2013
- Endpoint security via application sandboxing and virtualization — past, present, future
- State of Crypto Affairs
- Practical exploitation of rounding vulnerabilities in internet banking applications
- The Machines that Betrayed their Masters
- Virtually Impossible: The Reality Of Virtualization Security
- DbiFuzz framework
- Windows Kernel Trap Handler and NTVDM Vulnerabilities — Case Study
- IP fragmentation attack on DNS
- HART (in)security
- Exploitation of AVR & MSP microchips
- Filesystem timing attacks practice
- Strike to the infrastructure: a story about analyzing thousands mobile apps
- SCADA deep inside: protocols, security mechanisms, software architecture
- Anatomy and metrology of DoS/DDoS
- TOPGUN multi terabit DPI
- Timing analysis
- An introduction to the use SMT solvers for software security
- BlackBox analysis of iOS apps
- Hacking HTML5
- Physical (In)Security — it’s not –ALL– about Cyber
- Advanced exploitation of Android Master Key Vulnerability (bug 8219321)
- HexRaysCodeXplorer: make object-oriented RE easier
- Practical application of math methods and image recognition in attack detection. With novel case studies :)
- Web under pressure: DDoS as a service
- Hosting dashboard web application logic vulnerabilities
- Session management errors in cloud solutions and in classic hosting systems
- Hesperbot: analysis of a new banking trojan
- NGINX Warhead
- Testing of password policy
- Accounting hacking — arch bugs in MS Dynamics GP
- HR Hacking — bugs in PeopleSoft
- DBO Hacking — arch bugs in BSS
- Business Intelligence hacking – Breaking ICCube
- Dev system hacking — arch bugs in SAP SDM
- Amateur Satellite Intelligence: Watching North Korea
- Payment Applications Handle Lots of Money. No, Really: Lots Of It.
- Visualization For Reverse Engineering and Forensics
- Electronic Voting Security, Privacy and Verifiability
- Cracking and Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage
- Buried by time, dust and BeEF
- Under the Hood Of Your Password Generator
- Malware, Sandboxing and You: How Enterprise Malware and 0day Detection is About To Fail (Again)
- VoIP Wars: Return of the SIP
- BIOS Chronomancy: Fixing the Static Root of Trust for Measurement
- The BYOD PEAP Show: Mobile Devices Bare Auth
- Bypassing Content-Security-Policy
- Deus Ex Concolica - Explorations in end-to-end automated binary exploitation
- Top of the Pops: How to top the charts with zero melodic talent and a few friendly computers
- AntiTraintDroid - Escaping Taint Analysis on Android for Fun and Profit
- Introspy : Security Profiling for Blackbox iOS and Android
- Inside Story Of Internet Banking: Reversing The Secrets Of Banking Malware
- Edward Snowden: It's Complicated
- Roll the Dice and Take Your Chances
- Cracking, CUDA and the Cloud – Cracking Passwords Has Never Been So Simple, Fast and Cheap
- Integrated Trace_ Using Virtio-Trace for a Virtualization Environment - Yoshihiro Yunomae, Hitachi
- Collab. GPL Compliance Through Non-Profit Entities - Bradley M. Kuhn, Software Freedom Conservancy
- Raspberry Pi: Getting Started and Creative Applications - Ruth Suehle, Red Hat
