/events/defcon-oud/14/audio/
File Name  ↓ File Size  ↓ Date  ↓ 
Parent directory/--
Defcon14-V10-Rick_Hill-WarRocketing.mp3 13M2012-May-12 04:09
Defcon14-V11-Bruce_Potter-Trusted_Computing.mp3 18M2012-May-12 04:09
Defcon14-V12-Valsmith_and_Quist-Hacking_Malware..> 15M2012-May-12 04:10
Defcon14-V13-C_Mulliner-Attacks_Against_pocketP..> 15M2012-May-12 04:10
Defcon14-V14-White_and_Archer-Natl_Collegiate_C..> 18M2012-May-12 04:10
Defcon14-V15-Moulton-Anatomy_of_a_Hardrive.mp3 14M2012-May-12 04:09
Defcon14-V16-Major_Malfunction-Magstripe_Madnes..> 17M2012-May-12 04:09
Defcon14-V17-T_Holt-Exploring_Defcon_Over_the_P..> 17M2012-May-12 04:10
Defcon14-V18-Johnny_Long-Death_by_1000_cuts.mp3 18M2012-May-12 04:10
Defcon14-V19-Strom_Carlson-Hacking_FedEx-Kinkos..> 16M2012-May-12 04:10
Defcon14-V20-Robert_Clark-Year_in_Review_2005-2..> 18M2012-May-12 04:09
Defcon14-V21-Schroader_and_Cohen-Cyber_Crime_Fo..> 16M2012-May-12 04:10
Defcon14-V22-Panel-Ask_the_EFF.mp3 18M2012-May-12 04:10
Defcon14-V23-Chris_Paget-US-VISIT.mp3 17M2012-May-12 04:09
Defcon14-V24-Scott_Miller-A_New_Bioinformatics.mp3 14M2012-May-12 04:10
Defcon14-V25-Teli_Brown-Phishing_Starts_with_PH..> 9M2012-May-12 04:10
Defcon14-V26-Timothy_ONeill-What_Has_The_NSA_do..> 8M2012-May-12 04:10
Defcon14-V27-Charles_Edge-10_ways_not_to_get_Ca..> 7M2012-May-12 04:09
Defcon14-V28-Rieback-Hackers_Guid_to_RFID.mp3 17M2012-May-12 04:10
Defcon14-V29-Panel-Meet_the_Fed.mp3 18M2012-May-12 04:10
Defcon14-V32-Thompson_and_Monroe-Adv_file_syste..> 17M2012-May-12 04:10
Defcon14-V33-Charles_Edge_Crypted-Mac_OSX_Secur..> 8M2012-May-12 04:10
Defcon14-V34-Strom_Carlson_and_Panel-Social_Mes..> 14M2012-May-12 04:09
Defcon14-V35-Raffael_Marty-Visual_Log_Analysis.mp3 18M2012-May-12 04:09
Defcon14-V36-Geers_and_Eisen-IPv6_World_Update.mp3 18M2012-May-12 04:09
Defcon14-V37-Tommee_Pickles-802.1x_Networking.mp3 14M2012-May-12 04:09
Defcon14-V38-Kornbrust-Oracle_Rootkits_2.0.mp3 11M2012-May-12 04:09
Defcon14-V39-Yuan_Fan-MatriXay.mp3 10M2012-May-12 04:09
Defcon14-V40-Damon_McCoy-Zulu.mp3 4M2012-May-12 04:10
Defcon14-V41-Kaminsky-Black_Ops_2006.mp3 14M2012-May-12 04:10
Defcon14-V42-Jared_DeMott-Evolving_art_of_Fuzzi..> 16M2012-May-12 04:09
Defcon14-V43-Dr.Kaos_and_Panel-SAMAEL.mp3 19M2012-May-12 04:10
Defcon14-V44-Isaac_Levy-Hacking_UNIX_with_FreeB..> 16M2012-May-12 04:09
Defcon14-V45-Luis_Miras-Bridging_the_Gap.mp3 12M2012-May-12 04:10
Defcon14-V46-martyn_ruks-IBM_networking_attacks..> 18M2012-May-12 04:10
Defcon14-V47-Michael_Rash-Service_Cloacking_and..> 13M2012-May-12 04:09
