On 16 December 2010 00:50, Adrian Crenshaw <[email protected]> wrote: > For those that missed it: > > Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill > Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping > John Strauchs, @strauchs: Security and IT Convergence > Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in > Information Security Work > Jon McCoy: Ninja Patching .NET > Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending You > Network using Nepenthes/Shaolin Tools > Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn > Your Victims > Brian Baskin, @bbaskin: P2P Forensics > Brian Baskin, @bbaskin: Internationalized Domain Names & Investigations in > the Networked World > Deviant Ollam, @deviantollam: Don't Punch My Junk > Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes > Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap > Ben Smith: Printer Exploitation > Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack > vector in your pocket or are you just happy to see me? > Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS > Dead? > Chris Nickerson, @indi303: The State of (In)Security > Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk > Professions > Michael Smith, @rybolov: DDoS
How long does it take other conferences to put out their videos? You should offer this as a service! Thanks Robin _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
