ToorCamp 2014 July 9, 2014 to July 13, 2014, Neah Bay, Washington

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Intergalactic Plantary: Internetz! Aaron Grattafiori In this talk, Aaron will cover the basics of spacecraft communication, challenges for that communication, ...
A Study of SMTP [in]Security Ian Foster , Jon Larson The Simple Mail Transfer Protocol (SMTP) and related Extended SMTP (ESMTP) are the primary means ...
The Hobbyists Guide to Making Organic Light Emitting Diodes Ian Hanschen In 2009 I started my own venture to create an OLED for fun. In this ...
TrashCam — tracking the Great Pacific Garbage Patch Pierce Nichols In the middle of the northern Pacific, massive amounts of plastic garbage from the surrounding ...
HOW TO MAKE LOVE TO A ROBOT Mykle Hansen Mr. Hansen explains a newly standardized protocol stack for interfacing romantically with a wide variety ...
Honey Bee Technology Hydronics I’m really into using embedded hardware to make and share projects. I couple of years ...
Sharing Economy is THE ECONOMY Aleksandr We will briefly talking about companies who are in the sharing economy space. Then I ...
Virtual Machine Detection Using OS Status Changes Xiaoning Li Our talk is about how to detect virtual machine with OS status changes, which happens ...
Offensive Vendor Reviews Carl Sue How do you choose who your company trusts? It is said that the best defense ...
From (Telnet) Honeypot To Botnet Jeffery Wilkins How I went from setting up a telnet/ssh honeypot to reversing some malware using the ...
Finding Network Anomalies with Advanced Statistics M33p Have you ever tried analyzing your network data using mean & standard deviation? Have you ...
Keepassing your credentials synced and under control Salt Do you use the same few passwords over and over? Is there a piece of ...
secure boot, network boot, verified boot, oh my Vincent Zimmer This talk will provide a brief overview of recent trends in platform attacks on ecosystems ...
Mesh networking: an answer in search of a problem, and a couple of projects that might just have found them. Miles Mesh networking has great curb appeal – it’s such an elegant solution. But real world ...
Detecting and Defending against State Actor Surveillance Robert Rowley This talk is based on recent leaks that show how state-actors could be engaging in ...
What I Learned by Running Socially Responsible Hackathons Noah Swartz Since Aaron’s death in January 2013 I and a number of Aaron’s friends have run ...
Privacy Badger: stop online trackers in their tracks Cooper Quintin In this talk Cooper will introduce the design and implementation of Privacy Badger, EFF’s new ...
Dr. Microsoft, How I learned to stop worrying and love NTLM. Barrett Weisshaar , David "videoman" Bryan In 2012 Microsoft published an 82 page paper, “Mitigating Pass-the-Hash (PtH) Attacks and Other Credential ...
How the Stolen Credit Card Black Market Works Ken Westin With the Target data breach, many are wondering how criminals can profit from the use ...
Trials and Tribulations in Applying Lang Sec Joe Rozner , Stephen Weinberg The goal of Language-Theoretic Security, or Lang Sec, is to identify and stop security flaws ...
Optimatization: Linear Programming Brian Mann Hackers like to optimize, whether it involves building robots or writing shell scripts. Linear programming ...
Raspberry Pi vs Port Forwarding Jason Biggin Companies depend on clients to port forward in order to make solutions work. RPi affordability ...
Beaglebone Black: A Maker’s Best Friend Tony Dicola This 5 minute lightning/ignite style talk will introduce the Beaglebone Black small board embedded Linux ...
Time Capsule: Hiding Data From the World Charles Vaughn What if we wanted to keep something secret for awhile, with no key to unlock ...
The NSA Playset Michael Ossmann , Dean Pierce The leaked pages from the ANT catalog have given us unprecedented insight into the capabilities ...
Hackerspace Beercology Matt 'openfly' Joyce NYC Resistor is housed at 87 3rd Ave in Brooklyn NY. The Warehouse it is ...
Extreme Soldering: You Can Do BGA Marshallh Long ago, folks building circuit boards started out with UV lights, copper clad boards and ...
HamWAN: Running Secure Networks on Amateur Radio Bart Kus The FCC rules of using Amateur Radio spectrum are unique in that they explicitly forbid ...
Hacking the universe – is everything we know about physics is wrong? Franklin Hu Something stinks in the world of physics. We have dark matter and dark energy which ...