Anonymous [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Internet Censorship in Thailand: User practices, potential threats and necessary responses EuroSP-2017 - paris,france
Towards a Comprehensive Picture of the Great Firewall’s DNS Censorship FOCI-2014 - san diego,usa
How I learned to stop worrying about SCADA and love the bomb Security B-Sides Delaware-2011 - Delaware, USA Security
Risk Panel TROOPERS-2011 - Heidelberg, Germany Security
Ipv6 Implementation And Security Round Table - A Moderated Disagreement Or A Chorus? CanSecWest-2011 - Vancouver, Canada Security
Coffee Shop Warefare:Protecting Yourself In Dark Territory OWASP BASC-2010 - Boston, USA Mobile Security Wireless Others
Panel Discussion Shifting Threat Vectors PacSec-2010 - Tokyo, Japan Panel
Leading An Appsec Initiative OWASP Appsec-2010 - Washington DC, USA Workshops
Secure Code Review: Enterprise Metrics OWASP Appsec-2010 - Washington DC, USA Others Security
Protecting Federal Government From Web 2.0 Application Security Risks OWASP Appsec-2010 - Washington DC, USA Security Web Risk Web Security Social Media
Hacking Oracle From Web Apps OWASP Appsec-2010 - Washington DC, USA Security Web SQL
Guardrails: A Nearly Painless Solution To Insecure Web Applications OWASP Appsec-2010 - Washington DC, USA Web Application Security
Closing The Gap: Analyzing The Limitations Of Web Application Vulnerability Scanners OWASP Appsec-2010 - Washington DC, USA Security Web Application Security
Using Misuse Cases To Articulate Vulnerabilities To Stakeholders OWASP Appsec-2010 - Washington DC, USA Security
Federal Perspectives On Application Security OWASP Appsec-2010 - Washington DC, USA Panel
Microsoft'S Security Development Lifecycle For Agile Development OWASP Appsec-2010 - Washington DC, USA Security Development
Solving Real World Problems With Esapi OWASP Appsec-2010 - Washington DC, USA Security Analysis
Javasnoop: How To Hack Anything Written In Java OWASP Appsec-2010 - Washington DC, USA Security Web Application Security
Implementing A Secure Software Development Program OWASP Appsec-2010 - Washington DC, USA Security Development
Constricting The Web: Offensive Python For Web Hackers OWASP Appsec-2010 - Washington DC, USA Security Web Network Penetration
Windows 7 Forensics BugCon-2010 - Mexico Security Computer Forensics Forensics
Hacking & Beers BugCon-2010 - Mexico Security Others
Electronic Voting System BugCon-2010 - Mexico Security Others Legal
Social Network Security BugCon-2010 - Mexico Social Media
How Public-Private Partnerships Can Stop Cyber Threats From Becoming Reality: Sharing & Layering And Unified Analytic Policies And Practices. CyberSec -2010 - Brussels, Belgium Security Others Community
Open Floor: Wip/Brainstorming 3rd Workshop on Cyber Security Experimentation and Test -2010 - Washington DC, USA Security
Cruel To Be Kind NinjaCon-2010 - Vienna, Austria Security
The Bar Quiz NinjaCon-2010 - Vienna, Austria Security Others
Hackerspaces Os Sweatshop NinjaCon-2010 - Vienna, Austria Security Others Community
Lightning Talks NinjaCon-2010 - Vienna, Austria Lightning Talk
Legal Training CCDCOE-2010 - Estonia Security Legal
Journalist Workshop CCDCOE-2010 - Estonia Workshops
How I Learned To Stop Worrying And Love Losing My Personal Privacy. Or The Google-Induced Personal Privacy Slow-Leak. Security B-Sides Austin-2010 - Austin, USA Security Anonymity Privacy
All About Owasp OWASP Appsec-2009 - Washington DC, USA Community Security
Digital Id BruCON-2009 - Brussels, Belgium Workshops
Soldering: How Not To Burn Your Fingers BruCON-2009 - Brussels, Belgium Workshops
Lightning Talks Day 1 BruCON-2009 - Brussels, Belgium Lightning Talk
