CarolinaCon 5 March 13, 2009 to March 14, 2009, Raleigh, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Software Reverse Engineering With The Leaf Framework Chris Brown My presentation will briefly cover the basics of static analysis in software reverse engineering. I ... Security Analysis
Anti-Debugging - A Developers Perspective Txs Anti-debugging is the implementation of one or more techniques within computer code that hinders attempts ... Security Access Analysis Malware Development
Detecting The Matrix: Hiding Virtual Machines From Malware Redspot Analyzing malware can be tricky. many malware analysts use virtual machine software, like VMware, to ... Security Malware
Attacking Layer 8: Client Side Penetration Testing Chris Gates (cg) , Vince Marvelli (g0ne) Do you have good perimeter security keeping bad guys from coming in the front door? ... Security Testing
The Security Assessment Methodology Kellep Charles (kc) Conducting regular security assessments on the organizational network and computer systems has become a vital ... Security Analysis
Running Snort And Clamav On Your Wireless Router Ciscostu Bringing the power of Snort and ClamAV to embedded Linux! We’ll start with a sub ... Security Wireless
Leveraging Metasploit Through Nmap Ryan Linn This presentation will discuss how to leverage Metasploit through Nmap in order to fast-track some ... Security
The Day Spam Stopped (The Srizbi Botnet Takedown) Alex Lanstein The Srizbi botnet was responsible for about 75% of all of the spam on Earth. ... Security Routing
The Ten Finger Discount: Philosophy And Ethics Of Modern Piracy Mjg The premise of this talk is to discuss the side of piracy barely represented in ... Security Others Media
Packing & The Friendly Skies Deviant Ollam Do you know that transporting firearms may be the best way to safeguard your tech ... Security