- Storage: Pulling Together Management Across the Cloud and Bare Metal - Ric Wheeler, Red Hat
- Stop Touching My Kernel Code! - Sasha Levin, Oracle
- Tux3 Progress Report: Towards a New General Purpose Filesystem for Linux - Daniel Phillips, Samsung
- Efficient Memory Management on Mobile Devices - Bartlomiej Zolnierkiewicz, Samsung
- Namespaces for Security - Jake Edge, LWN.net
- Successful Development Begins with the Heart of the Device - Leon Farasati, Qualcomm
- Intel MIC Coprocessor Driver, on the Frontiers of Linux & HPC - Nikhil Rao, Intel OTC
- Power Capping Linux - Srinivas Pandruvada, Intel
- Kernel CI Using Linaro's Automated Validation Architecture - Tyler Baker, Linaro
- Enabling Mobile Payments on Linux - Samuel Ortiz, Intel
- Improving Guest Management via the QEMU Guest Agent - Michael Roth, IBM
- UEFI and Linux - Kirk Bresniker, HP
- Why btrfs is the Bread and Butter of Filesystems - Matthias Eckermann, SUSE
- Integrated Trace' Using Virtio-Trace for a Virtualization Environment - Yoshihiro Yunomae, Hitachi
- CRIU: Time and Space Travel Service for Linux Applications - Pavel Emelyanov, Parallels
- Better Utilization of Storage Features From KVM Guests Via Virtio-Scsi - Masaki Kimura, Hitachi
- Xen Orchestra (XAPI and XenServer from the web) - Olivier Lambert, Vates
- Free yourself from the tyranny of your cloud provider! - Greg Kroah-Hartman, The Linux Foundation
- Bringing Xen dom0 to CentOS-6 - Karanbir Singh, CentOS Project
- ARM Servers and Xen -- Hypervisor Support at Hyperscale - Larry Wikelius, Calxeda
- Xen, XenServer, and XAPI: What's the Difference? - James Bulpin and Russell Pavlicek, Citrix Systems
- TripleO: OpenStack on OpenStack - Monty Taylor, HP
- Will Parallel Programming Ever Become Routine? - Paul E. McKenney, IBM
- OpenStack/Quantum SDN-Based Network Virtualization with Ryu - Kei Ohmura, NTT
- Modern Linux Servers with cgroups - Brandon Philips, CoreOS
- OpenStack and jclouds in the Evolving App Landscape - Rags Srinivas, Rackspace
- Building Web Scale Using Open Source on the Internet Assembly Line - Thomas Hatch, SaltStack
- Compositing for Free—Reducing Copies on the Desktop - Keith Packard, Intel
- QEMU 2.x and Beyond: The Foundation of the Open Cloud - Anthony Liguori
- Culture, Code, Community and Conway: Lessons from OpenStack - Joshua McKenty, Piston Cloud
- Building IaaS wit Apache CloudStack - David Nalley, Apache
- Bluetooth Smart Devices and Low Energy Support on Linux - João Paulo Rechi Vita, INdT
- Linux Transparent Memory Compression - Seth Jennings, IBM
- OpenStack Performance & Scale - Mark Wagner, Red Hat
- DistCI, Continuous Integration at Scale - Heikki Nousiainen, F-Secure
- LLVMLinux: The Linux Kernel with Dragon Wings - Behan Webster, Converse in Code Inc.
- Transforming XenServer Into a Proper Open-Source Project - James Bulpin, Citrix
- Converged Infrastrucure with Open Source - Theron Conrey, Red Hat
- Automating Cloud Testing and Deployment with Deploy - Kay Williams, Deploy Project
- Xen: This Is Not Your Dad's Hypervisor! - Demetrious Coulis, Sr Prin. Product Mgr, CA Technologies
- Xen for Beginners - Bryan Smith, Tacit Labs, Inc.
