Blackhat USA 1999 July 7, 1999 to July 8, 1999, Las Vegas, USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Many Of My Projects And Papers Are Written From The Perspective Of The Unwanted Intruder. Why? Because It Is Simply Much More Interesting. I Remember A Movie Where Some Girl Didn'T Like The Bank Robbe | Dr. Mudge | None | Security |
Modern Netware Hacking | Simple Nomad | Computer security is one of those topics that most Novell NetWare system administrators think is ... | Security Web Access |
Thursday Keynote | Dr. Mudge | Appliance Firewalls: A Detailed Review Brent Huston Firewalls seem to be everywhere these days, and ... | Security Keynote |
Over The Router, Through The Firewall, To Grandmaâs House We Go. | Eric Schultze , George Kurtz | This will be a cross-platform hack demonstration taking everyone over a router, through a firewall ... | Security Firewall |
Nt Network Security Specialist, Nt Objectives. | Jd Glaser | Auditing NT - Catching Greg Hoglund This talk will address the issue of auditing an ... | Security Auditing |
Security Issues Affecting Internet Transit Points And Backbone Providers. | Batz | Many sites believe that the only external threats to their network come from unsophisticated script ... | Security Routing |
Security Issues With Implementing And Deploying The Ldap Directory System. | Peter Shipley , Tom Jackiewicz | The popularity of LDAP is increasing and is thus resulting in it's rapidly replacing NIS, ... | Security |
Building A Forensic Toolkit That Will Protect You From Evil Influences | Dominique Brezinski | When responding to computer security incidents, you will invariably have to work on compromised hosts. ... | Security Analysis |
Overview Of Certification Systems: X.509, Ca, Pgp And Skip. | Ed Gerck | Cryptography and certification are considered necessary Internet features and must be used together, for example ... | Security Privacy Community Legal |
Vpn Architectures: Looking At The Complete Picture. | David Bovee | VPN continues to be a complex subject due to the multitude of products and protocols. ... | Security Access |
Introduction To Cyber Forensic Analysis | Peter Stephenson | This session will address the techniques used to investigate network-based intrusions, especially those originating from ... | Security Analysis |
Secure Dns Solutions | Rooster | This talk will discuss the many security issues with DNS and what is being done ... | Security DNS |
Firewalk | Mike ( Route ) D. Schiffman | Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet ... | Security Analysis |
Burglar Alarms And Booby Traps | Marcus Ranum | Many network managers ignore the single biggest weapon they have against hackers: the home court ... | Security Web |
Mistakes And Blunders: A Hacker Looks At Cryptography | Bruce Schneier | From encryption to digital signatures to electronic commerce to secure voting--cryptography has become the enabling ... | Security Cryptography |
1000 Hackers In A Box: Failings Of Security Scanners | Greg Hoglund | Last year saw the boom of commercial "security scanners", the very same technology that Dan ... | Security |
Viruses In The Information Age | Sarah Gordon | Understanding how the virus writers operate, how they perceive their world and the world around ... | Security |
Hope, Hype, Horrors... E-Commerce Explored | Larry Korba | There is currently a great deal of hype surrounding the tremendous growth and potential of ... | Security |
How Responsive Are Vendors To Security Problems When They Aren'T Being Pressured By Someone Threatening To Go Public? | Jeremy Rauch | Hundreds, if not thousands, of machines are unnecesarily compromised each day. But most of these ... | Security |
Towards A Taxonomy Of Network Security Testing Techniques. | Adam Shostack | Security scanners such as SATAN are poorly understood by almost everyone who has never written ... | Security Testing |
Security Ideas From All Over And Internet Mapping Project | William R. Cheswick | As a security guy who has travelled a bit, I've come to agree with a ... | Security |
Security Issues With Configuring And Maintaining An Iis 4 Server | Eugene Schultz | Before coming to Global Integrity, he was the Principal and Information Security Practice Leader for ... | Security |
Total Bs Security: Business-Based Systems Security. | Jim Litchko | Selecting your systems security solutions can be two of the most frustrating problem for security ... | Security Business |
Protecting Americaâs Cyberspace: Version 1.0 Of The National Plan | Dr. Hunker | None | Security |
Open Source Monitoring: | Rob Karas | Open Source Monitoring (OSM) is becoming more of a necessity in today's electronic market. Today ... | Security |
Putting Intrusion Detection Into Intrusion Detection Systems | Jon David | Most, if not all, activities of present intrusion detection systems are involved with the detection ... | Security Intrusion Detection |
Forensic Issues In Hacker Prosecutions | Jennifer Granick | None | Security |
Taxonomy Of Intrusion Detection Systems | Teresa Lunt | None | Security |
Building A Security Response Process | Scott Culp | Customers' increasing need for secure software products is causing many software vendors to change their ... | Security Development |
Panel Discussion - Introduction To The White Hat Track, Overview Of Security Challenges From The Inside. | John d. Davis , Will Ozier , Nebel , Migues | None | Security Panel |
Overlooked Local Attack Techniques | Padgett Peterson | Those few companies that take information security seriously are often bewildered by the incredible array ... | Security Testing |
Introduction To The White Hat Tack - Panel | G. Alec Tatum | None | Security Panel |
Managing The External Environment | Lori L. Woehler | None | Security |