ShmooCon

Results: 49



#Item
41Credit cards / Radio-frequency identification / Ubiquitous computing / Money / Finance / EMV / Smart card / Contactless payment / Chip and PIN / Payment systems / Technology / ISO standards

Credit Card Fraud The Contactless Generation Kristin Paget Chief Hacker, Recursion Ventures [removed]

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2012-02-12 20:05:57
42Computer programming / Control flow / JavaScript / Scripting languages / SpiderMonkey / Eval / Shellcode / GetElementById / Hooking / Computing / Software engineering / Cross-platform software

Jsunpack: An Automatic JavaScript Unpacker http://jsunpack.jeek.org/ Shmoocon, Washington DC Sunday February 8, 2009 Blake Hartstein

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:37
43Electronic engineering / Software testing / Electronics / Computer network security / Technology / Broadband / Videotelephony / Voice over IP

Introduction Having Fun/Demo Fuzzing

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:09
44Software / Apple Push Notification Service / Mac OS X / Mobile device management / IPhone / Push technology / Push Access Protocol / Apple Inc. / IOS / Computing

Inside Apple’s MDM Black Box David Schuetz, Senior Consultant aka Darth Null [removed]

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2012-02-26 20:53:48
45Computer network security / Iptables / Netfilter / Snort / Firewall / System software / Software / Computer security

Attack Detection and Response with  Linux Firewalls Michael Rash Security Architect Enterasys Networks, Inc. http://www.cipherdyne.org/

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
46Computer security / Software testing / Multi-agent systems / Spamming / Botnet / Penetration test / Exploit / Social engineering / X Window System / Computing / Hacking / Computer network security

They’re Hacking Our Clients! Why Are We Only Vuln Assessing Servers? Jay Beale Creator - Bastille UNIX Co-Founder - Intelguardians, Inc.

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:07
47Software testing / Security / Hacking / OWASP / Vulnerability / Cascading Style Sheets / XPath / Computer security / Computing / Cyberwarfare

Path X Explosive Security Testing Tools with XPath Many faces of security testing • Interesting questions

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:07
48Export / Free trade / Rice / Raleigh Bicycle Company / Business / International trade / Dumping

Next Generation Wireless Recon, Visualizing the Airwaves Joshua D. Abraham - GISKismet / Perl Ben Smith

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:41
49Computer architecture / Mobile computers / Shellcode / Pocket PC / Windows Mobile / Personal digital assistant / Buffer overflow / ARM architecture / Interactive Disassembler / Computing / Windows CE / Software

Microsoft PowerPoint - shmoo2007_conference.ppt

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
UPDATE