ZaCon 2 Oct. 9, 2010 to Oct. 9, 2010, Johannesburg, South Africa
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Building A Sec Community | Ollie Whitehouse | So how do you build a community?... common interests.. communication... trust... contributions... OCD... all are ... | Security Others Deep Knowledge Community |
Something About Tea | Roelof ( RT ) Temmingh | Security Others Deep Knowledge | |
Selenium – A New Look Into Web Application Reconnaissance | Jurgens Van der merwe | Since the term Web 2.0 has come into play, more and more people have started ... | Security Web Network Penetration |
Iphone Hackery | Ross Simpson | 1. The iPhone Jailbreak 1. what - break out of sandbox 2. why - 3rd ... | Mobile Security Security Rootkits |
Snmp - Simple Network Mediated (Cisco) Pwnage | Georg Christian Pranschke | The Simple Network Management Protocol, which is widely deployed on enterprise networks suffers from several ... | Security Infrastructure Access Network Penetration |
Detecting Backdoors With Network Trickery | Simeon Miteff | An amateur exploration of network-based (assuming no NAC) detection of backdoors in the enterprise LAN ... | Security Infrastructure Firewall Access |
Data Loss Prevention | Stephen Kreusch | Data Leak or Data Loss Prevention (DLP) is a relatively new addition to the suite ... | Security Others Intrusion Detection |
Conficker: ~687 Days Later | Barry Irwin | This talk examines the growth and evolution of the Conficker Worm release on 21 November ... | Security Deep Knowledge |
Dnssec 101 With A Pinch Of Salt | Todor Genov | With DNSSEC finally taking off (ROOT zone being signed) there will be changes in the ... | Security DNS |
Powershell.. What Every Hax0R Needs To Know | Jameel Haffejee | PowerShell (which now ships with Windows 7 / Windows Server 2008) is an extensible automation ... | Security Exploitation Network Penetration |
The Jar Of Joy... | Ian De Villiers | Java applications are fun, easy to reverse and frequently contain tons of really useful information ... | Security Exploitation Analysis |
Breaking The Bank: How To Really Test/Annoy Financial Institutions | Daniel Cuthbert | This talk’s aim is a technical talk, which explains the different approaches taken when assessing ... | Security |
Fig Leaf Security | Haroon Meer | Lies and half lies we tell ourselves in the infosec industry. | Security Others Deep Knowledge Risk |
Who Needs Botnets If You Have Google? | Ivan Burke | We propose to present a talk on Google Gadget hacks. Our work is an extension ... | Security Web |