268040 items (9 unread) in 27 feeds

 «  Expand/Collapse

1 item tagged "usa and punk"

Related tags: slides [+], shellcode [+], michael sutton [+], macmanus [+], zvi, zusman, zeus related botnet, zeus related, zeus, zdi, zane lackey, zambon, yuriy bulygin, yuji, yuan, year in review, year, xss, xsan, xen hypervisor, xen, x kernel, x event, writing secure code, wpa, worth, worms, worldwide, world war ii, world scenarios, world authors, world, workshop proposals, workshop proceedings, workshop, work, with, wireless sniffer, wireless radio, wireless overview, wireless lan security, wipo performances, winning the race, windows operating systems, windows kernel, windows, win, william yerazunis, william kimball, william a. arbaugh, william a arbaugh, wifi, wicked, white knights, wheel, wep key, wep, weimar republic, weeks, websites, webapp, web x, web worm, web servers, web server apache, web hackers, web event, web defacement, web based email, web application security, web application development, web application, web, wearable, weaknesses, waves, water, washington dc metro, washington, warfare, warez, wardrive, war, walter gary sharp, walker, waldron, vulnerable, vulnerability testing, vulnerability research, vulnerability disclosure, vulnerability detection, vulnerability assessment, vulnerability, vulnerabilities, vrrp, vpn, voip, voice, vlans, vlad, visualization, visual classification, visual, vista, virus, virtualized, virtualization, virtual security, virtual machine, virtual, virginia, viral infections, viral, video windows, video vista, video slides, video side, video return, video protocols, video pointers, video highway, video flex, video client, video, vidas, vice, vegas, vault, variations, van beek, validating, val smith, val, utilizing, user, usb, usa uk, usa patriot act, usa numbers, usa number, usa fax, upnp, unwrap, untrusted network, untrusted, unpacking, unmanned aerial vehicles, unix variants, unix servers, unix, unforgivable, understanding, unauthorized data, ulation, ukai, uk members, u.s. secret, u.s., u.s national, type conversion, type, tyler, ty miller, twitter, turn, tunneling, tsyrklevich, truth, trustwave, trusted, trust model, trust, truncation, trojan, tricks, tricking, trey ford, travis goodspeed, travis, transport security, transparent, transmission rates, transience, traffic analysis, traffic, tracks, tracking, trace, touchy feely, tor network, tor event, tor, toorcon, toolkits, toolkit, toolbox, tool, tony hawk, tom stracener, tom ptacek, tom parker tags, tom gallagher, tom cross, tom brosch, token, todd sabin, todd macdermid, tod beardsley, tivo, titanmist, timing channels, timing, timer chip, time camp, time analysis, tim vidas, tim shelton tags, tim mullen, tim kornau, tim elrod, tiffany rad, tiffany, tidal waves, tidal, thumann, three minutes, threats, threat models, threat, thorsten holz, thompson, thomas ryan tags, thomas olofsson, thomas lopatic, thomas akin, third, thing, thermos, thermoptic, theory, them, tgz, textual window, text classifier, testing tool, testing intrusion detection systems, testing, test authors, terrorism, terminal, teredo, temporal, technology authors, technological focus, technique, technical weaknesses, technical underpinnings, technical security countermeasures, technical, tea, tcp, tavis ormandy, target system, talk, tags hardware, tags, tactile switches, tactics, tactical, tables turn, tables, table, system phones, system management mode, system compromise, system call, system, syscall, symmetric ciphers, symbolic execution, switches, sutterfield, sushi, survey, surveillance capabilities, surveillance, super, suite, sucks, subverting, strengths, street usa, strategic initiatives, story authors, storm botnet, storage service, storage networks, storage mechanisms, storage mechanism, storage channels, storage, stopping, stop, stock tags, stock, sting operation, stick, steven j. murdoch tags, steve pate, steve christey, steve adegbite, stephen patton tags, stephen dugan, stephen de vries, steph alarcon, stender, steganography, steganalysis, stefano zanero, stefan frei, stefan esser, stealth techniques, stealth secrets, stealth, status, statue, statistical, stateful inspection, stateful, state, standing on the shoulders, stack, ssl tls, ssl, squire, squadron, sql injection, sql, spradlin, spoofed, sploits, spindel, spike, spider, speed, specialist service provider, special