Balcon 2015 Sept. 11, 2015 to Sept. 13, 2015, Vojvodina, Serbia

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
27 Kilometers of Fun Michael Büker An entertaining talk about the purpose and workings of particle accelerators:...
ALE and the Zombie Apocalypse Abakalov Lecture about the origins and the role of amateur radio in emergency...
Attacking the Unknown Mohamed Bedewi In this presentation, I will discuss automating the process of identifying,...
Building a Cyber Security Operations Center for SCADA/ICS Shah Abstract: Modern day cyber threats are ever increasing in sophistication and...
Common Oops in DevOps Kost While DevOps gained in popularity over few years, looks like security is not...
Creative/hacker's way to use ELK stack Milan Gabor Visualizing Wi-Fi traffic is today more or less limited to console windows...
CryptoParty Marie Gutbub Would you like someone to listen to your private conversations? Would you...
CryptoParty meeting Marie Gutbub CryptoParty is a decentralized, selforganized, global movement. This means...
CryptoParty must die Marie Gutbub Privacy is a basic human right - a right that is not respected. To reclaim...
Designing firmware upgrades around FreeBSD’s pkgng Franco Over the course of the last 8 months, the OPNsense team spent their efforts...
DIY Single Chip Retro Game Console" Intro: How-to Guide to the Identification of Harware Parts and Basic Measurements Marjan Urekar Intro to the Voja Antonić's DIY Single Chip Game Console Workshop. Learn how...
don't lie to me Aluc The human Body gives tells when one is lying. I will show you where to ...
Experimental Fermentation Institutes Network (EFIN) Frnatisek Algoldor Apfelbeck This talk introduces the concept of experimental, educational and production...
Exploit Development for N00bs Alper Basaran This lecture aims to provide attendees with an introduction to vulnerability...
FFmpeg's FFV1 lossless video codec Peter Bubestinger This is the story of FFV1, a video codec suitable for lossless editing and...
Gamer's workshop Voja Single-chip 2D Retro Game...
(Go)ne Phishing Vyrus This presentation will illustrate the many ways several of the features...
Hacking Humans Movements Nikola Rasovic I will present my new system that hacks humans brain signals.I will present...
Ham's not dead! Abakalov Meeting with the amateur (ham) radio operators, demonstration of digital...
How to throw a CryptoParty Marie Gutbub , Osm-srbija The thought of teaching in general, but security in particular, can be quite...
How to use OpenStreetMap Joakim A review of tools and apps that are not just alternatives.
how you could build a backbone Pcdog I'm building the Backbone for AS58299 based on a OSI-Layer-3 Core with MPLS....
I come in peace Marie Gutbub , Pwnalltheapps Tech is for everyone. Unfortunately hackerspaces, conferences and the tech...
Introduction to Web Application Penetration Testing Alper Basaran This course aims to take beginners through a step by step training on...
Invisible Infrastructures A.petrovski he Internet in its essence is not what most people perceive when online. It...
Maker NS Zoran Roncevic Project "Creative Workshop - MAKER", first MakerSpace designed for young...
MAME and preservation of software Miodrag Milanovic General talk about preservation of software and why MAME exists, our goals...
Manufacture the world 3D Printing Djordje Markovic Presentation about 3D Printing Principes Technologies Realisations...
Passwords and passphrases? Petar Password weaknesses, week passwords and reusing them. Switching to...
Paypal's War On Terror Viking N/A
Polyglots in Amateur Radio Travis Goodspeed Through amateur radio, a neighbor can transmit digital messages around the...
Power of open sourcing - GrassGIS Vida Spatial modeling and visualization different geodetic data for analysig...
Practical use of drones in everyday life Nemanja Stefanovic Practical use of drones in everyday life is a lecture about the usage of...
Private communications with mobile phones in the post-Snowden world, the _open_source_ way Sharkey Secure, easy to use tools are already here, don't wait for that old adage...
Rasterising Legal Layer Ptiki There is an invisible legal layer on the internet that we all agreed to when...
Run your own fucking infrastructure Mc.fly N/A
Securing Your Networks With OPNsense Franco OPNsense is a fork of pfSense that aims at following FreeBSD's code base and...
Situation Awareness for Journalists Bernd R. Fix A theoretical seminar and a practical workshop for journalists about...
The art and Science of Security Management Alper Basaran Information security isn't alway about "0-days", "pwning boxes" or getting...
The Digital Cockroach Bait Station Robert Simmons Spam honeypots are an excellent way to gather malware binaries as well as...
Touchless Control in Our World Onuralp Sezer In this presentation We going to show touchless control with 2 devices and...
Virtual machine inventory Ivica Kolenkaš Multi-hypervisor environments increase the difficulty of keeping track of...