Channel Avatar

Christiaan008 @UCEPzS1rYsrkqzSLNp76nrcg@youtube.com

73.1K subscribers - no pronouns set

By creating one place to collect videos related to subjects


34:49
OHM2013: Modeling and Control of Rotary Winged Unmanned Aerial Vehicles
41:51
OHM2013: orvillecopter
01:00:23
OHM2013: Hard disks: More than just block devices
01:21:22
OHM2013: Wikileaks fights on
50:36
OHM 2013: Integrity in intelligence, were is it when we need it most?
17:57
OHM2013: opening ceremony
00:10
CIC News Engine time-lapse
01:33:24
ShmooCon 2014: Fire Talks (saturday)
01:54:25
ShmooCon 2014: Fire Talks (friday)
55:22
ShmooCon 2014: 0wn the Con
43:27
ShmooCon 2014: A Critical Review of Spatial Analysis
51:35
ShmooCon 2014: ADD -- Complicating Memory Forensics Through Memory Disarray
48:35
ShmooCon 2014: AV Evasion With the Veil Framework
37:57
ShmooCon 2014: An Open and Affordable USB Man in the Middle Device
35:53
ShmooCon 2014: Arms Race: The Story of (In)-Secure Bootloaders
19:36
ShmooCon 2014: Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares
27:52
ShmooCon 2014: CCTV: Setup, Attack Vectors, and Laws
51:10
ShmooCon 2014: Closing Plenary - Large Scale Network and Application Scanning
01:24:55
ShmooCon 2014: Closing Remarks
38:50
ShmooCon 2014: Controlling USB Flash Drive Controllers: Expose of Hidden Features
48:25
ShmooCon 2014: Data Whales and Troll Tears: Beat the Odds in InfoSec
28:51
ShmooCon 2014: Dissipation of Hackers in the Enterprise
42:56
ShmooCon 2014: Genuinely "Trusted Computing:" Free and Open Hardware Security Modules
22:25
ShmooCon 2014: How Hackers for Charity (Possibly) Saved Me a Lot of Money
40:38
ShmooCon 2014: History of Bletchley Park and How They Invented Cryptography and the Computer Age
38:49
ShmooCon 2014: How to Train your Snapdragon: Exploring Power Frameworks on Android
43:42
ShmooCon 2014: ISP's Unauthenticated SOAP Service = Find (Almost) All The Things!
35:45
ShmooCon 2014: Introducing DARPA's Cyber Grand Challenge
47:09
ShmooCon 2014: Introducing idb - Simplified Blackbox iOS App Pentesting
47:10
ShmooCon 2014: Keynote - Privacy Online: What Now?
48:58
ShmooCon 2014: LTE vs. Darwin
38:35
ShmooCon 2014: Malicious Online Activities Related to the 2012 U.S. General Election
38:21
ShmooCon 2014: Malicious Threats, Vulnerabilities in Mobile Instant Messaging Platforms
52:37
ShmooCon 2014: The NSA: Capabilities and Countermeasures
59:44
ShmooCon 2014: Opening Remarks, Rumblings, and Rants
53:20
ShmooCon 2014: Operationalizing Threat Information Sharing: Beyond Policies and Platitudes
58:04
ShmooCon 2014: Practical Applications of Data Science in Detection
50:05
ShmooCon 2014: Raising Costs for Your Attackers Instead of Your CFO
01:02:25
ShmooCon 2014: SafeCurves: Choosing Safe Curves for Elliptic-Curve Cryptography
41:24
ShmooCon 2014: The "Science of Cyber" and the Next Generation of Security Tools
23:24
ShmooCon 2014: Security Analytics: Less Hype, More Data
43:37
ShmooCon 2014: Syncing Mentorship Between Winners And Beginners
01:02:48
ShmooCon 2014: Timing-Based Attestation: Sexy Defense, or the Sexiest?
45:44
ShmooCon 2014: Unambiguous Encapsulation - Separating Data and Signaling
49:52
ShmooCon 2014: Technology Law Issues for Security Professionals
42:55
ShmooCon 2014: Vehicle Forensics - The Data Beyond the Dashboard
01:01:33
ShmooCon 2014: You Don't Have the Evidence
03:06
SSH Honey attack 3
47:40
DeepSec 2013: Effective IDS Testing -- The OSNIF's Top 5
47:05
DeepSec 2013: Cracking And Analyzing Apple iCloud Protocols
49:17
DeepSec 2013: Uncovering your Trails -- Privacy Issues of Bluetooth Devices
47:34
DeepSec 2013: Trusted Friend Attack: Guardian Angels Strike
46:31
DeepSec 2013: Top 10 Security Mistakes In Software
44:05
DeepSec 2013: The Boomerang Effect -- Using Session Puzzling To Attack Apps From The Backend
46:50
DeepSec 2013: Relax Everybody: HTML5 Is Securer Than You Think
46:09
DeepSec 2013: Psychology of Security: a Research Programme
47:50
DeepSec 2013: Mobile Fail: Cracking Open "Secure" Android Containers
40:58
DeepSec 2013: Malware Datamining And Attribution
38:08
DeepSec 2013: Keynote - Cultural Learning Of China To Make Benefit Glorious Profession Of Infosec
54:51
DeepSec 2013: Finux's Historical Tour Of IDS Evasion, Insertions, and Other Oddities