On 16 December 2010 00:50, Adrian Crenshaw <[email protected]> wrote:
> For those that missed it:
>
> Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill
> Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping
> John Strauchs, @strauchs: Security and IT Convergence
> Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in
> Information Security Work
> Jon McCoy: Ninja Patching .NET
> Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending You
> Network using Nepenthes/Shaolin Tools
> Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn
> Your Victims
> Brian Baskin, @bbaskin: P2P Forensics
> Brian Baskin, @bbaskin: Internationalized Domain Names & Investigations in
> the Networked World
> Deviant Ollam, @deviantollam: Don't Punch My Junk
> Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes
> Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap
> Ben Smith: Printer Exploitation
> Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack
> vector in your pocket or are you just happy to see me?
> Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS
> Dead?
> Chris Nickerson, @indi303: The State of (In)Security
> Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk
> Professions
> Michael Smith, @rybolov: DDoS

How long does it take other conferences to put out their videos? You
should offer this as a service!

Thanks

Robin
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to