ZaCon 2 Oct. 9, 2010 to Oct. 9, 2010, Johannesburg, South Africa

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Building A Sec Community Ollie Whitehouse So how do you build a community?... common interests.. communication... trust... contributions... OCD... all are ... Security Others Deep Knowledge Community
Something About Tea Roelof ( RT ) Temmingh Security Others Deep Knowledge
Selenium – A New Look Into Web Application Reconnaissance Jurgens Van der merwe Since the term Web 2.0 has come into play, more and more people have started ... Security Web Network Penetration
Iphone Hackery Ross Simpson 1. The iPhone Jailbreak 1. what - break out of sandbox 2. why - 3rd ... Mobile Security Security Rootkits
Snmp - Simple Network Mediated (Cisco) Pwnage Georg Christian Pranschke The Simple Network Management Protocol, which is widely deployed on enterprise networks suffers from several ... Security Infrastructure Access Network Penetration
Detecting Backdoors With Network Trickery Simeon Miteff An amateur exploration of network-based (assuming no NAC) detection of backdoors in the enterprise LAN ... Security Infrastructure Firewall Access
Data Loss Prevention Stephen Kreusch Data Leak or Data Loss Prevention (DLP) is a relatively new addition to the suite ... Security Others Intrusion Detection
Conficker: ~687 Days Later Barry Irwin This talk examines the growth and evolution of the Conficker Worm release on 21 November ... Security Deep Knowledge
Dnssec 101 With A Pinch Of Salt Todor Genov With DNSSEC finally taking off (ROOT zone being signed) there will be changes in the ... Security DNS
Powershell.. What Every Hax0R Needs To Know Jameel Haffejee PowerShell (which now ships with Windows 7 / Windows Server 2008) is an extensible automation ... Security Exploitation Network Penetration
The Jar Of Joy... Ian De Villiers Java applications are fun, easy to reverse and frequently contain tons of really useful information ... Security Exploitation Analysis
Breaking The Bank: How To Really Test/Annoy Financial Institutions Daniel Cuthbert This talk’s aim is a technical talk, which explains the different approaches taken when assessing ... Security
Fig Leaf Security Haroon Meer Lies and half lies we tell ourselves in the infosec industry. Security Others Deep Knowledge Risk
Who Needs Botnets If You Have Google? Ivan Burke We propose to present a talk on Google Gadget hacks. Our work is an extension ... Security Web