ops, spam, spain, spa, source, sophos, something, soldering irons, software tests, software radio, software lifecycle, software authors, software architects, social networks, social networking sites, social networking, social engineering, social, snort, sneakers, smoke, smb, smashing, smartcard, smart card payments, smart card, smart, sleeping giant, skilled developers, sip stack, sip, single, simple solutions, simple, silvio cesare, silberman, signatures, sidewinder, side channel, side, siddharth tags, sid, showcase, shortcomings, shoot, shoestring budget, shiva, shinder, sherri sparks, sherri, shema, shellcodes, shawn moyer, shawn embleton, shaun clowes, shatter proofing, shah tags, shadow walker, shadow, setiri, seth fogie, session hijacking, session, service security, service, servers, server virtualization, server firewall, server database, server capability, server, seris, sensepost, self, segmentation, security web, security tags, security researchers, security report, security providers, security professional, security patches, security network, security methodology, security message, security law, security issues, security infrastructure, security incident, security implications, security gateway, security event, security essentials, security engineering, security component, security challenge, security authors, security auditors, security analysis, security, securing web applications, securing, secure distributed computing, secure, secret squirrel, secret handshake, secret, seattle, searches, search, sean convery, scripts, scripting, scott tags, scott stender, scott blake, scott, scoring, science, schulman, scholz, schack, scene, scanning, scalable, scada systems, scada, saumil shah, satellite navigation, satellite event, satellite based, satan, sassaman, sarah gordon tags, sarah gordon, sap, sandberg, san diego ca, san diego, san, s miles, ryan russell timothy mullen, ryan russell, ryan permeh, ryan parmeh, ryan cunningham, rvasec, runtime, rube goldberg machine, rube goldberg, routing, routers, router, rop, rootkits, rootkit, rootite, rooted, root shell, root cause analysis, root, room 101, room, roo, ron gula, rohit dhamankar, rohit, rogue squadron, rogue, roger dingledine, rod beckstrom, rocky mountain conference, rocky mountain, rock your, robust, robin sage, robin, robert olszewski, robert marotta, robert graham tags, robert clark tags, robert baird, robert, rob king, rob carter tags, rob carter, rng, ristic, risk, rise, ring0, ring 0, ring, rick smith, richmond, richard rushing, richard johnson tags, richard johnson, richard george tags, rich smith, rich murphey, rich internet, ria world, ria, rfp, rfidiots, rfid systems, rfid, rf id, rey tags, revolutionizing, revolution, reverser, reverse engineering tools, reverse engineering, reverse dns, return, rest, response plan, response, resource record types, resistors, research, request, renaud deraison, renaud bidou, remote exploit, remote, reloaded, reduction, redmond botnet, record, recent technological advances, recent incidents, real, read, re inventing, rds tmc, razor, rapid evolution, rapid, range, random number generator, ralf spenneberg, ralf philipp, raleigh, raising the bar, raide, rafal wojtczuk, radio legislation, radio, rachel engel scott stender, race, quynh nguyen, quist, quantum cryptography, quantum, python programming language, python objects, python applications, python, pyemu, pwning, push, purpose cluster, ptacek, psychology, proxying, proxies, protocols, protocol designers, protocol application, protocol, protection mechanisms, protection, protecting, pros and cons, promiscuous, project authors, project alternatives, project, programming microcontrollers, program semantics, program, professional source, professional, product patches, process, problems, problem scenarios, problem, private entries, private, privacy event, privacy, prey, preventing, presidential election, presidential, presentation slides, presentation, premium rate numbers, premature, predictable, predefined functions, pre conference, practice, practical, powershell, powerful, power, post, portscanning, portnoy, port, popular operating systems, polymorphism, polymorphic, pointers, pointer, point, pocket pc, pocket, plug, plc, planet, pl sql, pixel, pisa, pirates, pin, pierce tags, picture, pickpockets, physical memory, physical, php vulnerability, php, phone, phishing, phishers, phillip