Derbycon 2011, Day 2 Track 3 and Day 3 Track 1 Talks Posted<http://www.irongeek.com/i.php?page=videos/derbycon1/mainlist> In this wave are the videos from the 2nd day 3rd track and 3rd day 1st track of the Derbycon conference. Please note that some videos were lost because of audio issues or are awaiting approval. In this wave:
Day 2, Track 3: Georgia Weidman – Throw It in the River? Towards Real Live Actual Smartphone Security<http://www.irongeek.com/i.php?page=videos/derbycon1/georgia-weidman-throw-it-in-the-river-towards-real-live-actual-smartphone-security> Rob Simon – Pentesting over Powerlines<http://www.irongeek.com/i.php?page=videos/derbycon1/rob-simon-pentesting-over-powerlines> Larry Pesce – You are the Smart Meter: Making (and hacking) of the 2011 MA-CCDC electronic badges <http://www.irongeek.com/i.php?page=videos/derbycon1/larry-pesce-you-are-the-smart-meter-making-and-hacking-of-the-2011-ma-ccdc-electronic-badges> Bill Sempf – Is locksport a sport?<http://www.irongeek.com/i.php?page=videos/derbycon1/bill-sempf-is-locksport-a-sport> Infojanitor – Virtual trust, Virtual Permission and the Illusion of Security<http://www.irongeek.com/i.php?page=videos/derbycon1/infojanitor-virtual-trust-virtual-permission-and-the-illusion-of-security> Ben Feinstein & Jeff Jarmoc – Get Off of My Cloud": Cloud Credential Compromise and Exposure<http://www.irongeek.com/i.php?page=videos/derbycon1/ben-feinstein-and-jeff-jarmoc-get-off-of-my-cloud-cloud-credential-compromise-and-exposure> Jimmy Shah – Mobile App Moolah: Profit taking with Mobile Malware<http://www.irongeek.com/i.php?page=videos/derbycon1/jimmy-shah-mobile-app-moolah-profit-taking-with-mobile-malware> McCorkle & Rios – 100 bugs in 100 days: An analysis of ICS (SCADA) software<http://www.irongeek.com/i.php?page=videos/derbycon1/mccorkle-and-rios-100-bugs-in-100-days-an-analysis-of-ics-scada-software> Scott Ullrich + Chris Buechler – Open source firewalling with pfSense (Sound came out as just fuzz) Spiky Geek – How I learned to roll my own:Building custom pen testing platforms on the fly (Sound came out as just fuzz) Brent Huston – Realize Your Hacker Heritage: Do The Needful<http://www.irongeek.com/i.php?page=videos/derbycon1/brent-huston-realize-your-hacker-heritage-do-the-needful> Day 3, Track 1 Charlie Miller – Battery Firmware Hacking<http://www.irongeek.com/i.php?page=videos/derbycon1/charlie-miller-battery-firmware-hacking> Peter Van Eeckhoutte & Elliot Cutright – Win32 Exploit Development With Mona and the Metasploit Framework<http://www.irongeek.com/i.php?page=videos/derbycon1/peter-van-eeckhoutte-and-elliot-cutright-win32-exploit-development-with-mona-and-the-metasploit-framework> Ryan Linn – collecting Underpants To Win Your Network<http://www.irongeek.com/i.php?page=videos/derbycon1/ryan-linn-collecting-underpants-to-win-your-network> Jamison Scheeres – Social Engineering is a Fraud (Awaiting approval) Josh Kelley (winfang98) – Infectious Media – Bypassing AutoRun once and for all<http://www.irongeek.com/i.php?page=videos/derbycon1/kevin-johnson-and-tom-eston-desktop-betrayal-exploiting-clients-through-the-features-they-demand> Kevin Johnson & Tom Eston – Desktop Betrayal: Exploiting Clients through the Features They Demand<http://www.irongeek.com/i.php?page=videos/derbycon1/kevin-johnson-and-tom-eston-desktop-betrayal-exploiting-clients-through-the-features-they-demand> Enjoy! -- "The ability to quote is a serviceable substitute for wit." ~ W. Somerset Maugham
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
