Notacon 7 April 15, 2010 to April 18, 2010, Cleveland, USA
Tell us about missing data
Title Speakers Summary Topic Types
Scada And Ics For Security Experts: How To Avoid Cyberdouchery James Arlen The traditional security industry has somehow decided that they are the white knights who are ...
Hacking 73H 0R3G0N 7R41L For The Apple ][ Melissa Barron Melissa will talk about her art mod of the Apple ][ game "The Oregon Trail" ...
Do You Want To Play A Game?: Game Theory And Simulated Cyber War Angus Blitter Modern warfare is more about bandwidth than bombs. Powerful nations boast amazing technical capabilities. However, ...
Building A Digital City Marc Canter Creating Jobs by producing on-line multimedia content and putting that content onto free shared servers ...
Why Your Software Project Sucks (And How To Make It Not Suck) Cat Food Most software projects suck. They're often ill-defined, resource-deprived, badly managed, and very often not even ...
The Past, Present, And Future Of Advanced Attacks Seth Chromick There are hundreds of thousands of malware, worms, and viruses that can annoy or destroy, ...
Social Engineering Security Into Your Business Mick Douglas , James Arlen , Brandon Knight , Chris Clymer Finding security vulnerabilities is easy. Getting them remediated is HARD. Many of the real problems ...
Anti-Forensics Adrian Crenshaw This talk will intro the basics of Anti-forensics, how people hide data and events on ...
Hidden Trust Relationships, An Exploration Dead Addict Some time ago I was asked to analyze a very simple dialog box - "Do ...
Mine'S Smaller Than Yours: Chemistry And Nanotechnology In A Hackerspace And/Or Home Lab Sacha Deangeli In the past few decades, public opinion of chemistry has changed from a benign and ...
Computer Geeks Can Do Humanitarian Work Too Tod Detre , Gina Hoang We recently had the experience of doing humanitarian work in Haiti. The demand for a ...
U R Doin It Wrong Info Disclosure Over P2P Networks Mick Douglas Brief recap on the P2P data leakage work the PaulDotCom crew has done in the ...
Nospex -- Giving Process Interaction A Visual Context Scott Dunlop Hackers use abstract terms to describe the interaction between processes in a system. Terminologies like ...
Conlanging 101 Sai Emrys Learn why people make languages (aka the art & craft of conlanging), what kinds of ...
Defense In-Depth: Penetration Starts With A Lack Of System Hardening Steve Erdman Looking at the exploits and malware that have been discovered and unleashed over the last ...
Surviving The Zombie Apocalypse Tom Eston , Chris Clymer , Matthew Neely , Theconfused Greenies Outbreaks of new virus such as H1N1 are a disturbing trend in recent medical history. ...
Bots And Copper: Milling Circuit Boards Thomas Fritz One of the basic technologies of modern gadgets, the printed circuit board, requires expensive equipment, ...
Hacking The Future: Weaponizing The Next Generation Leigh ( Hypatiadotca ) Honeywell , Tiffany Rad , James Arlen , Jillian Loslo Join this panel of experts who will discuss, debate, enlighten, and do battle on the ...
Malicious Pdf Analysis Int Eighty This presentation covers the identification, extraction, and analysis of malicious code in PDF files. Your ...
A Treatise On Optoelectronics In Art And Electronic Design. Matt Joyce So last year I embarked upon an incredible journey into the world of display technology. ...
The Social-Engineering Toolkit (Set) - Putting Cool Back Into Se David Kennedy The Social-Engineer Toolkit (SET) has become a standard when it comes to social-engineering attacks and ...
The Haiku Of Security: Complexity Through Simplicity Jeff ( ghostnomad ) Kirsch You may ask yourself what Japanese poetry and information security have in common. What is ...
Newbie Neurohacking Ne0nra1n , Tottenkoph Have a keen interest in the many flavours of neurohacking, but don't know where to ...
Hey, Don'T Call That Guy A Noob: Toward A More Welcoming Hacker Community Nicolle ( rogueclown ) Neulist The hacker community strives to develop and exchange cutting-edge ideas. A key component of achieving ...
Flash Hackery Peter Nitsch Peter, a self-professed code art addict, will chronicle his work and shed some light into ...
The Art Of Akira - Why Doing It The Hard Way Matters Joe Peacock Believe it or not, there was a time when animation was done without the use ...
How To Finance A Supercomputer In Three Easy Step Christina ( Fabulous ) Pei I want to discuss financial hacking for new and existing hacker spaces, and to attack ...
Hacking Your Car: Reverse Engineering Protocols, Legalities And The Right To Repair Act Tiffany Rad Car sales are declining and now service on your old car is what's keeping large ...
Designing The Future Of Sex Eleanor Saittar Humans use tools, and the tools we use change us. This is true for everything ...
Playing With The Built City & A Tba Topic Eleanor Saittar Architecture and urban planning define the world we interact with. This has many deep and ...
Independent Filmmaking - Bringing Your Ideas From Paper To The Screen, And Everything In Between Frazier Cunningham , Emily Schooley Do you have a burning passion to make something better than the latest Hollywood blockbuster? ...
Thinking Outside The Mushroom Kingdom: Homebrew Vs Piracy In Video Games Side Pocket The hot subject in today's gamer media is the increasing threat of piracy. Companies losing ...
Homewreckery: Soft Circuits, Hard-Core! Eli Skipp The integration of electronics into fibers arts and clothing is a revolutionary thing. Until recently ...
Stealing From God! Brad ( theNURSE ) Smith Ever get writer's/designer's/developer's block? Ever need a great idea but nothing seems to come? Well, ...
What'S A Linux?: Creating & Teaching College Courses At 24. Mark Stanislav Ever wondered how to get into university teaching or what it's like once you jump ...
Memetic Engineering Dan Zarrella How do memes spread online and offline? What can we learn from areas of academic ...