hallam , philip trainor, philadelphia usa, philadelphia, phase ii, phase, petroni, petkov, peter thermos, peter silberman, peter feaver, pete finnigan, perspective, personal, person, persistent, perl hacker, perl, per, penetration testers, penetration test, penetration, pedram amini, pdb, pbx, payloads, paul simmonds, paul royal, paul knight, paul bhm, patton, patriot, patrick thomas tags, patrick miller, patrick mcgregor, patrick engebretson, patrick chambet, patent attorneys, patch, passive, party patches, party, part, paris, papers, paper, panel, pal, packet, packers, p2p networks, p networks, ozone, owner, owasp, overview, overlooked, overflow, output, other search engines, other, ospf, osi, ortega, ormandy, oriented programming, oriented, order of magnitude, oracle sql, oracle databases, oracle database server, oracle database, oracle 9i, oracle, ops, operating system, operating, openssl, opensource, openid, openbsd, open source web, open source tools, open source tool, open source project, open source, open proxies, open, oona leganovic, oliver friedrichs, old, office documents, office, ofer shezaf, ofer, oded, october 19th, obscurity, obfuscation, obfuscated, o.s, o connor, numbers, number, nse experience, nse, not, nosebreak, nokia, node, nobody, noah johnson tags, noah johnson, nmap, nitesh dhanjani, nimda, nids, nicolas waisman, nicolas fischbach, nick petroni, nick harbour, nicholas merrill, nicholas j. percoco, nguyen anh, next generation, next, new york city, new tools, new breed, new, neutralizing, networks project, networks, networking environment, networked computer, network sniffer, network security, network flow analysis, network drivers, network access control, network, net, nessus project, nessus, neil daswani, neel mehta, needle, need, neal krawetz, nc usa, native database, nation, nathan mcfeters, nathan keltner, nathan hamiel, nate lawson thomas ptacek, nate lawson tags, nat, nac, myth, musical, music event, multinational corporation, multi purpose, msp, msie, ms sql server, mounet, motorcycle helmet, morris worm, moore tags, monster, monkeyspaw, money, momentary, modeling, model demonstrations, mod, mobitex network, mobitex, mobipst, mobile apps, mobile, mitm, mitigation steps, miras, minnesota, minneapolis minnesota, minneapolis, mining, mini racing, mini, milliseconds, military radio equipment, mike zusman, mike spindel, mike shaver, mike schiffman, mike reavey, mike pomraning, mike perry tags, mike perry, mike lynn robert baird, mike beekey, migration, mifare, middleware, midatlantic region, microsoft security, microsoft crash, microsoft computer, microsoft, microcontroller, michael thumann, michael shema, michael raggo, michael ossmann, michael d. glasser, miami, methodology, method parameters, metasploit framework, metasploit, metapost exploitation, metapost, metamorphic, metal, meta language, messenger, messaging, merloni, merits and demerits, memory trade, memory protection, memory corruption, memory, melanie rieback, meiners, mehta, meet, medicine, media, meaningful, maynor, may, maximillian dornseif, maximiliano caceres, maximiliano, max caceres, maui hawaii, matthew franz sean convery, matthew franz, matthew caldwell, matt dickerson, matrixay, massive proliferation, masquerades, martin roesch, martin mocko, martin may, marshaled, mark vincent yason, mark vincent, mark shelhart, mark kadrich, mark eckenwiler, mark dowd, mark collier, mario vuksan, marinescu, mariano nunez, marcus sachs, marcus ranum, marco slaviero, marco morana, manipulations, mandy andress, management algorithms, management, man, mame games, malware, mallory, malicious intruders, malicious events, making money on the web, main street electrical parade, main street, maik morgenstern, magnitude improvements, machine, machina, macdermid, mac os x, mac os, mac, lukas grunwald, luis miras, luciano bello maximiliano bertacchini, luca, long, loki, logons, logins, locking, local network, local, loadable kernel module, loadable, little, list, linux x86, linux event, linux distributions, linux, line, lindner, lindell, limited, lifting, lifecycle, library, liberty, liability, leveraging, lessons, len sassaman, legislation, legal implications, legal aspects, legal, lee sutterfield, led, learned, leakage, leak prevention, leak, layer, lawyers, lawson, law compliance, law, laurie martin, laurent oudot, laurent butti, las vegas, larry