Go to parent directory |
|
|
2000_Defcon_V01-Arthur_Money-Meet_The_Fed_Panel-audio.afpk |
20-Dec-2014 19:55 |
701.3K |
2000_Defcon_V01-Arthur_Money-Meet_The_Fed_Panel-audio.rm |
31-Aug-2012 03:13 |
14.6M |
2000_Defcon_V03-Noise-Anonymous_Remailser_The_Importance_of_Widley_Availabel_Anonymity_in_an_Age_of_Big_Brother-audio.afpk |
20-Dec-2014 21:38 |
469.0K |
2000_Defcon_V03-Noise-Anonymous_Remailser_The_Importance_of_Widley_Availabel_Anonymity_in_an_Age_of_Big_Brother-audio.rm |
31-Aug-2012 03:13 |
9.5M |
2000_Defcon_V05-Jennifer_Granick-The_Law_and_Hacking-audio.afpk |
20-Dec-2014 21:20 |
618.7K |
2000_Defcon_V05-Jennifer_Granick-The_Law_and_Hacking-audio.rm |
31-Aug-2012 03:13 |
12.5M |
2000_Defcon_V06-John_Q_Newman-10_Steps_You_Can_Take_to_Protect_Your_Privacy-audio.afpk |
20-Dec-2014 19:58 |
643.4K |
2000_Defcon_V06-John_Q_Newman-10_Steps_You_Can_Take_to_Protect_Your_Privacy-audio.rm |
31-Aug-2012 03:13 |
11.3M |
2000_Defcon_V07-Syke-Opensource_Utilities_and_How_to_Use_Them_to_Test_IDSes_and_Firewalls-audio.afpk |
20-Dec-2014 20:05 |
691.2K |
2000_Defcon_V07-Syke-Opensource_Utilities_and_How_to_Use_Them_to_Test_IDSes_and_Firewalls-audio.rm |
31-Aug-2012 03:13 |
13.2M |
2000_Defcon_V08-Jason_Scott-TEXTFILESDOTCON_One_Year_Later-audio.afpk |
20-Dec-2014 21:23 |
744.7K |
2000_Defcon_V08-Jason_Scott-TEXTFILESDOTCON_One_Year_Later-audio.rm |
31-Aug-2012 03:13 |
14.5M |
2000_Defcon_V09-Jeru-Advanced_Evasion_of_IDS_Buffer_Overflow_Detection-audio.afpk |
20-Dec-2014 21:14 |
179.8K |
2000_Defcon_V09-Jeru-Advanced_Evasion_of_IDS_Buffer_Overflow_Detection-audio.rm |
31-Aug-2012 03:14 |
3.9M |
2000_Defcon_V11-Gregory-B-White_The_USAFA_cadet_Hacking_Case-audio.afpk |
20-Dec-2014 21:23 |
138.7K |
2000_Defcon_V11-Gregory-B-White_The_USAFA_cadet_Hacking_Case-audio.rm |
31-Aug-2012 03:14 |
2.4M |
2000_Defcon_V12-Tim_Lawless-Saint_Jude_Modeling_Detecting_and_Responding_to_Unauthorized_Root_Transitions-audio.afpk |
20-Dec-2014 21:13 |
491.3K |
2000_Defcon_V12-Tim_Lawless-Saint_Jude_Modeling_Detecting_and_Responding_to_Unauthorized_Root_Transitions-audio.rm |
31-Aug-2012 03:14 |
10.8M |
2000_Defcon_V13-Thomas_Munn-The_Need_For_Home_Based_Firewalls-audio.afpk |
20-Dec-2014 21:17 |
46.0K |
2000_Defcon_V13-Thomas_Munn-The_Need_For_Home_Based_Firewalls-audio.rm |
31-Aug-2012 03:14 |
994.5K |
2000_Defcon_V14-Ron_Moritz-Proactive_Defense_Against_Malicious_Code-audio.afpk |
20-Dec-2014 21:17 |
489.3K |
