ConCollector
our blog
|
more on thinkst
Search:
Everything
Browse:
Speakers
Conferences
Topics
Contributors
Analytics
Folklore
About
Login
hashdays 2010
Nov. 5, 2010 to Nov. 5, 2010, Lucerne, Switzerland
Event Page
Tell us about missing data
Title
Speakers
Summary
Topic Types
The State Of (In)Security
Chris Nickerson
Keynote
#Days Badges And ... Somthing About Stuxnet
Candid Wüest
Hardware Reverse Engineering
Boire: All Your Evidence Is Belong To Us: Antiforensics And You
Morgan Marquis-boire
Security
Forensics
Head Hacking - The Magic Of Suggestion And Perception
Dale Pearson
Social Engineering
Lockpicking 101
Walter Belgers
Lockpicking has become very popular since information can be easily shared on the Internet and ...
Hardware Reverse Engineering
Identity And Access Management - Get Your User-Accesses Under Control!
Rik Van bruggen
Access Control
Access
Rootkits In The Real World Today
Antti Tikkanen
,
Kimmo Kasslin
Antti and Kimmo have been working closely with F-Secure's BlackLight rootkit scanning technology for five ...
Rootkits
Configuration And Risk Assessment Toolkit, Metasploit Within The Enterprise (Lightning Talk)
Max Moser
,
Philipp Schrödel
The talk introduces our new open source extension for the well known Metasploit Framework, called ...
Lightning Talk
No More Of The Same Bad Security: Why The Osstmm 3 Is Threatening Modern Security Practices
Pete Herzog
Modern security has become just a dance-off between jargon and products. Enterprises are doing what ...
Compliance
Open-Source Cryptographic Libraries And Embedded Platforms
Pascal Junod
In this talk, we will discuss the (low-level) security of common open-source general-purpose cryptographic libraries, ...
Security
Others
Cryptography
Osmocombb: A Tool For Gsm Protocol Level Security Analysis Of Gsm Networks
Harald Welte
The OsmocomBB project is a Free Software implementation of the GSM protocol stack running on ...
Mobile Security
Security
Others
Testing The Limits Of Ev Certificates
Philippe Oechslin
Extended Validation certificates for TLS are more expensive and more difficult to obtain. In return ...
Security
Exploitation
Browser
Android Application Security, The Fun Details
Jesse Burns
Jesse Burns, an Android security expert who has been working with the Android platform since ...
Mobile Security
Android
Frozencache
Jürgen Pabel
Cold boot attacks are a major risk for the protection that Full-Disk-Encryption solutions provide. FrozenCache ...
Security
Others
Deep Knowledge