leibrock, language, lance spitzner, lan security, lan, lackey, labes, l. patterson, krix, krishna, kris, kret, knocking, kit, kim tags, keys, keynote, key to the kingdom, key, kevin stadmeyer, kevin spett, kevin mcpeake, kevin mandia, kevin fu, kevin cardwell, kernel windows, kernel driver, kernel, kerberos protocol, kerberos, kenneth geers, kendall, ken hines, keith jones rohyt, katie moussouris, k security, justine osborne tags, justin ferguson tags, justin ferguson, justin clarke tags, justin clarke nitesh, justin clarke, jp morgan chase, joy, joshua kelley tags, joshua bienfang, josh sokol, josh pauli, josh daymont, joseph klein, jose nazario, jose, jonathan squire, jonathan rom, jonathan pollet, jonathan lindsay, jonathan afek, jonathan, johnny long, johnny cache, john viega, john terrill tags, john terrill, john strauchs, john roecher michael, john mcdonald, john lambert tags, john lambert, john heasman, john doe, john benson, joe stewart tags, joe stewart, joe grand, job, joanna rutkowska, joanna, jinx, jim hoagland, jihad, jesse daguanno, jesse burns, jeroen, jeremy rauch, jeremy allen raj, jeremy allen, jeremiah grossman, jeremiah, jennifer granick, jeffrey prusan, jeff waldron, jeff thompson tags, jeff thompson, jeff morin, jay schulman, jay beale, javasnoop, javascript, java event, java decompilation, java client server, java card, java authors, java, jason raber, jason cheatham, jared demott, jamie butler, jamie, james lee tags, james c. foster vincent t. liu tags, james c foster, james arlen, jacob carlson, jacob appelbaum, ivan ristic, ivan buetler, ivan arce, isgameover, iscsi, iron chef, iron, irk, ipsec, ips, ipod, iphone, invasion, intrusion prevention systems, intrusion detection systems, intrusion detection, intrusion, introduction, intranet websites, intranet, interprocess, internet worms, internet explorer 8, internet authors, internet applications, internet application, internet, internationalized, international, internal ip address, interface design, interface, intercept, intelligence economy, intelligence, integration, integer overflow, inspection, insider threat, insider, insecure, insane, injections, injection, injecting, information user, information solutions, information security conference, information security community, information leak, information intelligence, information assurance, information, infector, infections, industry speakers, inducing, individual, incident response, incident investigation, incident, incidence, impress, implications, implementation, implantable, impersonation, immediate gratification, immediate, ike test, ike event, iis, ids, identity, identification, ida pro, ida, ics, icmp, ice, ibm, ian o. angell, ian goldberg, ian clarke oskar sandberg, hypervisors, hypervisor, hype, hybrid approach, hybrid, https, http, htaccess scripts, how to impress girls, hotpatching, host intrusion prevention, host, horsemen, honeypots, honeynets, honeynet project, honeynet, home, holyfield, holes, history, historical, hiring, hips, himanshu dwivedi, highway to hell, highway, high speed networks, high, hiding, hidden, hid, hibernation, hendrik scholz, help, helmet, hell, heap management, heap, hawaii usa, hawaii, hat europe, hat, harrison krix, haroon, hardware hacks, hardware hacking, hardware devices, hardware debuggers, hardening, hard core, hard, hap hazard, hansen, handles, handhelds, handbook authors, halloween props, halloween, hallam, hadoop, hacks and cracks, hacks, hacking web, hacking, hackers, hacker folklore, hacker, hack, h.d. moore val, h.d. moore tags, h 323, gutterman, gustav rydstedt, gupta, gunter ollmann, guidance system, guidance, gsm, grunwald, grrcon, growth, grossman, grey box, gregory s. miles travis schack, gregory s. miles tags, greg hoglund, greg conti, greetz, greasemonkey, graph, grant bugher, grand rapids, government, gov, got, google maps, google, goodspeed, goodfet, goldberg, gold, global security, global, glasser, girlfriend, ghosts, get, germany, george jelatis, georg wicherski, generation, gen iii, geers, garbutt, game authors, gadgets, fyodor tags, fyodor, fuzzing, future of internet, future, fundamentals, functional tools, full disclosure, full, freebsd, free, freak show, freak out, fraud, framework, fox in the hen house, fox, four horsemen, fortune 100 companies, format, forgery, forensics, forensic web, forensic research, forensic investigation, forensic