ToorCamp 2014 July 9, 2014 to July 13, 2014, Neah Bay, Washington
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Intergalactic Plantary: Internetz! | Aaron Grattafiori | In this talk, Aaron will cover the basics of spacecraft communication, challenges for that communication, ... | |
A Study of SMTP [in]Security | Ian Foster , Jon Larson | The Simple Mail Transfer Protocol (SMTP) and related Extended SMTP (ESMTP) are the primary means ... | |
The Hobbyists Guide to Making Organic Light Emitting Diodes | Ian Hanschen | In 2009 I started my own venture to create an OLED for fun. In this ... | |
TrashCam — tracking the Great Pacific Garbage Patch | Pierce Nichols | In the middle of the northern Pacific, massive amounts of plastic garbage from the surrounding ... | |
HOW TO MAKE LOVE TO A ROBOT | Mykle Hansen | Mr. Hansen explains a newly standardized protocol stack for interfacing romantically with a wide variety ... | |
Honey Bee Technology | Hydronics | I’m really into using embedded hardware to make and share projects. I couple of years ... | |
Sharing Economy is THE ECONOMY | Aleksandr | We will briefly talking about companies who are in the sharing economy space. Then I ... | |
Virtual Machine Detection Using OS Status Changes | Xiaoning Li | Our talk is about how to detect virtual machine with OS status changes, which happens ... | |
Offensive Vendor Reviews | Carl Sue | How do you choose who your company trusts? It is said that the best defense ... | |
From (Telnet) Honeypot To Botnet | Jeffery Wilkins | How I went from setting up a telnet/ssh honeypot to reversing some malware using the ... | |
Finding Network Anomalies with Advanced Statistics | M33p | Have you ever tried analyzing your network data using mean & standard deviation? Have you ... | |
Keepassing your credentials synced and under control | Salt | Do you use the same few passwords over and over? Is there a piece of ... | |
secure boot, network boot, verified boot, oh my | Vincent Zimmer | This talk will provide a brief overview of recent trends in platform attacks on ecosystems ... | |
Mesh networking: an answer in search of a problem, and a couple of projects that might just have found them. | Miles | Mesh networking has great curb appeal – it’s such an elegant solution. But real world ... | |
Detecting and Defending against State Actor Surveillance | Robert Rowley | This talk is based on recent leaks that show how state-actors could be engaging in ... | |
What I Learned by Running Socially Responsible Hackathons | Noah Swartz | Since Aaron’s death in January 2013 I and a number of Aaron’s friends have run ... | |
Privacy Badger: stop online trackers in their tracks | Cooper Quintin | In this talk Cooper will introduce the design and implementation of Privacy Badger, EFF’s new ... | |
Dr. Microsoft, How I learned to stop worrying and love NTLM. | Barrett Weisshaar , David "videoman" Bryan | In 2012 Microsoft published an 82 page paper, “Mitigating Pass-the-Hash (PtH) Attacks and Other Credential ... | |
How the Stolen Credit Card Black Market Works | Ken Westin | With the Target data breach, many are wondering how criminals can profit from the use ... | |
Trials and Tribulations in Applying Lang Sec | Joe Rozner , Stephen Weinberg | The goal of Language-Theoretic Security, or Lang Sec, is to identify and stop security flaws ... | |
Optimatization: Linear Programming | Brian Mann | Hackers like to optimize, whether it involves building robots or writing shell scripts. Linear programming ... | |
Raspberry Pi vs Port Forwarding | Jason Biggin | Companies depend on clients to port forward in order to make solutions work. RPi affordability ... | |
Beaglebone Black: A Maker’s Best Friend | Tony Dicola | This 5 minute lightning/ignite style talk will introduce the Beaglebone Black small board embedded Linux ... | |
Time Capsule: Hiding Data From the World | Charles Vaughn | What if we wanted to keep something secret for awhile, with no key to unlock ... | |
The NSA Playset | Michael Ossmann , Dean Pierce | The leaked pages from the ANT catalog have given us unprecedented insight into the capabilities ... | |
Hackerspace Beercology | Matt 'openfly' Joyce | NYC Resistor is housed at 87 3rd Ave in Brooklyn NY. The Warehouse it is ... | |
Extreme Soldering: You Can Do BGA | Marshallh | Long ago, folks building circuit boards started out with UV lights, copper clad boards and ... | |
HamWAN: Running Secure Networks on Amateur Radio | Bart Kus | The FCC rules of using Amateur Radio spectrum are unique in that they explicitly forbid ... | |
Hacking the universe – is everything we know about physics is wrong? | Franklin Hu | Something stinks in the world of physics. We have dark matter and dark energy which ... |