- Network Multi-tenancy in Xen-based Clouds - Chiradeep Vittal, Citrix Systems
- Building the Rackspace Open Cloud with XenServer and OpenStack -Paul Voccio, Rackspace
- Ceph, Xen, and CloudStack: Semper Melior - Patrick McGarry
- Welcome and Introduction - Xen Project User Summit
- Xen User Summit - Navis Lighthouse Security Audit Appliance - Grant McWilliams, Coalfire Systems
- LinuxCon and CloudOpen 2013: Developers, The New Superpower - Jonathan Bryce, OpenStack
- LinuxCon & CloudOpen North America 2013 - New Frontiers - Dirk Hohndel, Intel
- LinuxCon & CloudOpen North America 2013 - Linux Kernel Panel
- Test Your Linux Trivia Knowledge, Live from LinuxCon and CloudOpen in New Orleans
- LinuxCon & CloudOpen North America - Before I Die - Candy Chang
- LinuxCon & CloudOpen North America 2013 - Linux & Gaming - Gabe Newell, Valve
- LinuxCon & CloudOpen North America 2013 - The Technium - Kevin Kelly
- Linux, Cloud, and Next Generation Workloads - Brad McCredie, IBM
- LinuxCon & CloudOpen North America 2013 - Open Matters: HP & OpenStack - Brian Aker, HP
- What Five Years of Android Has Meant - Chris DiBona, Google
- LinuxCon & CloudOpen North America 2013 - Shiny New Toys - Eben Upton, Raspberry Pi
- LinuxCon & CloudOpen North America 2013 - State of Linux - Jim Zemlin, The Linux Foundation
- Devops Panel (part 2)
- Lightning Talks Session #1
- David Mortman's Keynote
- David Perez, Jose Pico - Geolocation of GSM mobile devices
- Russ Gideon - Paint by Numbers vs. Monet
- Robert Graham - Data-plane networking
- Dan Guido's Keynote
- Stephan Chenette - Building Custom Android Malware for Penetration Testing
- Jake Valletta - CobraDroid
- TB. Henriques, T. Martins, J. Gouveia - Realtime analysis and visualization of ...
- Devops Panel
- Aloria - .NET: The Framework, the Myth, the Legend
- Erin Jacobs, Zack Fasel - Taking the BDSM out of PCI-DSS through open-source solutions
- Amelia Andersdotter's keynote
- Vaagn Toukharian - HTTP Time Bandit
- Automatisierte Videoüberwachung
- Parabolic Plane Flights – Research..
- Cryptocat: The Social and Technical ..
- Ruby is Magic!
- Car immobilizer hacking
- UI Redressing Attacks on Android Dev..
- Programming FPGAs with PSHDL
- Internet-Meme: Geschichte und Forsch..
- Why we fight (each other)
- The step into Cyborgism
- SDR, GSM/OpenBTS
- Der Kampf um die Netzneutralität
- E-Mobility as a Privacy Game Changer..
- Pressfreedom, Surveillance and Inte..
- Independents unite! Inside the freel..
- hpfriends: real-time social data-sha..
- DocPatch: Entdecke unsere Verfassung..
- Transparenzgesetz - Quo Vadis?
- Gute Arbeit
- C.R.O.P. – Combined Regenerative O..
- Besser leben für Geeks
- Nearly Everything That Matters is a ..
- Adblocker an, Schranke runter, Paywa..
- „Information wants to be free" ver..
- Offshoreleaks - the how and why of a..
- Funkzellenabfrage
- Let's tear down these walls
- The Politics of Surveillance: Unders..
- Home Network Horror Stories
- EU Data Protection Reform
- The DRM Of Pacman
- Making music with a C compiler
- VM32: A CPU simulator for demonstrat..
- I/O Capture Treiber Framework
- Game of Drones I + II
- Cuckoo Sandbox - malware beware
- Benutze Krake mit Gerät
- It's my party and I crypt if I want ..
- Embedded device security nightmares..
