Got my two presentations up:

*Malicious USB Devices: Is that an attack vector in your pocket or are you
just happy to see me?*

In this presentation I talk about the categories of malicious USB devices:

USB Mass Storage containing malware
U3 Thumb drives with "evil" autorun payloads
Hardware key loggers
Programmable HID USB Keyboard Dongle Devices

along with detection and mitigation techniques involving GPO (Windows) and
UDEV (Linux) settings. It was presented at Phreaknic 14.

http://www.irongeek.com/i.php?page=videos/malicious-usb-devices-phreaknic-14

*
Locating I2P services via Leaks on the Application Layer Project Proposal
*
While at Phreaknic 14 I did a quick lightning talk on my project to test the
anonymity provided by I2P. Mostly I'll be aiming at web server
misconfigurations in eepSites. It starts getting fast at the end because I
was running out of time (10 min is kind of short for the subject). Still, I
hope it is a good intro to I2P, and my plans.

http://www.irongeek.com/i.php?page=videos/locating-i2p-services-via-leaks-on-the-application-layer-project-proposal



Adrian
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to