Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
DEFCON16_2008.rar
Infohash:
83941E08419C313C0B2BC9CB05555DC948BA2D11
Type:
Books
Title:
DEFCON16_2008.rar
Category:
Other/E-books
Uploaded:
2008-08-17 (by thund3rstruck)
Description:
This is the complete collection of talks from DEFCON 16 which just ended last Sunday (08/10/2008). The original disc was ordered by speaker name, which was impossible to locate specific talks without the schedule so the folder structure has been altered and every talk has been moved to a folder representing the talk.
Presentations are archived in *.rar format (WinRar/UnRar).
Please support DEFCON by attending the conference and/or presenting interesting topics of your own at the DEFCONs to come.
CONTENTS:
Active_HTTPS_Cookie_Hijacking
Advanced_Physical_Attacks
Advanced_Software_Armoring
All_Your_Sploits_Are_Belong_To_Us
Anti-RE_Techniques_For_DRM
Attacking_Social_Networks
Autoimmunity_Disorder_In_Wifi_Networks
A_Hacker_Looks_At_50
Backtrack_Foo_From_Bug_To_0Day
Beholder_New_Wifi_Monitor_Tool
Beyond_Cracking_Your_Neighbors_WEP
Breaking_Crypto_RFID_&_Magstripes
Breaking_In_With_Style
Building_A_Real_Session_Layer
Buying_Time_Whats_Your_Data_Worth
Bypassing_Preboot_Passwords
Captchas_Are_They_Really_Hopeless
Career_Mythbusters
Collaborative_Reversing_With_IdaPro_&_ColLabReate
Comparing_File_Infection_Between_Linux_&_Windows
Compliance_The_Enterprise_Vulnerability_Roadmap
Compromising_Windows_Internet_Kiosks
Could_Googling_Take_Down_A_President
De-Toriate_Anonymity
Dealing_With_The_New_Rules_Of_Electronic_Discovery
Deciphering_Captchas
DEFCON_DAVIX_Workshop
Demonstration_Of_Hardware_Trojans
Digital_Cinema_&_Security
Digital_Security_A_Risky_Business
Evade_IDS_Systems_With_Geospacial_Threat_Detection
Every_Breath_You_Take
Feed_My_SAT_Monkey
First_Nuclear_Hacker
FLUX_On_E.A.S
Forensics_Is_Only_For_Private_Investigators
Free_and_Anonymous_Internet_Using_Modified_Cable_Modems
Gaming_The_Next_Overlooked_Security_Hole
Generic_Unstoppable_Anonymity
Good_Viruses_Evaluating_The_Risks
Grendel_Scan_Web_App_Scanning
Hacking_Data_Retention
Hacking_Desire
Hacking_E.S.P
Hacking_In_The_Name_Of_Science
Hacking_OpenVMS
Ham_For_Hackers_Take_Back_The_Airwaves
Hijacking_The_Digital_Billboard_Network
Howto_Make_Friends_&_Influence_Lock_Manufacturers
How_Can_I_Pwn_Thee
ID_Card_Security_A_History
Insiders_Look_At_State_Voting_Systems
Introducing_Faults_In_SmartCards
Journey_To_The_Center_Of_The_HP28
Keeping_Secrets_Secret
Lets_Sink_The_Phishermans_Boat
Lifecycle_Of_A_Real_World_Breach
Living_In_The_RIA_World
Make_Your_Own_Biofeedback_Video_Game
Making_A_Text_Adventure_Documentary
Making_The_Defcon_16_Badge
Malware_Detection_Via_Network_Filter_Analysis
Malware_RCE_Decrypter_Development
Markets_For_Malware
Medical_Identity_Theft
Medieval_Solutions_To_21st_Century_Problems
MetaPost_Exploitation
Mobile_Hacker_Spaces
ModScan_SCADA_Network_Scanner
Nail_The_Coffin_Shut_NTLM_Is_Dead
NMAP_Scanning_The_Internet
Open_In_30_Seconds_Cracking_Most_Secure_Locks_In_USA
Owning_The_Users_With_Agent_In_The_Middle
Password_Cracking_On_A_Budget
Playing_With_Web_Application_Firewalls
Port_Bunny_Kernel_Based_Port_Scanning
Port_Scanning_Improved
Pushing_The_Camel
RE-Trace_The_Reverse_Engineers_Swiss_Army_Knife
Sniffing_Cable_Modems
SQL_Injection_With_DNS_Exfiltration
StegoFS
Taking_Your_Cellphone_Back
The_Death_Of_Cash_Loss_Of_Anonymity
The_Digital_Armegeddon
The_Emergence_Of_Open_Source_Warfare
The_PenTest_Is_Dead_Long_Live_The_PenTest
The_Wild_World_of_WAFs
The_World_Of_Pager_Sniffing
Time-Based_SQL_Injection_Attacks_With_Heavy_Queries
Toasterkit_A_NetBSD_Rootkit
Tuning_Your_Brain
Understanding_The_Web_Browser_Threat
Under_The_Hood
Urban_Exploration
Virtually_Hacking
VLANs_Layer2_Attacks
VOiper_Smashing_The_VOIP_Stack
VulnCatcher_Fun_With_VTrace
War_Ballooning_Kismit_In_The_Sky
Web_Privacy_&_Flash_Shared_Objects
Whitespace_A_Different_Approach_To_JavaScript_Obfuscation
Working_With_Law_Enforcement
Xploiting_Google_Gadgets
You_Are_Now_BSODomized
Tags:
Files count:
1
Size:
665.93 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
Comments:
spiffness (2008-08-20)
Nice!! Thx!!thund3rstruck (2008-09-17)
In the next week I will be seeding all the video from the conference. It's many, many gigs so it may take a while but I'll do my best! :)thund3rstruck (2008-10-07)
Complete SynchVue(TM) DVD-ROM Video from DEFCON 16. Seed or it will not be around long:http://thepiratebay.se/torrent/4432029/DEFCON_16_DVD_VIDEO_COMPLETE