Sponsor Links |
Soft Name |
|
DAY_2_-_Jim_Geovedi_and_Raditya_Iryandi_-_Hacking_a_bird_in_the_sky.pdf |
|
HITBSecConf2006 Presentation - Hacking a Bird in The Sky: Hijacking VSAT Connections. Soft Directory:Security |
|
DAY_2_-_Fyodor_Yarochkin_and_Meder_Kydyraliev_-_YAWATT.pdf |
|
HITBSecConf2006 Presentation - Yet Another Web Application Testing Toolkit (YAWATT). Soft Directory:Security |
|
DAY_2_-_Douglas_MacIver_-_Pentesting_BitLocker.pdf |
|
HITBSecConf2006 Presentation - Pen Testing Windows Vista BitLocker Drive Encryption from the Inside. Soft Directory:Security |
|
DAY_2_-_Carlos_Sarraute_and_Javier_Burroni_-_Using_Neural_Networks.pdf |
|
HITBSecConf2006 Presentation - Using Neural Networks and Statistical Machinery to improve remote ... Soft Directory:Security |
|
DAY_2_-_Anthony_Zboralski_and_Dave_Mckay_-_Hacking_Trust.pdf |
|
HITBSecConf2006 Presentation - Hacking Trust. Soft Directory:Security |
|
DAY_1_-_Yen_Ming_Chen_-_Triple_Play_Triple_Threats_IPTV_Security.pdf |
|
HITBSecConf2006 Presentation - Triple Play; Triple Threat? IPTV Security. Soft Directory:Security |
|
DAY_1_-_Thorsten_Holz_-_Tracking_Botnets.pdf |
|
HITBSecConf2006 Presentation - Playing with Botnets for Fun and Profit. Soft Directory:Security |
|
DAY_1_-_Saumil_Shah_-_Writing_Metasploit_Plugins.pdf |
|
HITBSecConf2006 Presentation - Writing Metasploit Plugins - From Vulnerability to Exploit. Soft Directory:Security |
|
DAY_1_-_Paul_Boehm_-_Taming_Bugs.pdf |
|
HITBSecConf2006 Presentation - Taming Bugs: The Art and Science of Writing Secure Code. Soft Directory:Security |
|
DAY_1_-_Michael_Davis_-_Client_Honeypots.pdf |
|
HITBSecConf2006 Presentation - Client Honeypots - Its Not Only The Network. Soft Directory:Security |
|