DEFCON

Results: 69



#Item
31

PowerPwning: Post-Exploiting By Overpowering PowerShell Joe Bialek About Me •

Add to Reading List

Source URL: www.defcon.org

- Date: 2013-08-27 03:09:39
    32

    Automated PIN Cracking Justin Engler Paul Vines Senior Security Engineer

    Add to Reading List

    Source URL: www.defcon.org

    - Date: 2013-08-27 03:24:23
      33

      How I learned to love the bomb: Defcon and the Ethics of Computer Games Miguel Sicart Assistant Professor Center for Computer Game Research

      Add to Reading List

      Source URL: miguelsicart.net

      Language: English - Date: 2014-11-24 14:37:34
        34

        Microsoft Word - APLK-defcon.doc

        Add to Reading List

        Source URL: www.heerlen.nl

        Language: Dutch
          35National security / DEFCON / State of emergency / Emergency / Public safety / Emergency management / Management

          VII Dec. IStates of Emergency) The DEFCON system is to be used to indicate the security level of the country, and the risk to the continued existence of the Empire as a sovereign state. The DEFCON level is to be

          Add to Reading List

          Source URL: austenasia.webs.com

          Language: English
          36

          OSSIR – EdelWeb Compte-rendu BlackHat USA et DefCon 2004

          Add to Reading List

          Source URL: www.ossir.org

          Language: French - Date: 2009-05-04 12:06:10
            37Filesystem Hierarchy Standard / System administration / Scripting languages / Dc / Env / Daemon / Perl / W / Computing / Software / Unix

            XXE: advanced exploitation DC02139, Ukraine, Kyiv, XXE basics •  Parser bug (feature)

            Add to Reading List

            Source URL: defcon.org.ua

            Language: English - Date: 2012-03-28 11:00:00
            38

            DEFCON CTF ’08 Binary 500 Analyze ELF binary in FreeBSD Binary 500: http://nopsr.us/ctf2008qual/reversing500-cf3f218b2331845ae68b2a4a53b9cb28

            Add to Reading List

            Source URL: ruffnex.oc.to

            Language: Japanese - Date: 2009-03-02 07:47:12
              39

              Microsoft Word - II22056 Economische effecten Giro Utrecht_DEFCON.doc

              Add to Reading List

              Source URL: www.sportengemeenten.nl

              Language: Dutch - Date: 2012-06-12 03:35:11
                40Internet protocols / Computer network security / Data security / Port scanner / Transmission Control Protocol / Firewall / Port / X Window System / Communications protocol / Computing / Data / Software

                Introducing Unicornscan - RIDING THE UNICORN

                Add to Reading List

                Source URL: www.defcon.org

                Language: English - Date: 2009-11-16 20:49:03
                UPDATE