Blackhat USA 1999 July 7, 1999 to July 8, 1999, Las Vegas, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Many Of My Projects And Papers Are Written From The Perspective Of The Unwanted Intruder. Why? Because It Is Simply Much More Interesting. I Remember A Movie Where Some Girl Didn'T Like The Bank Robbe Dr. Mudge None Security
Modern Netware Hacking Simple Nomad Computer security is one of those topics that most Novell NetWare system administrators think is ... Security Web Access
Thursday Keynote Dr. Mudge Appliance Firewalls: A Detailed Review Brent Huston Firewalls seem to be everywhere these days, and ... Security Keynote
Over The Router, Through The Firewall, To Grandmaâs House We Go. Eric Schultze , George Kurtz This will be a cross-platform hack demonstration taking everyone over a router, through a firewall ... Security Firewall
Nt Network Security Specialist, Nt Objectives. Jd Glaser Auditing NT - Catching Greg Hoglund This talk will address the issue of auditing an ... Security Auditing
Security Issues Affecting Internet Transit Points And Backbone Providers. Batz Many sites believe that the only external threats to their network come from unsophisticated script ... Security Routing
Security Issues With Implementing And Deploying The Ldap Directory System. Peter Shipley , Tom Jackiewicz The popularity of LDAP is increasing and is thus resulting in it's rapidly replacing NIS, ... Security
Building A Forensic Toolkit That Will Protect You From Evil Influences Dominique Brezinski When responding to computer security incidents, you will invariably have to work on compromised hosts. ... Security Analysis
Overview Of Certification Systems: X.509, Ca, Pgp And Skip. Ed Gerck Cryptography and certification are considered necessary Internet features and must be used together, for example ... Security Privacy Community Legal
Vpn Architectures: Looking At The Complete Picture. David Bovee VPN continues to be a complex subject due to the multitude of products and protocols. ... Security Access
Introduction To Cyber Forensic Analysis Peter Stephenson This session will address the techniques used to investigate network-based intrusions, especially those originating from ... Security Analysis
Secure Dns Solutions Rooster This talk will discuss the many security issues with DNS and what is being done ... Security DNS
Firewalk Mike ( Route ) D. Schiffman Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet ... Security Analysis
Burglar Alarms And Booby Traps Marcus Ranum Many network managers ignore the single biggest weapon they have against hackers: the home court ... Security Web
Mistakes And Blunders: A Hacker Looks At Cryptography Bruce Schneier From encryption to digital signatures to electronic commerce to secure voting--cryptography has become the enabling ... Security Cryptography
1000 Hackers In A Box: Failings Of Security Scanners Greg Hoglund Last year saw the boom of commercial "security scanners", the very same technology that Dan ... Security
Viruses In The Information Age Sarah Gordon Understanding how the virus writers operate, how they perceive their world and the world around ... Security
Hope, Hype, Horrors... E-Commerce Explored Larry Korba There is currently a great deal of hype surrounding the tremendous growth and potential of ... Security
How Responsive Are Vendors To Security Problems When They Aren'T Being Pressured By Someone Threatening To Go Public? Jeremy Rauch Hundreds, if not thousands, of machines are unnecesarily compromised each day. But most of these ... Security
Towards A Taxonomy Of Network Security Testing Techniques. Adam Shostack Security scanners such as SATAN are poorly understood by almost everyone who has never written ... Security Testing
Security Ideas From All Over And Internet Mapping Project William R. Cheswick As a security guy who has travelled a bit, I've come to agree with a ... Security
Security Issues With Configuring And Maintaining An Iis 4 Server Eugene Schultz Before coming to Global Integrity, he was the Principal and Information Security Practice Leader for ... Security
Total Bs Security: Business-Based Systems Security. Jim Litchko Selecting your systems security solutions can be two of the most frustrating problem for security ... Security Business
Protecting Americaâs Cyberspace: Version 1.0 Of The National Plan Dr. Hunker None Security
Open Source Monitoring: Rob Karas Open Source Monitoring (OSM) is becoming more of a necessity in today's electronic market. Today ... Security
Putting Intrusion Detection Into Intrusion Detection Systems Jon David Most, if not all, activities of present intrusion detection systems are involved with the detection ... Security Intrusion Detection
Forensic Issues In Hacker Prosecutions Jennifer Granick None Security
Taxonomy Of Intrusion Detection Systems Teresa Lunt None Security
Building A Security Response Process Scott Culp Customers' increasing need for secure software products is causing many software vendors to change their ... Security Development
Panel Discussion - Introduction To The White Hat Track, Overview Of Security Challenges From The Inside. John d. Davis , Will Ozier , Nebel , Migues None Security Panel
Overlooked Local Attack Techniques Padgett Peterson Those few companies that take information security seriously are often bewildered by the incredible array ... Security Testing
Introduction To The White Hat Tack - Panel G. Alec Tatum None Security Panel
Managing The External Environment Lori L. Woehler None Security