- Analog Computing
- Remoting android applications for fun and profit
- Windows Phone 8 application security
- I'm in your browser, pwning your stuff - Attacking Google Chrome extensions
- Origin policy enforcement in modern browsers
- Web Applications Forensics
- DBI Frameworks applied to computer security : Uses and comparative
- The Realex payments application security story, narrated by Security Ninja
- The Control of technology by nation state : Past, Present and Future - The Case of Cryptology and information security
- Burp Pro : Real-life tips and tricks
- Malware vs Virtualization : The endless cat and mouse play
- Next generation rootkits for ARM based devices
- The inner HTML Apocalypse : How MXSS attacks change everything we believed to know so far
- CLOSING KEYNOTE - Winn Schwartau - The History of the Future of InfoSec.pdf
- D1 KEYNOTE - Edward Schwartz - Embracing the Uncertainty of Advanced Attacks with Big Data Analytics.pdf
- D1LAB - Didier Stevens - Windows x64 Essentials.pdf
- D1LAB - Itzik Kotler - Hack Like It's 2013.pdf
- D1LAB - Vladimir Kropotov and Sergey Soldatov - Defending the Enterprise the Russian Way.pdf
- D1T1 - Hugo Teso - Aircraft Hacking - Practical Aero Series.pdf
- D1T1 - Peleus Uhley and Karthik Raman - Security Response in the Age of Mass Customized Attacks.pdf
- D1T1 - Petko D Petkov - Defeating the Intercepting Web Proxy %e2%80%93 A Glimpse Into the Next Generation of Web Security Tools.pdf
- D1T1 - Sergey Bratus and Julian Bangert - Better Security Through Creative x86 Trapping.pdf
- D1T1 - Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.pdf
- D1T1 - Vladimir Vorontsov and Alexander Golovko - SSRF PWNs - New Techniques and Stories.pdf
- D1T2 - Daniel Mende - Paparazzi Over IP.pdf
- D1T2 - Nicolas Seriot - Abusing Twitters API and OAuth Implementation.pdf
- D1T2 - Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel.zip
- D1T2 - Philippe Langlois - Hacking HLR HSS and MME Core Network Elements.pdf
- D1T2 - Tal Zeltzer - Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance.pdf
- D1T2 - Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.pdf
- D2 KEYNOTE - Bob Lord - Rethinking the Front Lines.pdf
- D2T1 - Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.pdf
- D2T1 - Peter Geissler and Steven Ketelaar - How I Met Your Modem.pdf
- D2T1 - Pod2g, Planetbeing, Musclenerd and Pimskeks aka Evad3rs - Swiping Through Modern Security Features.pdf
- D2T1 - Sebastien Kaczmarek - Dreamboot UEFI Bootkit.pdf
- D2T1 - Sergey Shekyan and Artem Harutyunyan - Turning Your Surveillance Camera Against You.pdf
- D2T2 - A Petukhov G Noseevich and D Gamayunov - Breaking Through Certified Crypto in Banking Apps.pdf
- D2T2 - Chilik Tamir - iAnalyzer - No More Blackbox iOS Analysis.pdf
- D2T2 - Dan Tentler - The Shodan Computer Search Engine.pdf
- D2T2 - Ofer Shezaf - The Infosec Risks of Charging Electric Cars.pdf
- D2T2 - Rosario Valotta - Abusing Browser User Interfaces for Fun and Profit.pdf
- Juan A. Calles y Pablo González - Metasploit & Flu-AD: Avoiding AVs with Payloads/DLLs Injection
- Roberto Baratta - eFraude: ganar gestionando la derrota
- Vicente Díaz - Birds, bots and machines - Fraud in Twitter and how to detect it using MLT
- Albert López - Linux Heap Exploiting Revisited
- Joxean Koret - Interactive Static Analysis Tools for Vulnerability Discovery
- Jesús Olmos - ChromeHack, a html5/chrome webhack tool
- David Meléndez Cano - Trash Robotic Router Platform (TRRP)
- Antonio Ramos - ¿Y si la seguridad afectara al valor contable de la empresa?
- David Barroso - Un gentil viaje al interior de las extorsiones mediante DDoS
- José Luis Verdeguer - FreePBX for fun & profit
- Sebastián Guerrero - Ke ase Android?
- David Fuertes - Señales Débiles. ¿Nos protegemos sabiendo que nos van a atacar?
- José M. Esparza y Mikel Gastesi - Sopelka VS Eurograbber: really 36 million EUR?
