Parent directory/ | - | - |
Wiels-CorruptingTheYouth.m4v | 94M | 2013-Feb-15 11:39 |
Werby-FistfulOfFirehoses.m4v | 101M | 2013-Feb-15 11:39 |
TTL-Penetration-Shmoo.pdf | 64M | 2013-Feb-15 11:39 |
Slyve-AndroidMindReading.m4v | 93M | 2013-Feb-15 11:39 |
TrainingSecurityNerds.ppt | 8M | 2013-Feb-15 11:39 |
Toby_Kohlenberg_Rethinking%20Security-update%20..> | 667K | 2013-Feb-15 11:39 |
Skunkworks-EmergencyDataDestruction.m4v | 101M | 2013-Feb-15 11:39 |
ShmooCon-Whack-a-Mobile.pdf | 5M | 2013-Feb-15 11:39 |
Shmoo-OwnTheCon.m4v | 93M | 2013-Feb-15 11:39 |
ShafferCuevas-RaisingTheWhiteFlag.m4v | 74M | 2013-Feb-15 11:39 |
Schuetz-InsideApplesMDM.m4v | 96M | 2013-Feb-15 11:39 |
Schuetz_BadgeSolution_ClosingSlides.pdf | 5M | 2013-Feb-15 11:39 |
Sample-SofMarkersInAttackAttribution.m4v | 96M | 2013-Feb-15 11:39 |
Quist-MalwareVisualization.m4v | 83M | 2013-Feb-15 11:39 |
Potter-OpeningRemarks.m4v | 101M | 2013-Feb-15 11:39 |
Potter-ClosingRemarks.m4v | 77M | 2013-Feb-15 11:38 |
Patterson-ScienceOfInsecurity.m4v | 93M | 2013-Feb-15 11:38 |
Oh-AVMInception.m4v | 79M | 2013-Feb-15 11:38 |
Paget_shmoocon2012-credit-cards.pdf | 629K | 2013-Feb-15 11:38 |
OConnor-SacrificialComputing.m4v | 99M | 2013-Feb-15 11:38 |
Mudge-CyberFastTrack.m4v | 100M | 2013-Feb-15 11:38 |
Matheson-TTLPenetration.m4v | 101M | 2013-Feb-15 11:38 |
MarpetGostom-37mmAerialSurveillance.m4v | 101M | 2013-Feb-15 11:38 |
MaleticPogue-OPFORWorksBothWays.m4v | 95M | 2013-Feb-15 11:38 |
LarsenEtAl-MalwareAsAnArt.m4v | 79M | 2013-Feb-15 11:38 |
Kovah-TrainingSecurityNerds.m4v | 100M | 2013-Feb-15 11:38 |
Kohlenberg-ModelForEnterpriseDef.m4v | 72M | 2013-Feb-15 11:38 |
Howell-AllYourCodesBelongToMe.m4v | 90M | 2013-Feb-15 11:38 |
Jeong_Wook_Oh_AVM%20Inception%20-%20ShmooCon201..> | 5M | 2013-Feb-15 11:38 |
Keith_Howell_ShmooCon-Jan-2012.pdf | 1M | 2013-Feb-15 11:38 |
HofmannRadcliffe-EncyptionAndDataSecurity.m4v | 78M | 2013-Feb-15 11:38 |
Hoffman-GPSTracking.m4v | 92M | 2013-Feb-15 11:38 |
Gutmann-Keynote.m4v | 79M | 2013-Feb-15 11:38 |
GatheringAllTheDNS.m4v | 100M | 2013-Feb-15 11:38 |
FireTalksSaturday.m4v | 105M | 2013-Feb-15 11:38 |
FireTalksFriday.m4v | 105M | 2013-Feb-15 11:38 |
Fakhourly-DestroyingEvidence.m4v | 101M | 2013-Feb-15 11:38 |
DoingInfoSecRightPt2.m4v | 101M | 2013-Feb-15 11:38 |
DoingInfoSecRightPt1.m4v | 64M | 2013-Feb-15 11:38 |
DeLaGrange-WhackAMobile.m4v | 91M | 2013-Feb-15 11:38 |
Dan-SNSCat.m4v | 96M | 2013-Feb-15 11:38 |
Danny_Quist-3dmalware-shmoocon2012.pdf | 6M | 2013-Feb-15 11:38 |
David_Schuetz_InsideAppleMDM_ShmooCon_2012.pdf | 2M | 2013-Feb-15 11:38 |
CreditCardFraud.m4v | 99M | 2013-Feb-15 11:38 |
ClarkEtAl-InsideTheOODALoop.m4v | 68M | 2013-Feb-15 11:38 |
CarolandConti-LessonsOfTheKobayashiMaru.m4v | 99M | 2013-Feb-15 11:38 |
Char_Sample_ShmooCon2012.pptx | 647K | 2013-Feb-15 11:38 |
Brad_Bowers_Shmoocon%202012.pdf | 6M | 2013-Feb-15 11:38 |
BlackHatsToolChest.m4v | 98M | 2013-Feb-15 11:38 |
Berthaume-JavaBackdoors.m4v | 98M | 2013-Feb-15 11:38 |
BenningerSobell-IntroToNearFieldComm.m4v | 89M | 2013-Feb-15 11:37 |
AtlasofDoom-GhzOrBust.m4v | 69M | 2013-Feb-15 11:37 |
Antoniewicsz-AttackingCardAccess.m4v | 85M | 2013-Feb-15 11:37 |
Agre-CoolNewCrypto.m4v | 92M | 2013-Feb-15 11:37 |
Android_Mind_Reading.pdf | 837K | 2013-Feb-15 11:37 |