Skip to main content

We will keep fighting for all libraries - stand with us!

Files for defcon2000realaudio


      
Name Last modified Size
Go to parent directory
2000_Defcon_V01-Arthur_Money-Meet_The_Fed_Panel-audio.afpk 20-Dec-2014 19:55 701.3K
2000_Defcon_V01-Arthur_Money-Meet_The_Fed_Panel-audio.rm 31-Aug-2012 03:13 14.6M
2000_Defcon_V03-Noise-Anonymous_Remailser_The_Importance_of_Widley_Availabel_Anonymity_in_an_Age_of_Big_Brother-audio.afpk 20-Dec-2014 21:38 469.0K
2000_Defcon_V03-Noise-Anonymous_Remailser_The_Importance_of_Widley_Availabel_Anonymity_in_an_Age_of_Big_Brother-audio.rm 31-Aug-2012 03:13 9.5M
2000_Defcon_V05-Jennifer_Granick-The_Law_and_Hacking-audio.afpk 20-Dec-2014 21:20 618.7K
2000_Defcon_V05-Jennifer_Granick-The_Law_and_Hacking-audio.rm 31-Aug-2012 03:13 12.5M
2000_Defcon_V06-John_Q_Newman-10_Steps_You_Can_Take_to_Protect_Your_Privacy-audio.afpk 20-Dec-2014 19:58 643.4K
2000_Defcon_V06-John_Q_Newman-10_Steps_You_Can_Take_to_Protect_Your_Privacy-audio.rm 31-Aug-2012 03:13 11.3M
2000_Defcon_V07-Syke-Opensource_Utilities_and_How_to_Use_Them_to_Test_IDSes_and_Firewalls-audio.afpk 20-Dec-2014 20:05 691.2K
2000_Defcon_V07-Syke-Opensource_Utilities_and_How_to_Use_Them_to_Test_IDSes_and_Firewalls-audio.rm 31-Aug-2012 03:13 13.2M
2000_Defcon_V08-Jason_Scott-TEXTFILESDOTCON_One_Year_Later-audio.afpk 20-Dec-2014 21:23 744.7K
2000_Defcon_V08-Jason_Scott-TEXTFILESDOTCON_One_Year_Later-audio.rm 31-Aug-2012 03:13 14.5M
2000_Defcon_V09-Jeru-Advanced_Evasion_of_IDS_Buffer_Overflow_Detection-audio.afpk 20-Dec-2014 21:14 179.8K
2000_Defcon_V09-Jeru-Advanced_Evasion_of_IDS_Buffer_Overflow_Detection-audio.rm 31-Aug-2012 03:14 3.9M
2000_Defcon_V11-Gregory-B-White_The_USAFA_cadet_Hacking_Case-audio.afpk 20-Dec-2014 21:23 138.7K
2000_Defcon_V11-Gregory-B-White_The_USAFA_cadet_Hacking_Case-audio.rm 31-Aug-2012 03:14 2.4M
2000_Defcon_V12-Tim_Lawless-Saint_Jude_Modeling_Detecting_and_Responding_to_Unauthorized_Root_Transitions-audio.afpk 20-Dec-2014 21:13 491.3K
2000_Defcon_V12-Tim_Lawless-Saint_Jude_Modeling_Detecting_and_Responding_to_Unauthorized_Root_Transitions-audio.rm 31-Aug-2012 03:14 10.8M
2000_Defcon_V13-Thomas_Munn-The_Need_For_Home_Based_Firewalls-audio.afpk 20-Dec-2014 21:17 46.0K
2000_Defcon_V13-Thomas_Munn-The_Need_For_Home_Based_Firewalls-audio.rm 31-Aug-2012 03:14 994.5K
2000_Defcon_V14-Ron_Moritz-Proactive_Defense_Against_Malicious_Code-audio.afpk 20-Dec-2014 21:17 489.3K
2000_Defcon_V14-Ron_Moritz-Proactive_Defense_Against_Malicious_Code-audio.rm 31-Aug-2012 03:14 11.0M
2000_Defcon_V15-Robert_Graham-Evading_Network_Based_Intrusion_Detection_Systems-audio.afpk 20-Dec-2014 20:33 525.4K
2000_Defcon_V15-Robert_Graham-Evading_Network_Based_Intrusion_Detection_Systems-audio.rm 31-Aug-2012 03:14 11.6M
2000_Defcon_V16-Xs-LDAP-audio.afpk 20-Dec-2014 20:08 369.0K
2000_Defcon_V16-Xs-LDAP-audio.rm 31-Aug-2012 03:14 8.8M
2000_Defcon_V17-D-Krypt-Web_Application_Security-audio.afpk 20-Dec-2014 20:20 386.9K
2000_Defcon_V17-D-Krypt-Web_Application_Security-audio.rm 31-Aug-2012 03:14 8.0M
2000_Defcon_V19-V1ru5-More_Lock_Picking-audio.afpk 20-Dec-2014 20:24 619.5K