2000_Defcon_V14-Ron_Moritz-Proactive_Defense_Against_Malicious_Code-audio.rm |
31-Aug-2012 03:14 |
11.0M |
2000_Defcon_V15-Robert_Graham-Evading_Network_Based_Intrusion_Detection_Systems-audio.afpk |
20-Dec-2014 20:33 |
525.4K |
2000_Defcon_V15-Robert_Graham-Evading_Network_Based_Intrusion_Detection_Systems-audio.rm |
31-Aug-2012 03:14 |
11.6M |
2000_Defcon_V16-Xs-LDAP-audio.afpk |
20-Dec-2014 20:08 |
369.0K |
2000_Defcon_V16-Xs-LDAP-audio.rm |
31-Aug-2012 03:14 |
8.8M |
2000_Defcon_V17-D-Krypt-Web_Application_Security-audio.afpk |
20-Dec-2014 20:20 |
386.9K |
2000_Defcon_V17-D-Krypt-Web_Application_Security-audio.rm |
31-Aug-2012 03:14 |
8.0M |
2000_Defcon_V19-V1ru5-More_Lock_Picking-audio.afpk |
20-Dec-2014 20:24 |
619.5K |
2000_Defcon_V19-V1ru5-More_Lock_Picking-audio.rm |
31-Aug-2012 03:14 |
13.3M |
2000_Defcon_V20-Bruce_Schneir-Session-audio.afpk |
20-Dec-2014 20:01 |
691.5K |
2000_Defcon_V20-Bruce_Schneir-Session-audio.rm |
31-Aug-2012 03:14 |
13.7M |
2000_Defcon_V21-Ian_Vitek-Configuring_Linux_2_for_IP_Spoofing_and_Source_Routing-audio.afpk |
20-Dec-2014 20:02 |
241.8K |
2000_Defcon_V21-Ian_Vitek-Configuring_Linux_2_for_IP_Spoofing_and_Source_Routing-audio.rm |
31-Aug-2012 03:14 |
6.3M |
2000_Defcon_V22-MR_Nasty-Using_Tools_to_Obtain_Recon_on_NT_Networks-audio.afpk |
20-Dec-2014 20:12 |
341.5K |
2000_Defcon_V22-MR_Nasty-Using_Tools_to_Obtain_Recon_on_NT_Networks-audio.rm |
31-Aug-2012 03:14 |
7.3M |
2000_Defcon_V24-Bennett_Haselton-A_Protocol_That_Uses_Steganography_to_Circumvent_Network_Level_Censorship-audio.afpk |
20-Dec-2014 20:30 |
684.9K |
2000_Defcon_V24-Bennett_Haselton-A_Protocol_That_Uses_Steganography_to_Circumvent_Network_Level_Censorship-audio.rm |
31-Aug-2012 03:14 |
14.7M |
2000_Defcon_V25-Legal_Panel_Discussion-audio.afpk |
20-Dec-2014 20:27 |
627.3K |
2000_Defcon_V25-Legal_Panel_Discussion-audio.rm |
31-Aug-2012 03:14 |
14.1M |
2000_Defcon_V26-David_J_DiCenso-The_Citizen_Hacker_Patriot_or_War_Criminal-audio.afpk |
20-Dec-2014 20:18 |
472.6K |
2000_Defcon_V26-David_J_DiCenso-The_Citizen_Hacker_Patriot_or_War_Criminal-audio.rm |
31-Aug-2012 03:14 |
9.5M |
2000_Defcon_V27-Greg_Hoglund-Advanced_Buffer_Overflow_Techniques-audio.afpk |
20-Dec-2014 20:15 |
603.0K |
2000_Defcon_V27-Greg_Hoglund-Advanced_Buffer_Overflow_Techniques-audio.rm |
31-Aug-2012 03:14 |
13.4M |
2000_Defcon_V28-Mike_Scher-What_is_DNS-audio.afpk |
20-Dec-2014 20:10 |
352.8K |
2000_Defcon_V28-Mike_Scher-What_is_DNS-audio.rm |
31-Aug-2012 03:15 |
8.0M |
