Down with the RIAA, Musicians against the Recording Industry

Published: May 28, 2006, 12:34 a.m.
Duration: 45 minutes 10 seconds

Listed in: Technology

Grifter, Russ Rogers and Tierra, Project Prometheus

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 8 seconds

Listed in: Technology

IcE tRe, Virus, Worms and Trojans: Where are we going?

Published: May 28, 2006, 12:34 a.m.
Duration: 30 minutes 40 seconds

Listed in: Technology

Panel, Ask EFF: Discussion and Q/A on the State of Digital Liberties

Published: May 28, 2006, 12:34 a.m.
Duration: 1 hour 48 minutes 16 seconds

Listed in: Technology

CrimethInc, Electronic Civil Disobedience and the Republican National Convention

Published: May 28, 2006, 12:34 a.m.
Duration: 27 minutes 1 second

Listed in: Technology

Gene Cronk, Pv6 Primer

Published: May 28, 2006, 12:34 a.m.
Duration: 43 minutes 50 seconds

Listed in: Technology

Elonka Dunin,Kryptos and the Cracking of the Cyrillic Projector Cipher

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 27 seconds

Listed in: Technology

Richard Thieme,Quantum Hacking: In Search of a Unified Theory

Published: May 28, 2006, 12:34 a.m.
Duration: 20 minutes 19 seconds

Listed in: Technology

Todd Moore, Cracking Net2Phone

Published: May 28, 2006, 12:34 a.m.
Duration: 13 minutes 56 seconds

Listed in: Technology

Sarah Gordon,What Do You Mean, Privacy?

Published: May 28, 2006, 12:34 a.m.
Duration: 15 minutes 22 seconds

Listed in: Technology

Kathy Wang, Frustrating OS Fingerprinting with Morph

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 27 seconds

Listed in: Technology

Kevin Mahaffey, Smile, You"re on Candid Camera: The Changing Notions of Surveillance in Postmodern America

Published: May 28, 2006, 12:34 a.m.
Duration: 11 minutes 37 seconds

Listed in: Technology

Jesee Krembs and Nicholas Farr, The Hacker Foundation: An Introduction

Published: May 28, 2006, 12:34 a.m.
Duration: 26 minutes 10 seconds

Listed in: Technology

Brett Moore, Shoot the Messenger Using Window Messages to Exploit Local win32 Applications

Published: May 28, 2006, 12:34 a.m.
Duration: 49 minutes 21 seconds

Listed in: Technology

Jason Scott, Digitizations And Documentary

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 43 seconds

Listed in: Technology

Sean O'Toole, Mutating the Mutators

Published: May 28, 2006, 12:34 a.m.
Duration: 12 minutes 51 seconds

Listed in: Technology

Sensepost, When the Tables Turn

Published: May 28, 2006, 12:34 a.m.
Duration: 47 minutes 20 seconds

Listed in: Technology

Doug Mohney, DIGEX At the Dawn of the Commercial Internet

Published: May 28, 2006, 12:34 a.m.
Duration: 45 minutes 45 seconds

Listed in: Technology

Nothingface, Automotive Networks

Published: May 28, 2006, 12:34 a.m.
Duration: 46 minutes 36 seconds

Listed in: Technology

Thorsten Holz and Others NoSEBrEaK Defeating Honeynets

Published: May 28, 2006, 12:34 a.m.
Duration: 50 minutes 38 seconds

Listed in: Technology

h1kari,Smart Card Security: From GSM to Parking Meters

Published: May 28, 2006, 12:34 a.m.
Duration: 51 minutes 30 seconds

Listed in: Technology

spoonm andHD Moore, Bubonic Buffer Overflow

Published: May 28, 2006, 12:34 a.m.
Duration: 1 hour 6 minutes 40 seconds

Listed in: Technology

Adam Bresson, Identification Evasion: Knowledge and Countermeasures

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 22 seconds

Listed in: Technology

Jamie Butler,VICE - Catch the Hookers!

Published: May 28, 2006, 12:34 a.m.
Duration: 36 minutes 12 seconds

Listed in: Technology

Nick Mathewson,Snake Oil Anonymity: How To Spot It, And How Not To Write It

Published: May 28, 2006, 12:34 a.m.
Duration: 40 minutes 50 seconds

Listed in: Technology

Lukas Grunwald, RF-ID and Smart-Labes: Myth, Technology and Attacks

Published: May 28, 2006, 12:34 a.m.
Duration: 30 minutes 57 seconds

Listed in: Technology

Tzi-cker Chiueh, Program Semantics Aware Intrusion Detection

Published: May 28, 2006, 12:34 a.m.
Duration: 38 minutes 53 seconds

Listed in: Technology

Len Sassaman,Mixmaster vs. Reliable: A Comparison of Two Anonymous Remailer Applications

Published: May 28, 2006, 12:34 a.m.
Duration: 48 minutes 35 seconds

Listed in: Technology

The Shmoo Group, Wireless Weaponry

Published: May 28, 2006, 12:34 a.m.
Duration: 35 minutes 34 seconds

Listed in: Technology

Joshua Teitelbaum and Peter Leung, CryptoMail Encrypted E-Mail for All (Including Grandma)

Published: May 28, 2006, 12:34 a.m.
Duration: 33 minutes

Listed in: Technology

Rebecca Mercuri, Ph.D., Hack the Vote: Election 2004

Published: May 28, 2006, 12:34 a.m.
Duration: 1 hour 3 minutes 41 seconds

Listed in: Technology

Adam Laurie and Martin Herfurt,Bluesnarfing The Risk From Digital Pickpockets

Published: May 28, 2006, 12:34 a.m.
Duration: 34 minutes 3 seconds

Listed in: Technology