- José Pico y David Pérez - Sistema de localización geográfica de un terminal móvil
- Andrés Tarasco y Miguel Tarasco - OWISAM - Open WIreless Security Assessment Methodology
- Jaime Sánchez - From kernel space to user heaven
- Chema Alonso - Hachetetepe dospuntos slaac slaac
- Alejandro Ramos - Te pique lo que te pique, analiza un SQLite
- Raúl Siles - Wi-Fi: Why iOS (Android and others) Fail inexplicably?
- Keynote
- iOS6.1 - Exploitation 280 Days Later
- Evil Maid Just Got Angrier: Why Full-Disk Encryption With TPM is Insecure on Many Systems
- Sandbox Escapes: When the Broker is Broken
- Reflecting on Reflection - Exploiting Reflection Vulnerabilities in Managed Languages
- An Android Hacker's Journey: Challenges in Android Security Research
- DEP/ASLR bypass without ROP/JIT
- SMS to Meterpreter - Fuzzing USB Modems
- Cracking and Analyzing Apple iCloud backups, Find My iPhone, Document Storage.
- Desktop Insecurity
- Shining Some Light on the Evolution of BlackHole
- Project 53
- Smart TV Security
- Godel's Gourd - Fuzzing for Logic Issues
- MS SQL Post Exploitation Shenanigans: You're In, Now What?
- Analysis of a Windows Kernel Vulnerability; From Espionage to Criminal Use
- UPnP Vulnerabilities
- A Perfect CRIME? Only TIME Will Tell White Paper Presentation
- Advanced Heap Manipulation in Windows 8 Presentation
- Building a Defensive Framework for Medical Device Security
- The Deputies Are Still Confused White Paper Presentation
- DropSmack: How Cloud Synchronization Services Render Your Corporate Firewall Worthless White Paper Presentation File File
- Floating Car Data from Smartphones: What Google and Waze Know About You and How Hackers Can Control Traffic White Paper Presentation
- Hacking Appliances: Ironic exploitation of security products White Paper Presentation
- Hacking Video Conferencing Systems White Paper Presentation
- Hardening Windows 8 apps for the Windows Store White Paper
- Harnessing GP²Us - Building Better Browser Based Botnets Presentation
- Honeypot That Can Bite: Reverse Penetration White Paper Presentation
- Hybrid Defense: How to Protect Yourself From Polymorphic 0-days White Paper Presentation File
- Invisibility Purge – Unmasking the Dormant Events of Invisible Web Controls – Advanced Hacking Methods for Asp.Net, Mono and RIA Presentation File File File File
- Let's Play - Applanting White Paper Presentation
- Mesh Stalkings-Penetration Testing with Small Networked Devices White Paper Presentation
- Multiplayer Online Games Insecurity White Paper Presentation
- Off Grid communications with Android - Meshing the mobile world White Paper Presentation
- Practical Attacks Against MDM Solutions White Paper Presentation
- Power Analysis Attacks for Cheapskates White Paper Presentation File
- Practical Exploitation Using A Malicious Service Set Identifier (SSID) White Paper Presentation
- The Sandbox Roulette - Are You Ready For The Gamble? Presentation
- XML Out-of-Band Data Retrieval White Paper Presentation
- Who's Really Attacking Your ICS Devices? White Paper Presentation
- Advanced iOS Application Pentesting Presentation
- Application Development Secure Coding Workshop Presentation