A View On Hacker Ethics NinjaCon-2009 - Vienna, Austria Security
Unauthorized Access NinjaCon-2009 - Vienna, Austria Security Access
Lightning Talks NinjaCon-2009 - Vienna, Austria Lightning Talk
Proxy Prank-O-Matic DEF CON-17 - Las Vegas, USA Security
Student Meet-Up SOURCE Boston-2009 - Boston, USA Security
Security Start-Up Event SOURCE Boston-2009 - Boston, USA Security Panel
Source Reception SOURCE Boston-2009 - Boston, USA Security
Peer-To-Peer Discussion Groups SOURCE Boston-2009 - Boston, USA Security
Backtrack - Local Boot To Remote Root In One Cd Cyber Crime Investigation & Forensics Basics ClubHack-2008 - Pune, India Security
Wireless Security - For Home & Corporate Wireless Networks Null Meet ClubHack-2008 - Pune, India Security
Unweaving Silverlight From Flash BlueHat-2008 - Redmond, USA Security
Graffiti Research Lab Extravaganza The Last HOPE-2008 - USA Security Workshops
The Last Hope Closing Ceremonies The Last HOPE-2008 - USA Security
Panel/Group Discussion 1st USENIX Workshop on Hot Topics in Security-2006 - Vancouver, Canada Security
The Hope Net: What Worked And What Didn'T HOPE Number 6-2006 - USA Security
Hope Number Six Closing Ceremonies HOPE Number 6-2006 - USA Security
Weaknesses In Satellite Television Protection Schemes DEF CON-12 - Las Vegas, USA Security
The Fifth Hope Closing Ceremonies The Fifth HOPE -2004 - USA Security
How The Net Worked The Fifth HOPE -2004 - USA Security
Indymedia 2004 The Fifth HOPE -2004 - USA Security Media
Digital Demonstrations: Criminal Ddos Attack Or Cyber Sit-In? H2K2-2002 - USA Security Legal
Freedom Downtime H2K2-2002 - USA Security
H2K2 Closing Ceremonies H2K2-2002 - USA Security
Hacking Nanotech H2K2-2002 - USA Security Analysis
Making Money On The Internet While Still Saying Fuck H2K2-2002 - USA Security
Negativland - Past, Present, Future H2K2-2002 - USA Security Media
The Patriot Act H2K2-2002 - USA Security Legal
Proximity Cards: How Secure Are They? H2K2-2002 - USA Security Access Privacy
Report From Ruckus H2K2-2002 - USA Security Others
Social Engineering H2K2-2002 - USA Security Panel
Selling Out: The Pros And Cons Of Working For The Man H2K-2000 - USA Security Media
Secrets Of The Dnc/Rnc H2K-2000 - USA Security
High School Horror Tales H2K-2000 - USA Security
Counterfeiting Ids And Identity Theft H2K-2000 - USA Security
Hacktivism - Terrorism Or A New Hope? H2K-2000 - USA Security Web
Cracking The Hacker Myth: A Scientific Study To Find The Real Story H2K-2000 - USA Security Media
Freedom Downtime H2K-2000 - USA Security Community
Security Through Gaming: The Cyberwar Game H2K-2000 - USA Security Cyberwar
Low Bandwidth Access To The Internet H2K-2000 - USA Security Access
How I Got My Own Area Code H2K-2000 - USA Security
Keynote: Jello Biafra H2K-2000 - USA Security
The King'S Mob Open Source Mediamaking Panel H2K-2000 - USA Security Panel
The Robotic Graffiti Writer H2K-2000 - USA Security
Cult Of The Dead Cow Extravaganza H2K-2000 - USA Security
Hardware & Electronics Q&A Panel H2K-2000 - USA Security Panel
Hackers And The Media H2K-2000 - USA Security Media
Napster: A New Beginning Or Beginning Of The End? H2K-2000 - USA Security Business
Nootropics H2K-2000 - USA Security
Mock Trial - The Mpaa Vs. 2600 H2K-2000 - USA Security Legal
Spy Stuff: Everything You Never Believed But Wanted To Ask About... H2K-2000 - USA Security
Being A Good Samaritan Online H2K-2000 - USA Security
Information On The Masses H2K-2000 - USA Security Access
Parents: Are They Your Enemies? H2K-2000 - USA Security Panel Community
The Jon Johansen Story H2K-2000 - USA Security Web
Social Engineering Panel H2K-2000 - USA Security Panel
Lockpicking H2K-2000 - USA Security