analysis, forensic, foreign language, foreign, foregone conclusion, forcing, force research laboratory, fog, fnord, flex, flash content, flash, flake, fixing, fischbach, firmware, firewall, fireside chat, fire water, fire, finnigan, finished product, fingerprinting, fingerpinting, finding gold, finding, filter text, filter, file, field, fibre channel, festival, feng shui, felix, feinstein, feds, fax number, fax, faults, fault injection, fault, faster, fan tags, false, falling, ezequiel, eye of a needle, eye, extensible firmware interface, extensible, exposing, exposed, exponential growth, exponential, exploring, exploits, exploiting, exploitation techniques, exploitation methods, exploitation, exploit, experiment, execution, executable, evolutionary guidance, evolutionary approach, evolutionary, evolution, evil twins, evil, event, evasion, europe, eugene, eucd, ethereal, esteban martnez, essentials, errors, erik dean tags, eric schmiedl, eric monti, eric filiol, eric d. laspe, eric brandwine, epassports, environment, entries, entertainment, enterprise resource planning, enterprise management applications, enterprise apps, enterprise, engineering, engine, engagement, endler, encryption keys, encryption algorithm, encryption, encrypted traffic, encase, emv, emulator, emmanuelle zambon, embrace, email, elf, electronic discovery, election, el khalil, eip, effective, eeye, edward balas, edge, economics, e commerce software, dynamic technique, dynamic routing, dynamic, dustin evans, dugan, dug song, dual track format, dual mode, dtk, drivers, drew miller, dream of electric sheep, dream, dr. west, dpa, dozen, doug mohney, dos, door, dont tell, don bailey, don, dominos, domino event, domino, dominique brezinski, dominique, dom, dollar man, dog, document viewers, dns, dna, distribution of electric power, disk encryption, disk, discovering, discontents, disclosure, dirty dozen, dirty, directory, direction, dino dai zovi, dingledine, dilemma, digital millennium copyright act, digital information, digital, diff files, diego sor, diana kelly, diana, di croce, device drivers, device, deus ex machina, deus, detection, detecting, desktop security, design mistakes, design authors, design, derek soeder, deperimeterisation, department of homeland security, deobfuscator, denver colorado usa, denver, demystified, demo submissions, defiling, defense, defeating, defacement, decompilers, decompilation, decade, debugging, debuggers, debugger, debra littlejohn, death, deadly cocktail, dead authors, dead, de haas, dd wrt, dc metro area, dc, daytona usa, daymont, day, david worth, david weston tags, david weston, david thiel, david maynor, david litchfield, david kennedy, david hulton, david goldman, david fifield, david endler, david dewey tags, david dewey, david coffey, david byrne tags, david byrne, dave goldsmith, dave aitel, database security, database engines, database encryption, database access control, database, data visualization tools, data visualization tool, data networks, data mining, data execution prevention, darrin, danny quist, daniel peck, daniel mende, dangling pointer, dangling, dang, dan veeneman, dan moniz, dan kaminsky, dan boneh, damian saura tags, dale brocklehurst, daft punk, daft, d. gutesman, d moore, cyberterrorism, cyberforest, cybercrime, cyber, cvv, custom internet, custom encryption, cushman, curtis kret, current architecture, cunning trickery, culture, cryptography, cryptographic, crypto, cryptanalysis, cross site scripting, cross site, cross, crm, critical security, criminal investigations, criminal, crash, craig heffner, crafting, cowbird, covert channels, covert channel, covert, covering, court, countering, counter intelligence, counter, cots software, cots, corruption, correlation, correctional, corporate warfare, corporate networks, corporate information security, corporate, core web, copyright, cooperation, convery, conversion tool, conversion errors, conversion, converging technologies, converging, conventional wisdom, control, content, cons, configurations, confidentiality, confidential data, conference challenge, conference, concurrency, concept implementation, computing, computer network defense, computer forensics, computer authors, computer, computational theory, computational, compromising, component authors, compliancy issues, complexity, complex systems, compiler, competition, comparison, community tool, communications