DEFCON

Results: 69



#Item
51Airport check-in / Internet privacy / Sacramento International Airport / Interactive kiosk / Kiosks / Malware

PoS Attacking the Traveling Salesman

Add to Reading List

Source URL: defcon.org

Language: English - Date: 2014-08-22 22:00:23
52Stationery / Password / Envelope detector / Software / Envelope / DEFCON / Yoder / Technology / Digital media / Postal system

The Death Envelope: A Medieval Solution to a 21st Century Problem Matt Yoder August 8-10, 2008, Las Vegas, Nevada

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2009-10-31 22:10:00
53DEFCON / Twitter / Technology / World Wide Web / Flag / Vexillology

PDF Document

Add to Reading List

Source URL: www.social-engineer.com

Language: English - Date: 2013-05-16 12:01:05
54Spamming / Internet / Botnets / Internet privacy / Tor / McColo / WikiLeaks / Rustock botnet / Storm botnet / Computing / Multi-agent systems / Computer network security

Resilient Botnet Command and Control with Tor

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2010-08-20 12:34:32
55Network architecture / DNS rebinding / Internet / NoScript / IP address / Cross-site request forgery / OpenDNS / Transmission Control Protocol / Domain name system / Computer network security / Computing

How to Hack Millions of Routers

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2010-08-20 13:34:12
56Software / Free software / Computing / Embedded Linux / Smartphones / Android

These Are Not the Permissions You Are Looking For.

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2010-08-20 13:51:54
57Government of the Soviet Union / Soviet Union–United States relations / Cuban Revolution / DEFCON / Cuban Missile Crisis / Nuclear warfare / Nikita Khrushchev / Games / Soviet people / Twilight Struggle

Twilight Strategy A comprehensive strategy guide to Twilight Struggle theory This book is for sale at http://leanpub.com/twilightstrategy This version was published on[removed]

Add to Reading List

Source URL: samples.leanpub.com

Language: English - Date: 2014-02-24 01:23:26
58Computer network security / Hacking / Computing / Military technology / United States Cyber Command / Attack / National Security Agency / Botnet / Cyberwarfare / Electronic warfare / Computer security

Kim Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller Independent Security Evaluators

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2010-08-20 14:17:10
59Internet standards / Digital subscriber line / TR-069

TOP SECRET//SI//REL TO DC22 (U) I hunt TR-069 admins  Shahar Tal

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2014-08-22 21:59:13
60Network protocols / Computer network security / Windows XP / Videotelephony / Mobile content / Universal Plug and Play / Check Point / Windows Vista / Proprietary software / Computing / Microsoft Windows / Technology

“A Crazy Toaster : Can Home Devices turn against us?” Dror Shalev SmartDefense Research Center [removed]

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2008-03-18 18:17:25
UPDATE