ShmooCon

Results: 49



#Item
31Computing / Aspect-oriented software development / Java enterprise platform / Cross-platform software / Web application frameworks / Spring Framework / AspectJ / Compass / Aspect / Software development / Software / Aspect-oriented programming

Security Solutions & Training AOP & Security • Using Aspect Oriented Programming to

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:07
32Federal Rules of Civil Procedure / Metadata / Lawsuit / Deposition / Mediation / Zubulake I / Legal hold / Law / Discovery / Technical communication

When Lawyers Attack! - Dealing With the New Rules of Electronic Discovery John E. Benson, Esq. A Companion to the Presentation Given at Shmoocon IV

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:16
33Technology / Wireless / Extensible Authentication Protocol / IEEE 802.1X / Wireless security / Xsupplicant / Wpa supplicant / FreeRADIUS / RADIUS / Wireless networking / Computing / Computer network security

PEAP: Pwned Extensible Authentication Protocol ShmooCon 2008 Joshua Wright, [removed]

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:09
34Local area networks / Virtual LAN / ShmooCon

Countering Attacks at Layer 2

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:38:56
35Spud gun / Fluid dynamics / Tubing / Valve / Cannon / Recreation / Hacker conventions / Water / ShmooCon

Building the 2008 and 2009 ShmooBall Launchers Its a series of tubes! Pneumatic tubes! Introductions

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:38
36Data / Data security / Non-volatile memory / Gordon Hughes / DBAN / Data remanence / Solid-state drive / Hard disk drive / Data recovery / Computer hardware / Computing / Data erasure

PDF Document

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:38
37Computing / Intrusion prevention system / Intrusion detection system / Extrusion detection / Computer security / Sguil / Computer network security / Security / Cyberwarfare

Traditional IDS Should Be Dead Richard Bejtlich [removed] www.taosecurity.com / taosecurity.blogspot.com 1

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
38Shellcode / Instruction set architectures / Metasploit Project / X86 / Computer security / Cyberwarfare / Computer architecture

Microsoft PowerPoint - Shmoocon2008.pptx

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:09
39System software / Wi-Fi / Airjack / HostAP / IEEE 802.11 / Packet injection / Software / Wireless security / Lorcon / Device drivers / Computer network security / Computing

Extensible[removed]Packet Flinging ShmooCon 2007 Joshua Wright, Aruba Networks Mike Kershaw, Aruba Networks

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
40Technology / Voice over IP / Broadband / Cisco Systems / WiFi phone / Mobile VoIP / Videotelephony / Electronic engineering / Electronics

VoIP WiFi Phone Handset Security Analysis: We’ve met the enemy…and they built our stuff?!? Shawn Merdinger Security Analyst, TippingPoint

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:38:56
UPDATE