CarolinaCon6 2010 March 19, 2010 to March 21, 2010, Raleigh, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Cybercrime And The Law Enforcement Response Thomas J. Holt Security Legal Law Enforcement
The Search For The Ultimate Handcuff Key Deviant Ollam , Toool Hardware Reverse Engineering Hardware General
Microcontrollers 101 Nick Fury Hardware Reverse Engineering Hardware General
Hacking With The Iphone Snide Mobile Security Security Hardware Reverse Engineering Hardware General
We Don'T Need No Stinking Badges Shawn Merdinger Security Hardware General
It'S A Feature, Not A Vulnerability Deral Heiland Security Others Application Security
Smart People, Stupid Emails Margaret Mcdonald Security Web Mail
Mitigating Attacks With Existing Network Infrastructure Omar Santos Security Infrastructure Network Penetration
Omg, The World Has Come To An End!!! Felonious Fish Others
You Spent All That Money And You Still Got Owned Joe Mccray Security
Locks: Past, Picking, And Future Squ33k Security Hardware Reverse Engineering Hardware General
The Art Of Software Destruction Terron Williams , Joshua Morin Security Application Security
Why Linux Is Bad For Business Wxs Security Unix Business
The Evolution Of Social Engineering Dawn Perry , Chris Silvers Social Engineering
Metasploit Ryan Linn Automation
How The Droid Was Rooted Michael Goffin Mobile Security Hardware Reverse Engineering Hardware General
Protecting Systems Through Log Mgmt And System Integrity David Burt Security Monitoring