Defcon14-V48-Stamp_and_Wong-Hunting_Metamorphic..> 16M2012-May-12 04:10
Defcon14-V49-Caezar-Securing_MANET.mp3 18M2012-May-12 04:10
Defcon14-V50-Johnny_Cache-Fun_with_Device_Drive..> 15M2012-May-12 04:09
Defcon14-V51-Halvar_Flake-RE2006-Need_new_Tools..> 18M2012-May-12 04:10
Defcon14-V52-Weasel-Plausible_Deniability_Toolk..> 20M2012-May-12 04:09
Defcon14-V53-Linton_Wells-UNCLASSIFIED.mp3 17M2012-May-12 04:10
Defcon14-V54-Joe_Stewart-OllyBone.mp3 13M2012-May-12 04:09
Defcon14-V55-Peleus_Uhley-Kiosk_security.mp3 17M2012-May-12 04:10
Defcon14-V56-RP-Murphy-Covert_Channels_Using_IP..> 15M2012-May-12 04:10
Defcon14-V57-Marc_Weber_Tobias-Things_that_go_b..> 15M2012-May-12 04:09
Defcon14-V58-Vaughn_and_Evron-DNS_Amplification..> 18M2012-May-12 04:09
Defcon14-V59-FX-Blackberry_Case.mp3 17M2012-May-12 04:09
Defcon14-V61-Gadi_Evron-DNS_Abuse_and_Games.mp3 11M2012-May-12 04:10
Defcon14-V62-Arius_Hung-Owning_the_linksys_VOIP..> 4M2012-May-12 04:09
Defcon14-V63-Johnny_Long-Secrets_of_the_Hollywo..> 20M2012-May-12 04:09
Defcon14-V64-X30n-BlackJacking_Owning_the_enter..> 17M2012-May-12 04:10
Defcon14-V65-Robert_W_Clark-Legal_Computer_Self..> 26M2012-May-12 04:10
Defcon14-V67-Robert_Hansen-Trust_but_Verify.mp3 17M2012-May-12 04:10
Defcon14-V68-Rick_Wesson-The_Global_Infection_R..> 17M2012-May-12 04:09
Defcon14-V69-Andrew_Whitaker-Corporate_network_..> 23M2012-May-12 04:09
Defcon14-V70-Jon_Callas-Traffic_Analysis_Panel.mp3 19M2012-May-12 04:10
Defcon14-V71-Broward_Horne-MEME_Hacking.mp3 17M2012-May-12 04:10
Defcon14-V72-Foofus-Graphical_Representations_o..> 14M2012-May-12 04:09
Defcon14-V73-PANEL_EFF-The_EFF_vs_ATT.mp3 17M2012-May-12 04:09
Defcon14-V74-SensePost-Tale_of_Two_Proxies.mp3 18M2012-May-12 04:09
Defcon14-V75-Peter_Gutman-Phishing_tips_and_Tec..> 17M2012-May-12 04:10
Defcon14-V76-Johan_Hybinette-How_to_Create_Anon..> 12M2012-May-12 04:09
Defcon14-V77-Lin0xx-Adv_Win_Based_Firewall_Subv..> 16M2012-May-12 04:09
Defcon14-V78-Chris_Eagle-Ripples_in_the_Gene_Po..> 15M2012-May-12 04:10
Defcon14-V79-Steve_Dunker-FEAR_the_Census_Burea..> 22M2012-May-12 04:09
Defcon14-V80-Seth_Hardy-Name_and_Shoe_size.mp3 16M2012-May-12 04:10
Defcon14-V81-Paul_Vixie-Malware_repository_Requ..> 18M2012-May-12 04:10
Defcon14-V82-Brad_Smith-How_the_FBI_uses_NLP_on..> 16M2012-May-12 04:09
Defcon14-V83-Brown_and_Dunlop-Exploit_Writing_V..> 19M2012-May-12 04:10
Defcon14-V84-Dark_Tangent-Award_Ceremonies.mp3 38M2012-May-12 04:09
Defcon14-V9-Panel-InternetWars2006.mp3 35M2012-May-12 04:10