Got my two presentations up: *Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?*
In this presentation I talk about the categories of malicious USB devices: USB Mass Storage containing malware U3 Thumb drives with "evil" autorun payloads Hardware key loggers Programmable HID USB Keyboard Dongle Devices along with detection and mitigation techniques involving GPO (Windows) and UDEV (Linux) settings. It was presented at Phreaknic 14. http://www.irongeek.com/i.php?page=videos/malicious-usb-devices-phreaknic-14 * Locating I2P services via Leaks on the Application Layer Project Proposal * While at Phreaknic 14 I did a quick lightning talk on my project to test the anonymity provided by I2P. Mostly I'll be aiming at web server misconfigurations in eepSites. It starts getting fast at the end because I was running out of time (10 min is kind of short for the subject). Still, I hope it is a good intro to I2P, and my plans. http://www.irongeek.com/i.php?page=videos/locating-i2p-services-via-leaks-on-the-application-layer-project-proposal Adrian
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