security, communication mechanisms, communication, commodity hardware, committing, commercial sector, commercial, com, colorado, collin jackson, collabreate, collaborative, colin ames, coldfusion, cold boot, cold, coffee, code obfuscation, code integration, code execution, code authors, code, cloud model, cloud, client side, client server applications, client server application, client, click, claudio merloni, claudio criscione, classical computer, classical, classic sandbox, class, city, citrix, cisco router, cisco ios, cisco event, cisco, circumventing, circumvent, chuck willis tags, chuck willis rohyt, chuck willis, christopher tarnovsky, chris sumner, chris paget, chris hurley tags, chris hurley, chris eng, chris eagle, chip, china, chicago, chet hosmer, chef, checking, charlie miller, charles henderson steve ocepek, charles edge, characterization, chaos communication congress, chaos communication camp, challenge 3, chad r. skipper, cesar cerrudo, certification, cellular, cellphones, cell phone, cell doors, ccs, causal, catch, case, carrier, carolinacon, cardwell, card, capitalism, capabilities, canada, camoflauge, cameron hotchkies, cameron, camel through the eye of a needle, camel, call for papers, call, caffeinemonkey, caches, cache tags, cache, caceres, cabinet, c applications, bytecode, bypassing, butti, business authors, business, burns, burning desire, building security, building, bugtraq, bug, buffer overflow, buffer, buetler, bsl, bsd, bryan sullivan, bryan cunningham, brute, brushing your teeth, bruce schneier, bruce potter, bruce dang, browser cache, browser, brown rob ragan, brosch, brocklehurst, brian wotring, brian oblivion, brian martin tags, brian martin matt dickerson, brian holyfield, brian caswell, brett moore, bret mounet, brendan oconnor, braving, brandon creighton, brandon baker, brad hill, brad bolin, box web, box, bound, botnet, booz allen hamilton, bootstrap loader, bootroot, bomber, bolin, boileau, blurring, bluetooth wireless, bluetooth, bluesnarfing, bluebag, blind, blazeds, blackout, blackmail, blackhat, blackberry, black ops, black hat, black art, black, bitblaze, birth, biometrics, bing, binary, binaries, billy rios, billy hoffman, bill pennington dennis groves, bill pennington, bill nye, bienfang, bgp, ben nagy, ben hawkes, ben feinstein, ben cohen, belani, behavioral, beginners, becoming, beating, based intrusion detection, base, barnaby jack tags, bare metal, bare, bar, baptiste gourdin, bank, balas, bala, bait, bad, backends, backdoors, backbone, automation techniques, automation, automated, authors, authentication systems, authentication mechanisms, authentication mechanism, authentication, aurora, auditing, audio windows, audio, attrition, attacking, attacker, attack, atari, asterisk, assured, assessment techniques, assessment methodology, asps, aspects, art and science, art, array, arp, armor protection, arm architecture, arkin tags, ariel, arian evans, architecture, arcade cabinet, arbitrary code execution, appsec, approach, application web, application testing, application protocol, application programming interfaces, application development platform, application crash, application binaries, application authors, application, apple quicktime, apple, apdu, apache, anyone, antivirus, anti virus software, anti, anthony lai, anonymous authentication, anonymous, anonymity, anomaly detection, anomaly, announcing, andrew van der, andrew lindell, andrew cushman, andrew becherer, andrea barisani, analyzing data, analysis, analysing, amp circuitry, amp, amf, america, alternatives, alternative medicine, alternative, allen harper, allen hamilton, all in, algorithm, alfredo ortega, alexander tereshkin, alexander sotirov, alexander kornbrust, alexander, alexa, alex wheeler, alex stamos, alex ionescu, alex george, alex garbutt, alex, alessandro acquisti, aleatory, aldora louw, alan bradley tags, ajax ulation, ajax, aix operating system, aix, air interface, agustin azubel, afek, adversary, advanced, adult toy store, adrian marinescu, address, adam shostack, adam laurie tags, adam laurie martin herfurt, adam laurie, adam l. young, adam greene, adam boileau, adam, activex controls, activex, active directory services, acting, act, acm, accreditation, accidental leakage, access control systems, access, abuse, aaron portnoy, Wireless, Tools, Software, Programming, NON, Hardware, Countermeasures, Community, Bugs, 11b