Introducción a la arquitectura y programación sobre ARM

Vídeos y diapositivas de CONFidence 2104

  • August 13, 2014
  • tuxotron
  • confidence2014.png

    A continuación os dejo la lista de los vídeos (algunos con su correspondiente presentación) la conferencia sobre seguridad informática CONFidence 2014. Ésta se celebro los días 27 y 28 de mayo.

    El material publicado es el siguiente:

    • 50 Shades of RED: Stories from the “Playroom” - Video
    • NSA for dummies …methods to break RSA - Video
    • Scaling Security - Video
    • ATMs – We kick their ass - Video - Slides
    • Bitcoin Forensics: Fact or Fiction? - Video - Slides
    • Shameful secrets of proprietary protocols - Video - Slides
    • Evaluation of Transactional Controls in e-Banking Systems - Video - Slides
    • All your SAP P@$$w0ЯdZ belong to us - Video - Slides
    • Protecting Big Data at Scale - Video - Slides
    • Security Implications of the Cross-Origin Resource Sharing - Video - Slides
    • Asymmetric Defense “Using your home-field advantage” - Video - Slides
    • Preventing violation of memory safety in C/C++ software - Video - Slides
    • On the battlefield with the Dragons – the interesting and surprising CTF challenges - Video - Slides
    • SCADA deep inside: protocols and security mechanisms - Video - Slides
    • Exploring treasures of 77FEh - Video - Slides
    • The Tale of 100 CVE’s - Video - Slides
    • Hacking the Czech Parliament via SMS - Video

Audio de las charlas de la HOPE X

  • August 12, 2014
  • tuxotron
  • hopex_web_topbar_b.png

    Los organizadores de la HOPE X han puesto disponible el audio de todas las charlas que se dieron lugar. Si quieres los vídeos, puedes comprarlos online.

    HOPE X se dio lugar en Nueva York los pasados 18-20 de julio.

    Aquí como de costumbre os dejamos las lista con todas las charlas:

    • A Conversation with Edward Snowden - 16kbps - 128kbps
    • Keynote Address – Daniel Ellsberg - 16kbps - 128kbps
    • The Hacker Wars – A Conversation with NSA Whistleblower Thomas Drake - 16kbpsThe Hacker Wars - 128kbps
    • #radBIOS: Yelling a Database across the Room - 16kbps - 128kbps
    • (Geo)location, Location, Location: Technology and Countermeasures for Mobile Location Surveillance - 16kbps - 128kbps
    • A Beautiful Mosaic: How to Use FOIA to Fight Secrecy, Explore History, and Strengthen American Democracy - 16kbps - 128kbps
    • A Sea of Parts - 16kbps - 128kbps
    • A Story of Self Publishing Success - 16kbps - 128kbps
    • Apophenia: Hunting for the Ghost in the Machine - 16kbps - 128kbps
    • Are You Ready to SIP the Kool-Aid? - 16kbps - 128kbps
    • Art under Mass Surveillance - 16kbps - 128kbps
    • Ask the EFF – This Year on the Internet - 16kbps - 128kbps
    • Barrett Brown and Anonymous: Persecution of Information Activists - 16kbps - 128kbps
    • Biohacking and DIYbiology North of the 45th Parallel - 16kbps - 128kbps
    • Bless the Cops and Keep Them Far from Us: Researching, Exploring, and Publishing Findings While Staying out of Legal Trouble - 16kbps - 128kbps
    • Blinding The Surveillance State - 16kbps - 128kbps
    • Bootkits: Step-by-Step - 16kbps - 128kbps
    • Bringing Down the Biological System: How Poisons Hack the Body - 16kbps - 128kbps
    • Building an Open Source Cellular Network at Burning Man - 16kbps - 128kbps
    • Can You Patent Software? - 16kbps - 128kbps
    • Closing Ceremonies - 16kbps - 128kbps
    • Codesigning Countersurveillance - 16kbps - 128kbps
    • Community Infrastructure for FOSS Projects - 16kbps - 128kbps
    • Community Owned and Operated Cellular Networks in Rural Mexico - 16kbps - 128kbps
    • Crypto for Makers: Projects for the BeagleBone, Pi, and AVRs - 16kbps - 128kbps
    • Cultures of Open Source: A Cross-Cultural Analysis - 16kbps - 128kbps
    • Cyber Security in Humanitarian Projects as a Social Justice Issue - 16kbps - 128kbps
    • Dark Mail - 16kbps - 128kbps
    • Disruptive Wearable Technology - 16kbps - 128kbps
    • DIY Usability Research: A Crash Course in Guerrilla Data Gathering - 16kbps - 128kbps
    • Drop It Like It’s Hot: Secure Sharing and Radical OpSec for Investigative Journalists - 16kbps - 128kbps
    • Echoes of Returns Lost: The History of The Telecom Digest - 16kbps - 128kbps
    • Electric Waste Orchestra: Learning and Teaching Music, Electronics, Programming, and Repurposing - 16kbps - 128kbps
    • Elevator Hacking: From the Pit to the Penthouse - 16kbps - 128kbps
    • Ergonomic Human Interface Hacking - 16kbps - 128kbps
    • Ethical Questions and Best Practices for Service Providers in the Post-Snowden Era - 16kbps - 128kbps
    • Fuckhackerfucks! An Audience Bashing - 16kbps - 128kbps
    • G-code: The Programming Language of Machining and 3D Printers - 16kbps - 128kbps
    • Hacking Money, from Alexander the Great to Zerocoin - 16kbps - 128kbps
    • Hacking the Patent System: The Vulnerabilities That Allow for Bad Patents and How to Stop Them - 16kbps - 128kbps
    • Hearses and Hand-Held Calculators: The Unlikely Connections That Shaped Modern Technology and Tech Culture - 16kbps - 128kbps
    • How to Prevent Security Afterthought Syndrome - 16kbps - 128kbps
    • HTTP Must Die - 16kbps - 128kbps
    • I Am The Cavalry: Lessons Learned Fuzzing the Chain of Influence - 16kbps - 128kbps
    • Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices - 16kbps - 128kbps
    • Jumping the Carbon-Silicon Boundary for Fun and (Mostly) Profit - 16kbps - 128kbps
    • Keeping Old Code Alive: The Venerable LambdaMOO Server in 2014 - 16kbps - 128kbps
    • Lessons Learned from Implementing Real Life Whistleblowing Platforms - 16kbps - 128kbps
    • Lockpicking, a Primer - 16kbps - 128kbps
    • Media, Popular Misconceptions, and the CSI Effect – What Does It Mean for InfoSec and Tech Policy? - 16kbps - 128kbps
    • Movie: “Algorithm” - 16kbps - 128kbps
    • Movie: “Die Gstettensaga: The Rise of Echsenfriedl” - 16kbps - 128kbps
    • Movie: “The Internet’s Own Boy: The Story of Aaron Swartz” - 16kbps - 128kbps
    • Movie: “War on Whistleblowers: Free Press and the National Security State” - 16kbps - 128kbps
    • North Korea – Using Social Engineering and Concealed Electronic Devices to Gather Information in the World’s Most Restrictive Nation - 16kbps - 128kbps
    • Obfuscation and its Discontents: DIY Privacy from Card Swap to Browser Hack - 16kbps - 128kbps
    • Per Speculum In Ænigmate - 16kbps - 128kbps
    • Postprivacy: A New Approach to Thinking about Life in the Digital Sphere - 16kbps - 128kbps
    • PRISM-Proof Email: Why Email Is Insecure and How We Are Fixing It - 16kbps - 128kbps
    • Privacy-Friendly Hypertext? Do Not Track, Privacy Badger, and the Advertising-Funded Web - 16kbps - 128kbps
    • Project PM: Crowdsourcing Research of the Cyber-Intelligence Complex - 16kbps - 128kbps
    • Reverse Engineering – Unlocking the Locks - 16kbps - 128kbps
    • Rickrolling Your Neighbors with Google Chromecast - 16kbps - 128kbps
    • Screening: “Nowhere to Hide” (working title: “Rambam Gets His Man”) - 16kbps - 128kbps
    • SecureDrop: A WikiLeaks in Every Newsroom - 16kbps - 128kbps
    • Securing a Home Router - 16kbps - 128kbps
    • Shortwave Pirate Radio and Oddities of the Spectrum - 16kbps - 128kbps
    • Showing Keys in Public – What Could Possibly Go Wrong? - 16kbps - 128kbps
    • Skeuomorphic Steganography - 16kbps - 128kbps
    • Social Engineering - 16kbps - 128kbps
    • Solve the Hard Problem - 16kbps - 128kbps
    • Spy Improv: Ask Me Anything - 16kbps - 128kbps
    • SSL++: Tales of Transport-Layer Security at Twitter - 16kbps - 128kbps
    • Steepest Dissent: Small Scale Digital Fabrication - 16kbps - 128kbps
    • Stupid Whitehat Tricks - 16kbps - 128kbps
    • Surveillance, Sousveillance, and Anti-Surveillance: Artistic Responses to Watching - 16kbps - 128kbps
    • Teaching Electronic Privacy and Civil Liberties to Government - 16kbps - 128kbps
    • Technology and Jamming of XKEYSCORE - 16kbps - 128kbps
    • The Hidden World of Game Hacking - 16kbps - 128kbps
    • The Internet Society Speaks – The History, Futures, and Alternate Directions of the Internet and Its Governance - 16kbps - 128kbps
    • The Many Faces of LockSport - 16kbps - 128kbps
    • The Repair Movement - 16kbps - 128kbps
    • The Science of Surveillance - 16kbps - 128kbps
    • The Sex Geek as Culture Hacker - 16kbps - 128kbps
    • The Web Strikes Back – Fighting Mass Surveillance with Open Standards - 16kbps - 128kbps
    • This Is the X You Are Looking For - 16kbps - 128kbps
    • Threat Modeling and Security Test Planning - 16kbps - 128kbps
    • Thwarting the Peasants: A Guided and Rambunctious Tour Through the 2600 DeCSS Legal Files - 16kbps - 128kbps
    • Travel Hacking with The Telecom Informer - 16kbps - 128kbps
    • Unmasking a CIA Criminal - 16kbps - 128kbps
    • Updates from the Online Identity Battlefield - 16kbps - 128kbps
    • Usable Crypto: New Progress in Web Cryptography - 16kbps - 128kbps
    • Using Travel Routers to Hide in Safety - 16kbps - 128kbps
    • Vigilante Justice: Masks, Guns, and Networks - 16kbps - 128kbps
    • Visualization for Hackers: Why It’s Tricky, and Where to Start - 16kbps - 128kbps
    • When Confidentiality and Privacy Conflict - 16kbps - 128kbps
    • When Whistleblowers Are Branded as Spies: Edward Snowden, Surveillance, and Espionage - 16kbps - 128kbps
    • When You Are the Adversary - 16kbps - 128kbps
    • Why the Future is Open Wireless - 16kbps - 128kbps
    • Will It Blend? How Evil Software Clogs the Pipes - 16kbps - 128kbps
    • Wireless Meshnets: Building the Next Version of the Web - 16kbps - 128kbps
    • You’ve Lost Privacy, Now They’re Taking Anonymity (aka Whistleblowing is Dead – Get Over It) - 16kbps - 128kbps
    • Your Right to Whisper: LEAP Encryption Access Project - 16kbps - 128kbps