2000_Defcon_V19-V1ru5-More_Lock_Picking-audio.rm 31-Aug-2012 03:14 13.3M
2000_Defcon_V20-Bruce_Schneir-Session-audio.afpk 20-Dec-2014 20:01 691.5K
2000_Defcon_V20-Bruce_Schneir-Session-audio.rm 31-Aug-2012 03:14 13.7M
2000_Defcon_V21-Ian_Vitek-Configuring_Linux_2_for_IP_Spoofing_and_Source_Routing-audio.afpk 20-Dec-2014 20:02 241.8K
2000_Defcon_V21-Ian_Vitek-Configuring_Linux_2_for_IP_Spoofing_and_Source_Routing-audio.rm 31-Aug-2012 03:14 6.3M
2000_Defcon_V22-MR_Nasty-Using_Tools_to_Obtain_Recon_on_NT_Networks-audio.afpk 20-Dec-2014 20:12 341.5K
2000_Defcon_V22-MR_Nasty-Using_Tools_to_Obtain_Recon_on_NT_Networks-audio.rm 31-Aug-2012 03:14 7.3M
2000_Defcon_V24-Bennett_Haselton-A_Protocol_That_Uses_Steganography_to_Circumvent_Network_Level_Censorship-audio.afpk 20-Dec-2014 20:30 684.9K
2000_Defcon_V24-Bennett_Haselton-A_Protocol_That_Uses_Steganography_to_Circumvent_Network_Level_Censorship-audio.rm 31-Aug-2012 03:14 14.7M
2000_Defcon_V25-Legal_Panel_Discussion-audio.afpk 20-Dec-2014 20:27 627.3K
2000_Defcon_V25-Legal_Panel_Discussion-audio.rm 31-Aug-2012 03:14 14.1M
2000_Defcon_V26-David_J_DiCenso-The_Citizen_Hacker_Patriot_or_War_Criminal-audio.afpk 20-Dec-2014 20:18 472.6K
2000_Defcon_V26-David_J_DiCenso-The_Citizen_Hacker_Patriot_or_War_Criminal-audio.rm 31-Aug-2012 03:14 9.5M
2000_Defcon_V27-Greg_Hoglund-Advanced_Buffer_Overflow_Techniques-audio.afpk 20-Dec-2014 20:15 603.0K
2000_Defcon_V27-Greg_Hoglund-Advanced_Buffer_Overflow_Techniques-audio.rm 31-Aug-2012 03:14 13.4M
2000_Defcon_V28-Mike_Scher-What_is_DNS-audio.afpk 20-Dec-2014 20:10 352.8K
2000_Defcon_V28-Mike_Scher-What_is_DNS-audio.rm 31-Aug-2012 03:15 8.0M
2000_Defcon_V29-Ian_Goldberg-Using_The_Internet_Pseudonymously_3_Its_Alive-audio.afpk 20-Dec-2014 20:36 614.5K
2000_Defcon_V29-Ian_Goldberg-Using_The_Internet_Pseudonymously_3_Its_Alive-audio.rm 31-Aug-2012 03:15 12.6M
2000_Defcon_V30-Ghandi-Dotcom_Smashing_Buffer_Overflows_on_the_SPARC-audio.afpk 20-Dec-2014 20:54 431.6K
2000_Defcon_V30-Ghandi-Dotcom_Smashing_Buffer_Overflows_on_the_SPARC-audio.rm 31-Aug-2012 03:15 11.1M
2000_Defcon_V31-DDT-What_PGP_and_Crypo_is_and_How_to_use_it-audio.afpk 20-Dec-2014 21:05 633.0K
2000_Defcon_V31-DDT-What_PGP_and_Crypo_is_and_How_to_use_it-audio.rm 31-Aug-2012 03:15 13.3M
2000_Defcon_V35-Ender-Demonstration_and_Presentation_of_the_Autonomous_Nodes-audio.afpk 20-Dec-2014 20:52 304.2K
2000_Defcon_V35-Ender-Demonstration_and_Presentation_of_the_Autonomous_Nodes-audio.rm 31-Aug-2012 03:15 6.9M
2000_Defcon_V36-Evil_Wrangler-Building_Backdoor_Binary_Featuring_SSH_2-0-13-audio.afpk 20-Dec-2014 20:38 353.4K
2000_Defcon_V36-Evil_Wrangler-Building_Backdoor_Binary_Featuring_SSH_2-0-13-audio.rm 31-Aug-2012 03:15 8.5M
2000_Defcon_V37-Jim_McCoy-Building_the_Mojo_Nation-audio.afpk 20-Dec-2014 20:42 644.6K
2000_Defcon_V37-Jim_McCoy-Building_the_Mojo_Nation-audio.rm 31-Aug-2012 03:15 15.5M
2000_Defcon_V38-Aaron_Grothe-Tunneling_and_Firewalls-audio.afpk 20-Dec-2014 21:05 221.6K
2000_Defcon_V38-Aaron_Grothe-Tunneling_and_Firewalls-audio.rm 31-Aug-2012 03:15 5.0M
2000_Defcon_V39-Chris_Goggans-Lotus_Domino_Vulerabilities-audio.afpk 20-Dec-2014 20:59 601.4K