- Assessing BYOD with the Smartphone Pentest Framework White Paper Presentation
- PowerShell for Penetration Testers Presentation
- Vehicle Networks Workshop Presentation
- “Thin Slicing a Black Swan: A Search for the Unknowns” by Michele “@mrsyiswhy” Chubirka & Ronald Reck
- “When Did the Smartphone Pentest Framework Get Awesome?” by by Georgia “@georgiaweidman” Weidman
- “ShellSquid: Distributed Shells With Node” by Tom Steele
- “If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone” by Nicolle “@rogueclown” Neulist
- “Becoming a Time Lord – Implications of Attacking Time Sources” Joe “@joeklein” Klein
- “Swinging Security Style: An Immodest Proposal” by Wendy “@451wendy” Nather
- “Drones: Augmenting your cyber attack tool bag with aerial weapon systems” by Zac “@ph3n0” Hinkel
- “Managed Service Providers: Pwn One and Done” Damian “@integrisec” Profancik
- “No Tools? No Problem! Building a PowerShell Botnet” Christopher “@obscuresec” Campbell
- “Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling” John “@pinfosec” Willis
- “Protecting Big Data From Cyber APT in the Cloud” Bill “@oncee” Gardner
- “Writing a Thumbdrive for Active Disk Antiforensics” Travis “@travisgoodspeed” Goodspeed
- 3D_Printing_with_Repsnapper.mp4
- 15MW_and_3600_penguins_in_a_room_Supercomputing_at_ANU.mp4
- A_New_Linux_Platform_Hardware_and_Software.mp4
- After_Arduino.mp4
- Aint_No_Party_Like_A_Unix_Party.mp4
- An_Introduction_to_Linux_IPC_Facilities.mp4
- ArduSat_Open_Source_in_orbit.mp4
- Arduino_Miniconf_Afternoon.mp4
- Arduino_Miniconf_Morning.mp4
- Beyond_Alt_Text_What_Every_Project_Should_Know_About_Accessibility.mp4
- Big_and_Little_Endian_inside_out.mp4
- Bufferbloat_from_a_Plumbers_point_of_view.mp4
- Building_Persona_federated_and_privacysensitive_identity_for_the_Web.mp4
- Building_a_free_software_telemetry_radio_system.mp4
- CWDM_Coarse_Wave_Division_Multiplexing.mp4
- Ceph_Managing_A_Distributed_Storage_System_At_Scale.mp4
- Ceph_object_storage_block_storage_file_system_replication_massive_scalability_and_then_some.mp4
- Checkpoint_and_Restore_are_we_there_yet.mp4
- Code_up_your_own_video_conference_in_HTML5.mp4
- Communicating_with_third_parties.mp4
- Concurrent_Programming_with_the_Disruptor.mp4
- Conference_Closing.mp4
- Conference_Closing_Lightning_Talks.mp4
- Configuration_Management_with_Ansible.mp4
- Copyrights_Dark_Clouds_Optus_v_NRL.mp4
- Delivering_IaaS_with_Apache_CloudStack.mp4
- Designing_a_Verifiable_and_Accessible_Electronic_Voting_System.mp4
- Droids_that_talk_Pairing_Codec2_and_Android.mp4
- Free_and_open_source_software_and_activism.mp4
- Future_directions_for_the_X_Window_System.mp4
- Geeks_rule_over_kings_the_Distributed_Democracy.mp4
- Getting_older_Tips_tricks_for_designing_inclusive_open_source_user_interfaces.mp4
- Git_For_Ages_4_And_Up.mp4
- Git_not_just_for_source_code_anymore.mp4
- Graphics_from_Gamepads_Guitars_and_Gadgets_Galore.mp4
- Heat_Orchestrating_multiple_cloud_applications_on_OpenStack_using_templates.mp4
- How_Mozilla_draws_the_line_between_configuration_and_data_while_using_configuration_management_tools.mp4
- How_OSS_technology_to_help_UTSIT_to_build_a_virtualized_networking_lab.mp4
- How_to_Fix_a_Font.mp4
