Well, there goes any productivity at work today! Thanks Adrian!
On Mon, Feb 18, 2013 at 1:19 AM, Adrian Crenshaw <[email protected]>wrote: > For those that missed them: > > <http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Thin_Slicing_a_Black_Swan:_A_Search_for_the_Unknowns> > > “Thin Slicing a Black Swan: A Search for the Unknowns” by Michele > “@mrsyiswhy” Chubirka & Ronald > Reck<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Thin_Slicing_a_Black_Swan:_A_Search_for_the_Unknowns> > “When Did the Smartphone Pentest Framework Get Awesome?” by by Georgia > “@georgiaweidman” > Weidman<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#When_Did_the_Smartphone_Pentest_Framework_Get_Awesome> > “ShellSquid: Distributed Shells With Node” by Tom > Steele<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#ShellSquid:_Distributed_Shells_With_Node> > “If You Can Open The Terminal, You Can Capture The Flag: CTF for > Everyone” by Nicolle “@rogueclown” > Neulist<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#If_You_Can_Open_The_Terminal,_You_Can_Capture_The_Flag:_CTF_for_Everyone> > “Becoming a Time Lord – Implications of Attacking Time Sources” Joe > “@joeklein” > Klein<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Becoming_a_Time_Lord_%E2%80%93_Implications_of_Attacking_Time_Sources> > “Swinging Security Style: An Immodest Proposal” by Wendy “@451wendy” > Nather<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Swinging_Security_Style:_An_Immodest_Proposal> > “Drones: Augmenting your cyber attack tool bag with aerial weapon > systems” by Zac “@ph3n0” > Hinkel<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Drones:_Augmenting_your_cyber_attack_tool_bag_with_aerial_weapon_systems> > “Managed Service Providers: Pwn One and Done” Damian “@integrisec” > Profancik<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Managed_Service_Providers:_Pwn_One_and_Done> > “No Tools? No Problem! Building a PowerShell Botnet” Christopher > “@obscuresec” > Campbell<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#No_Tools_No_Problem%21_Building_a_PowerShell_Botnet> > “Extending the 20 Critical Security Controls to Gap Assessments and > Security Maturity Modelling” John “@pinfosec” > Willis<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Extending_the_20_Critical_Security_Controls_to_Gap_Assessments_and_Security_Maturity_Modelling> > “Protecting Big Data From Cyber APT in the Cloud” Bill “@oncee” > Gardner<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Protecting_Big_Data_From_Cyber_APT_in_the_Cloud> > “Writing a Thumbdrive for Active Disk Antiforensics” Travis > “@travisgoodspeed” > Goodspeed<http://www.irongeek.com/i.php?page=videos/shmoocon-firetalks-2013#Writing_a_Thumbdrive_for_Active_Disk_Antiforensics> > > > -- > "The ability to quote is a serviceable substitute for wit." ~ W. Somerset > Maugham > "The ability to Google can be a serviceable substitute for technical > knowledge." ~ Adrian D. Crenshaw > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