2000_Defcon_V39-Chris_Goggans-Lotus_Domino_Vulerabilities-audio.rm 31-Aug-2012 03:15 14.2M
2000_Defcon_V40-Freaky-Macintosh_Security-audio.afpk 20-Dec-2014 21:26 602.6K
2000_Defcon_V40-Freaky-Macintosh_Security-audio.rm 31-Aug-2012 03:15 12.8M
2000_Defcon_V42-Adam_Bresson-Palm_Data_Protection-audio.afpk 20-Dec-2014 20:57 587.9K
2000_Defcon_V42-Adam_Bresson-Palm_Data_Protection-audio.rm 31-Aug-2012 03:15 12.4M
2000_Defcon_V43-Pyr0-FAQ_The_Kiddies-audio.afpk 20-Dec-2014 21:02 413.6K
2000_Defcon_V43-Pyr0-FAQ_The_Kiddies-audio.rm 31-Aug-2012 03:15 10.4M
2000_Defcon_V44-Phillip_J_Loranger-Army_Biometrics-audio.afpk 20-Dec-2014 21:01 586.4K
2000_Defcon_V44-Phillip_J_Loranger-Army_Biometrics-audio.rm 31-Aug-2012 03:15 12.6M
2000_Defcon_V45-Phil_King-8-bit_Redux_Microcntroller_Hacking-audio.afpk 20-Dec-2014 20:43 432.7K
2000_Defcon_V45-Phil_King-8-bit_Redux_Microcntroller_Hacking-audio.rm 31-Aug-2012 03:15 9.4M
2000_Defcon_V47-Simple_Nomad-A_How_to_Regarding_Network_Mapping-audio.afpk 20-Dec-2014 21:32 483.0K
2000_Defcon_V47-Simple_Nomad-A_How_to_Regarding_Network_Mapping-audio.rm 31-Aug-2012 03:15 10.0M
2000_Defcon_V48-John_S_Flowers-Network_IDS_Do_Not_Fold_Spindle_or_Mutilate-audio.afpk 20-Dec-2014 21:28 586.1K
2000_Defcon_V48-John_S_Flowers-Network_IDS_Do_Not_Fold_Spindle_or_Mutilate-audio.rm 31-Aug-2012 03:16 14.3M
2000_Defcon_V49-V1ru5-Updated_Computer_Virus_Class-audio.afpk 20-Dec-2014 21:34 692.4K
2000_Defcon_V49-V1ru5-Updated_Computer_Virus_Class-audio.rm 31-Aug-2012 03:16 14.2M
2000_Defcon_V50-Richard_Thieme-Social_Engineering_at_Defcon_Games_Hackers_Play-audio.afpk 20-Dec-2014 21:37 453.3K
2000_Defcon_V50-Richard_Thieme-Social_Engineering_at_Defcon_Games_Hackers_Play-audio.rm 31-Aug-2012 03:16 8.1M
2000_Defcon_V51-Blanu-Freenet-audio.afpk 20-Dec-2014 21:30 532.2K
2000_Defcon_V51-Blanu-Freenet-audio.rm 31-Aug-2012 03:16 12.2M
2000_Defcon_V52-Daremoe-System_Profiling_Target_Analysis_or_How_Crackers_Find_You-audio.afpk 20-Dec-2014 20:50 405.3K
2000_Defcon_V52-Daremoe-System_Profiling_Target_Analysis_or_How_Crackers_Find_You-audio.rm 31-Aug-2012 03:16 8.6M
2000_Defcon_V53-Sarah_Gordon-Virus_Writers_The_End_Of_Innocence-audio.afpk 20-Dec-2014 20:45 426.2K
2000_Defcon_V53-Sarah_Gordon-Virus_Writers_The_End_Of_Innocence-audio.rm 31-Aug-2012 03:16 8.4M
2000_Defcon_V54-Kent_Radek-Puzzlenet_Designing_an_Anonymous_Network-audio.afpk 20-Dec-2014 20:48 580.4K
2000_Defcon_V54-Kent_Radek-Puzzlenet_Designing_an_Anonymous_Network-audio.rm 31-Aug-2012 03:16 14.2M
2000_Defcon_V55_Natasha_Grigori-Hacktivist_to_Activsts_Making_the_Transition-audio.afpk 20-Dec-2014 21:10 266.7K
2000_Defcon_V55_Natasha_Grigori-Hacktivist_to_Activsts_Making_the_Transition-audio.rm 31-Aug-2012 03:16 6.0M
2000_defcon_V32-John_Q_Newman-Fake_ID_by_Mail_and_Modem-audio.afpk 20-Dec-2014 21:09 826.5K
2000_defcon_V32-John_Q_Newman-Fake_ID_by_Mail_and_Modem-audio.rm 31-Aug-2012 03:16 14.6M
defcon2000realaudio_archive.torrent 01-Nov-2022 20:26 41.9K
defcon2000realaudio_files.xml 01-Nov-2022 20:26 43.9K
defcon2000realaudio_meta.xml 01-Nov-2022 20:26 687.0B
defcon2000realaudio_rules.conf 31-Aug-2012 03:42 7.0B