- How_to_make_almost_anything_go_faster.mp4
- How_to_use_Puppet_like_an_Adult.mp4
- Keynote_Andrew_Bunnie_Huang.mp4
- Keynote_Radia_Perlman.mp4
- LTTng_20_Advanced_Linux_tracing_for_everyone.mp4
- Lighting_up_OpenCV_with_Ne10_and_NEON.mp4
- Linux_Gaming_at_Last_Tuning_Open_Source_Graphics_Drivers_for_Valve_Software.mp4
- Linux_in_Defence.mp4
- Main_conference_opening.mp4
- Make_your_software_understand_your_nonUS_accent.mp4
- Making_Mobile_Communications_Secure.mp4
- Making_RCU_Respect_Your_Devices_Battery_Lifetime.mp4
- Making_UEFI_Secure_boot_work_for_you.mp4
- Maximum_Clojure_Performance.mp4
- Measuring_and_Improving_OpenGL_Performance.mp4
- MySQL_Security.mp4
- MySQL_in_the_cloud_as_a_service.mp4
- NetFPGA_USB_2_interface.mp4
- NovaProva_or_How_I_Did_Six_Impossible_Things_Before_LCA.mp4
- OWASP_Developer_Guide_2013_what_it_means_for_open_source_projects.mp4
- OpenStack_Zuul.mp4
- Open_Source_Digital_Radio.mp4
- Open_Source_Firmware.mp4
- Open_Source_and_Open_Data_for_Humanitarian_Response_with_OpenStreetMap.mp4
- Openstack_on_Openstack_a_single_management_API_for_all_your_servers.mp4
- Operating_in_an_Ephemeral_World.mp4
- Ops_from_bare_metal_to_cloud_space.mp4
- OzLabs.org_Administering_a_system_for_smart_people.mp4
- Panel_Where_in_the_stack_does_security_belong.mp4
- Playing_with_OpenStack_Swift.mp4
- Ponies_and_Rainbows_Clutter_20_and_GTK_40.mp4
- PostgreSQL_92_Full_Throttle_Database.mp4
- Pre_dinner_thingy_robert_llewellyn_and_simon_hackett.mp4
- Quantitative_community_management.mp4
- Qubes_OS.mp4
- Quiltwork_patch_deployment_in_nz_and_au.mp4
- RAID_is_more_than_parity_and_mirrors.mp4
- REPENT_FOR_THE_END_OF_THE_UNIX_EPOCH_IS_NIGH.mp4
- RealTime_Response_on_Multicore_Systems_It_Is_Bigger_Than_I_Thought.mp4
- Rethinking_CPU_hotplug_for_elegance_and_efficiency.mp4
- Ript_a_terse_but_expressive_DSL_for_iptables.mp4
- Ristretto_runtime_types_for_JavaScript.mp4
- Samba_4.0.mp4
- Scratching_your_own_itch_subsurface_diving_log.mp4
- Security_Miniconf_Afternoon.mp4
- Security_Miniconf_Morning.mp4
- Security_Models_Running_Amok.mp4
- Shell_for_Starters.mp4
- Software_Transactional_Memory_in_GCC_47.mp4
- Stereographic_film_making_and_Linux.mp4
- Systems_Administration_Server_and_Process_Behavior.mp4
- Syzix_heading_off_the_beaten_PATH.mp4
- Teaching_Robotics_and_Embedded_Computing_with_Legos_and_Arduino.mp4
- Teaching_the_X_server_new_tricks.mp4
- The_Finer_Art_of_Being_a_Senior_Sysadmin.mp4
- The_IPocalypse_20_months_later.mp4
- The_Perl_Renaissance.mp4
- The_Raspberry_Pi_and_Linux.mp4
- The_anatomy_of_a_high_speed_data_acquisition_system.mp4
- The_future_of_nonvolatile_memory.mp4
- The_real_story_behind_Wayland_and_X.mp4
- Theres_a_Party_In_Your_Box_And_Everyones_Invited.mp4
- Think_Create_Critique_Design.mp4
- Touch_and_Go_Modern_User_Interfaces_with_Open_Source.mp4
- Tracking_Vulnerable_JARs.mp4
- Transcendent_Memory_Not_Just_for_Virtualization_Anymore.mp4
- Trinity_A_Linux_kernel_fuzz_tester_and_then_some.mp4
- Trusted_Computing_and_Hadoop_HDFS.mp4
- Two_years_of_LibreOffice.mp4
- Two_years_with_Sambas_autobuild.mp4
- UEFI_the_Converged_Firmware_Infrastructure.mp4
- Using_Puppet_to_Model_Application_clusters.mp4
- Using_open_source_in_over_1100_schools_in_New_Zealand.mp4