2000_Defcon_V29-Ian_Goldberg-Using_The_Internet_Pseudonymously_3_Its_Alive-audio.afpk |
20-Dec-2014 20:36 |
614.5K |
2000_Defcon_V29-Ian_Goldberg-Using_The_Internet_Pseudonymously_3_Its_Alive-audio.rm |
31-Aug-2012 03:15 |
12.6M |
2000_Defcon_V30-Ghandi-Dotcom_Smashing_Buffer_Overflows_on_the_SPARC-audio.afpk |
20-Dec-2014 20:54 |
431.6K |
2000_Defcon_V30-Ghandi-Dotcom_Smashing_Buffer_Overflows_on_the_SPARC-audio.rm |
31-Aug-2012 03:15 |
11.1M |
2000_Defcon_V31-DDT-What_PGP_and_Crypo_is_and_How_to_use_it-audio.afpk |
20-Dec-2014 21:05 |
633.0K |
2000_Defcon_V31-DDT-What_PGP_and_Crypo_is_and_How_to_use_it-audio.rm |
31-Aug-2012 03:15 |
13.3M |
2000_Defcon_V35-Ender-Demonstration_and_Presentation_of_the_Autonomous_Nodes-audio.afpk |
20-Dec-2014 20:52 |
304.2K |
2000_Defcon_V35-Ender-Demonstration_and_Presentation_of_the_Autonomous_Nodes-audio.rm |
31-Aug-2012 03:15 |
6.9M |
2000_Defcon_V36-Evil_Wrangler-Building_Backdoor_Binary_Featuring_SSH_2-0-13-audio.afpk |
20-Dec-2014 20:38 |
353.4K |
2000_Defcon_V36-Evil_Wrangler-Building_Backdoor_Binary_Featuring_SSH_2-0-13-audio.rm |
31-Aug-2012 03:15 |
8.5M |
2000_Defcon_V37-Jim_McCoy-Building_the_Mojo_Nation-audio.afpk |
20-Dec-2014 20:42 |
644.6K |
2000_Defcon_V37-Jim_McCoy-Building_the_Mojo_Nation-audio.rm |
31-Aug-2012 03:15 |
15.5M |
2000_Defcon_V38-Aaron_Grothe-Tunneling_and_Firewalls-audio.afpk |
20-Dec-2014 21:05 |
221.6K |
2000_Defcon_V38-Aaron_Grothe-Tunneling_and_Firewalls-audio.rm |
31-Aug-2012 03:15 |
5.0M |
2000_Defcon_V39-Chris_Goggans-Lotus_Domino_Vulerabilities-audio.afpk |
20-Dec-2014 20:59 |
601.4K |
2000_Defcon_V39-Chris_Goggans-Lotus_Domino_Vulerabilities-audio.rm |
31-Aug-2012 03:15 |
14.2M |
2000_Defcon_V40-Freaky-Macintosh_Security-audio.afpk |
20-Dec-2014 21:26 |
602.6K |
2000_Defcon_V40-Freaky-Macintosh_Security-audio.rm |
31-Aug-2012 03:15 |
12.8M |
2000_Defcon_V42-Adam_Bresson-Palm_Data_Protection-audio.afpk |
20-Dec-2014 20:57 |
587.9K |
2000_Defcon_V42-Adam_Bresson-Palm_Data_Protection-audio.rm |
31-Aug-2012 03:15 |
12.4M |
2000_Defcon_V43-Pyr0-FAQ_The_Kiddies-audio.afpk |
20-Dec-2014 21:02 |
413.6K |
2000_Defcon_V43-Pyr0-FAQ_The_Kiddies-audio.rm |
31-Aug-2012 03:15 |
10.4M |
2000_Defcon_V44-Phillip_J_Loranger-Army_Biometrics-audio.afpk |
20-Dec-2014 21:01 |
586.4K |
2000_Defcon_V44-Phillip_J_Loranger-Army_Biometrics-audio.rm |
31-Aug-2012 03:15 |
12.6M |
2000_Defcon_V45-Phil_King-8-bit_Redux_Microcntroller_Hacking-audio.afpk |
20-Dec-2014 20:43 |
