Derbycon 2011, Day 2 Track 3 and Day 3 Track 1 Talks
Posted<http://www.irongeek.com/i.php?page=videos/derbycon1/mainlist>
In this wave are the videos from the 2nd day 3rd track and 3rd day 1st track
of the Derbycon conference. Please note that some videos were lost because
of audio issues or are awaiting approval. In this wave:

 Day 2, Track 3:

 Georgia Weidman – Throw It in the River? Towards Real Live Actual
Smartphone 
Security<http://www.irongeek.com/i.php?page=videos/derbycon1/georgia-weidman-throw-it-in-the-river-towards-real-live-actual-smartphone-security>
Rob Simon – Pentesting over
Powerlines<http://www.irongeek.com/i.php?page=videos/derbycon1/rob-simon-pentesting-over-powerlines>
Larry Pesce – You are the Smart Meter: Making (and hacking) of the 2011
MA-CCDC electronic badges
<http://www.irongeek.com/i.php?page=videos/derbycon1/larry-pesce-you-are-the-smart-meter-making-and-hacking-of-the-2011-ma-ccdc-electronic-badges>
Bill Sempf – Is locksport a
sport?<http://www.irongeek.com/i.php?page=videos/derbycon1/bill-sempf-is-locksport-a-sport>
Infojanitor – Virtual trust, Virtual Permission and the Illusion of
Security<http://www.irongeek.com/i.php?page=videos/derbycon1/infojanitor-virtual-trust-virtual-permission-and-the-illusion-of-security>
Ben Feinstein & Jeff Jarmoc – Get Off of My Cloud": Cloud Credential
Compromise and 
Exposure<http://www.irongeek.com/i.php?page=videos/derbycon1/ben-feinstein-and-jeff-jarmoc-get-off-of-my-cloud-cloud-credential-compromise-and-exposure>
Jimmy Shah – Mobile App Moolah: Profit taking with Mobile
Malware<http://www.irongeek.com/i.php?page=videos/derbycon1/jimmy-shah-mobile-app-moolah-profit-taking-with-mobile-malware>
McCorkle & Rios – 100 bugs in 100 days: An analysis of ICS (SCADA)
software<http://www.irongeek.com/i.php?page=videos/derbycon1/mccorkle-and-rios-100-bugs-in-100-days-an-analysis-of-ics-scada-software>
Scott Ullrich + Chris Buechler – Open source firewalling with pfSense (Sound
came out as just fuzz)
Spiky Geek – How I learned to roll my own:Building custom pen testing
platforms on the fly (Sound came out as just fuzz)
 Brent Huston – Realize Your Hacker Heritage: Do The
Needful<http://www.irongeek.com/i.php?page=videos/derbycon1/brent-huston-realize-your-hacker-heritage-do-the-needful>

 Day 3, Track 1

 Charlie Miller – Battery Firmware
Hacking<http://www.irongeek.com/i.php?page=videos/derbycon1/charlie-miller-battery-firmware-hacking>
Peter Van Eeckhoutte & Elliot Cutright – Win32 Exploit Development With Mona
and the Metasploit
Framework<http://www.irongeek.com/i.php?page=videos/derbycon1/peter-van-eeckhoutte-and-elliot-cutright-win32-exploit-development-with-mona-and-the-metasploit-framework>
Ryan Linn – collecting Underpants To Win Your
Network<http://www.irongeek.com/i.php?page=videos/derbycon1/ryan-linn-collecting-underpants-to-win-your-network>
Jamison Scheeres – Social Engineering is a Fraud (Awaiting approval)
 Josh Kelley (winfang98) – Infectious Media – Bypassing AutoRun once and for
all<http://www.irongeek.com/i.php?page=videos/derbycon1/kevin-johnson-and-tom-eston-desktop-betrayal-exploiting-clients-through-the-features-they-demand>
Kevin Johnson & Tom Eston – Desktop Betrayal: Exploiting Clients through the
Features They 
Demand<http://www.irongeek.com/i.php?page=videos/derbycon1/kevin-johnson-and-tom-eston-desktop-betrayal-exploiting-clients-through-the-features-they-demand>

Enjoy!



-- 
"The ability to quote is a serviceable substitute for wit." ~ W. Somerset
Maugham
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to