THOTCON 1 April 23, 2010 to April 23, 2010, Chicago, USA

Event Page

Notes :

Tell us about missing data
Title Speakers Summary Topic Types
Hacking With Gnu Radio David ( VideoMan ) Bryan This presentation will focus on the requ irements for GnuRadio, cost, code, and r adio ... Hardware Reverse Engineering
How Everyone Screws Up Ssl Michael Coates SSL has taken many hits over the past ye ar. From the MD5 rogue certificate ... Web Security
30K Foot Look At Wifi Luiz "effffn" Eduardo Inflight WiFi is really nothing new, but , it's a growing thing in the US ... Wireless
Trolling Reverse-Engineers W/Math Frank^2 Did you ever sit around in your trigonom etry class in high school wondering why ... Reverse Engineering
War Driving For Warehouses Rob Havelt Focusing on mostly industrial areas with warehouse facilities that have been aro und at least ... Wireless
Top 5 Ways In A Data Center Ryan Jones This speech would go over the top 5 most common ways to breach the physical ... Physical Pentesting
Dr. Evil'S Guide To Web 2.0 Rafal Los You have no choice but to deal with the “Web 2.0 phenomenon” … but most ... Web Security
Beholder Wids Tool Nelson Murilo Although it's not something new, network administrators are still facing old pro blems. One of ... Application Security
Where Did Those Damn Packets Go? Kevin A Nassery Passive network monitoring has been a fo undational to network security architect ures for over ... Security Infrastructure Access Monitoring
Forensic Fail Chris Neckar , Greg Ose Forensic analysis is one of the least de veloped areas of computer security. Inve stigations ... Forensics
Virus Writing Techniques Tim Sally The state of software security in early 1990 was abysmal; vendors relied on secu rity ... Security Malware
Stratagem 1 - ???? Jayson E Street There are new threats arising everyday. The problem is there has been a vulnerab ility ... Security Firewall