432.7K |
2000_Defcon_V45-Phil_King-8-bit_Redux_Microcntroller_Hacking-audio.rm |
31-Aug-2012 03:15 |
9.4M |
2000_Defcon_V47-Simple_Nomad-A_How_to_Regarding_Network_Mapping-audio.afpk |
20-Dec-2014 21:32 |
483.0K |
2000_Defcon_V47-Simple_Nomad-A_How_to_Regarding_Network_Mapping-audio.rm |
31-Aug-2012 03:15 |
10.0M |
2000_Defcon_V48-John_S_Flowers-Network_IDS_Do_Not_Fold_Spindle_or_Mutilate-audio.afpk |
20-Dec-2014 21:28 |
586.1K |
2000_Defcon_V48-John_S_Flowers-Network_IDS_Do_Not_Fold_Spindle_or_Mutilate-audio.rm |
31-Aug-2012 03:16 |
14.3M |
2000_Defcon_V49-V1ru5-Updated_Computer_Virus_Class-audio.afpk |
20-Dec-2014 21:34 |
692.4K |
2000_Defcon_V49-V1ru5-Updated_Computer_Virus_Class-audio.rm |
31-Aug-2012 03:16 |
14.2M |
2000_Defcon_V50-Richard_Thieme-Social_Engineering_at_Defcon_Games_Hackers_Play-audio.afpk |
20-Dec-2014 21:37 |
453.3K |
2000_Defcon_V50-Richard_Thieme-Social_Engineering_at_Defcon_Games_Hackers_Play-audio.rm |
31-Aug-2012 03:16 |
8.1M |
2000_Defcon_V51-Blanu-Freenet-audio.afpk |
20-Dec-2014 21:30 |
532.2K |
2000_Defcon_V51-Blanu-Freenet-audio.rm |
31-Aug-2012 03:16 |
12.2M |
2000_Defcon_V52-Daremoe-System_Profiling_Target_Analysis_or_How_Crackers_Find_You-audio.afpk |
20-Dec-2014 20:50 |
405.3K |
2000_Defcon_V52-Daremoe-System_Profiling_Target_Analysis_or_How_Crackers_Find_You-audio.rm |
31-Aug-2012 03:16 |
8.6M |
2000_Defcon_V53-Sarah_Gordon-Virus_Writers_The_End_Of_Innocence-audio.afpk |
20-Dec-2014 20:45 |
426.2K |
2000_Defcon_V53-Sarah_Gordon-Virus_Writers_The_End_Of_Innocence-audio.rm |
31-Aug-2012 03:16 |
8.4M |
2000_Defcon_V54-Kent_Radek-Puzzlenet_Designing_an_Anonymous_Network-audio.afpk |
20-Dec-2014 20:48 |
580.4K |
2000_Defcon_V54-Kent_Radek-Puzzlenet_Designing_an_Anonymous_Network-audio.rm |
31-Aug-2012 03:16 |
14.2M |
2000_Defcon_V55_Natasha_Grigori-Hacktivist_to_Activsts_Making_the_Transition-audio.afpk |
20-Dec-2014 21:10 |
266.7K |
2000_Defcon_V55_Natasha_Grigori-Hacktivist_to_Activsts_Making_the_Transition-audio.rm |
31-Aug-2012 03:16 |
6.0M |
2000_defcon_V32-John_Q_Newman-Fake_ID_by_Mail_and_Modem-audio.afpk |
20-Dec-2014 21:09 |
826.5K |
2000_defcon_V32-John_Q_Newman-Fake_ID_by_Mail_and_Modem-audio.rm |
31-Aug-2012 03:16 |
14.6M |
defcon2000realaudio_archive.torrent |
01-Nov-2022 20:26 |
41.9K |
defcon2000realaudio_files.xml |
01-Nov-2022 20:26 |
43.9K |
defcon2000realaudio_meta.xml |
01-Nov-2022 20:26 |
687.0B |
defcon2000realaudio_rules.conf |
31-Aug-2012 03:42 |
7.0B |