ShmooCon

Results: 49



#Item
11Malware / Spyware / Stack / ShmooCon / Survivability / Security / Computer security / Rogue software / Cyberwarfare / Computer network security

Towards Evidence-Based Security Adam Shostack ShmooCon ‘05 Slides at

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:48:53
12Cyberwarfare / Security / Computer security / ShmooCon / International Computer Security Association / Spyware

Certify Security? Al Potter Premier Services Labs Manager ICSA Labs , PGP Key ID: 0x58C95451

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:49:38
13Computing / ShmooCon / IEEE 802.11 / Kismet / Monitor mode / France Télécom / NetStumbler / Wireshark / Service set / Wireless networking / Software / Technology

Wi-Fi trickery, or how to secure (?), break (??) and have fun with Wi-Fi ShmooCon2006, Washington – January 13-15, 2006 Laurent BUTTI & Franck VEYSSET – France Telecom Division R&D {laurent.butti;franck.veysset} AT f

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:38:55
14System software / Secure Shell / Port knocking / Firewall / Nmap / Vulnerability / OpenSSH / Exploit / Stateful firewall / Software / Computer network security / Computing

Advances In Single Packet Authorization Michael Rash Enterasys Networks, Inc. http://www.cipherdyne.org/ ShmooCon

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:36
15Internet protocols / Port knocking / Secure Shell / Firewall / Port / Pcap / Transmission Control Protocol / Computer network security / Software / Computing

Generalized Single Packet Authorization for Cloud Computing Environments Michael Rash http://www.cipherdyne.org/ ShmooCon February, 2013

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2013-11-03 15:37:37
16Computer network security / Metasploit Project / Exploit / Snort / Attack / Grep / Transmission Control Protocol / Communications protocol / Software / Computer security / Computing

Text Crossing the Streams with State Machines in IDS Signature Languages Michael Rash ShmooCon 2014 FireTalks

Add to Reading List

Source URL: www.cipherdyne.org

Language: English - Date: 2014-01-18 20:47:09
17Social engineering / Spamming / Domain name system / Phishing / CNAME record / Security awareness / Email / ShmooCon / Transaction authentication number / Cybercrime / Internet / Computing

BAKED NOT FIRED UNAUTHORIZED PHISHING BY THE BOLLOCKS Undermine their pompous authority

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:07
18Sybase / PostgreSQL / Oracle Database / Sheeri Cabral / Software / Cross-platform software / Relational database management systems

Why Are Databases So Hard To Secure? Sheeri Kritzer Cabral Database Administrator The Pythian Group, www.pythian.com [removed] Shmoocon 2008

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:06
19Bioinformatics / Genetic mapping / Genome / DNA / Genetics / Genomics / Biology

ShmooCon Presentation Hack the Genome! The Age of Bimolecular Cryptology

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:37
20Copyright / Hacker / Computing / ShmooCon / Information / Copyright law of the United States

Microsoft PowerPoint - SHMOO-09a.ppt

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:38
UPDATE