ConCollector
our blog
|
more on thinkst
Search:
Everything
Browse:
Speakers
Conferences
Topics
Contributors
Analytics
Folklore
About
Login
Nullcon 2011
Feb. 25, 2011 to Feb. 26, 2011, Goa, India
Tell us about missing data
Title
Speakers
Summary
Topic Types
No Bullshit On Underground Crime: Traces, Trends, Attribution, Techniques And More
Fyodor Yarochkin
None
Security
Lessons Learned From 2010
Saumil Udayan Shah
None
Security
Penetration Testing A Biometric System
Rahul Sasi
None
Security
Cyber Crime 101: Cost Of Cyber Crime, Trends And Analysis
Shashidhar
None
Security
Incident Management And Beyond
Dinesh Bareja
None
Security
Enterprise Paradigm For Controlling Data Leakage
Deepak Rout
None
Security
Protect Infrastructure Of Protect Information Ñ Lessons From Wikileaks
Vishal Gupta
None
Security
Information Warfare Ñ The Indian Perspective
Alok Vijayant
None
Security
Future Of Cyber Crimes: Limitations And Challenges
Pratap Reddy
None
Security
Vulnerabilities And Malware: Statistics And Research For Malware Identification
Wolfgang Kandek
None
Security
Building An Intelligence Analysis Systems Using Open Source Tools
Fyodor Yarochkin
None
Security
Chupa Rustam
Abhijeet Hatekar
None
Security
Security And Forensic Discovery In Cloud Environments
Manu Zacharia
None
Security
Zeus Mitmo Ñ A Real Case Of Banking Fraud Through Mobile Phones
Mikel Gastesi
,
Jose Miguel Esparza
None
Security
Botnet Detection Approach By Dns Behavior And Clustering Analysis
Nilesh Sharma
,
Pulkit Mehndiratta
None
Security
Fuzzing With Complexities
Vishwas Sharma
None
Security
Reversing Microsoft Patches To Reveal Vulnerable Code
Harsimran Walia
None
Security
Memory Analysis Ñ Looking Into The Eye Of The Bits
Assaf Nativ
None
Security
Exploiting Scada Systems
Jeremy Brown
None
Security
Hacking The Parliament A Classic Social Engineering Attack
Anurag Dhanda
None
Security
Security Analysis Of Indiaís Electronic Voting Machines: Memoirs Of A Whistleblower
Hari Prasad
None
Security
Automatic Program Analysis Using Dynamic Binary Instrumentation
Sunil Kumar
None
Security
Sslsmart Ñ Smart Ssl Cipher Enumeration
Gursev Singh Kalra
None
Security
Json Fuzzing: New Approach To Old Problems
Prashant Kv
,
Tamaghna Basu
None
Security
Jugaad Beta: Linux Thread Injection For Malware Poc
Aseem "@" Jakhar
None
Security
Buffer Underrun Exploits
Chinmaya Kamal
,
Saurabh Sharma
None
Security