- Vampire_Mice_How_USB_PM_impacts_you.mp4
- Why_kernel_space_sucks.mp4
- Wiggle_while_you_work.mp4
- Zombie_pancakes_rebooting_Flapjack.mp4
- Zuul.mp4
- aeolus.mp4
- asynchronous-block-storage-replication-mars-light.mp4
- gitannex.mp4
- grand-distributed-storage-debate-glusterfs-and-ceph-going-head-head.mp4
- jorn-and-rise-and-fall-clustering.mp4
- mariadb-galera-cluster.mp4
- mongodb-replication-replica-sets.mp4
- openstack-swift-overview.mp4
- ovirt.mp4
- redgrep_from_regular_expression_derivatives_to_LLVM.mp4
- tuesday_keynote_mikal_introduction.mp4
- users_delighted_better_UX_using_CSS_3_in_particular_and_HTML5_in_general.mp4
- vms-vlans-bridges-bonds-many-nics.mp4
Material de la Zero Nights 2013
Disponible el material de las presentaciones dadas en la conferencia rusa Zero Nights 2013:
Presentaciones de Ruxcon 2013
Ya tenemos disponibles las presentaciones (diapositivas) de Ruxcon 2103, conferencia sobre seguridad informática celebrada anualmente en Melbourne, Australia.
Vídeos de la LinuxCon North America 2013
Desde el canal de Youtube de la Linux Foundation, ya podemos ver todos los vídeos de las charlas de la LinuxCon 2013 celebrada en Nueva Orleans el pasado mes de septiembre. Aquí tenéis la lista:
Vídeos de la BruCON 0x05 (2013)
Otra serie de vídeos sobre seguridad informática. Estos son de la edición 2013 de BruCON 0x05.
Vídeos de la Sigint13
Sigint es una conferencia de 3 días celebrada anualmente dónde se tratan aspectos técnicos y sociales de la actual era digital, organizada por el Chaos Computer Club.
Este año se celebró entre los días 5 y 7 de julio. Aquí tenéis la lista de los vídeos de dicha conferencia:
Presentaciones de la Hack in Paris 2013
Se han publicado la mayoría de las presentaciones dadas en la Hack in Paris 2013 celebrada del 17 al 21 de junio. La lista es la siguiente:
Presentaciones de la HITBSECCONF 2013 - Amsterdam
Ya tenemos entretenimiento para el fin de semana con las presentaciones de la conferencia sobre seguridad informática de la Hack In The Box 2013 celebrada en Amsterdam.
Presentaciones de la Rooted CON 2013
Ya tenemos disponibles las presentaciones de la Rooted CON 2013, uno de los congresos sobre seguridad informática de referencia de la scene española.
Aquí tenéis el listado de las presentaciones:
Presentaciones de CanSecWest Vancouver 2013
Pues como dice el título, ya están disponibles para descarga las presentaciones (diapositivas) de CanSecWest Vancouver 2013:
Presentaciones de Black Hat Europe 2013
Ya tenemos disponible para descarga las presentaciones de la Black Hat 2013 Europe:
Vídeos de las Firetalks de ShmooCon 2013
Más vídeos de los que nos gustan. Estos son concretamente las Firetalks de la edición de este año de ShmooCon:
Vídeos de la linux.conf.au 2013
Del 28 de enero al 2 de febrero tuvo lugar la edición 2013 de la ya conocida conferencia sobre linux australiana, en la ciudad de Canberra. La lista de los vídeos disponibles hasta el momento es la siguiente:
¡Feliz 2013!
Se nos presenta un año duro pero lleno de nuevos proyectos y desafíos.
Desde CyberHades queremos dar las gracias a todos los amigos y amigas que nos siguen y desearos un:
Feliz 2013
