A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


DOJOCON 2010 Videos

DOJOCON 2010 Videos

    First, thanks to Marcus Carey for inviting me out to DOJOCON. Be sure to check out the organizers http://www.dojocon.org/ and http://www.reversespace.com/ and donate to the cause if you like the event. Below are the videos from the conference, at least the ones I can show :), enjoy.

Index:

Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping
John Strauchs, @strauchs: Security and IT Convergence
Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in Information Security Work
Jon McCoy: Ninja Patching .NET
Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending Your Network using Nepenthes/Shaolin Tools
Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn Your Victims
Brian Baskin, @bbaskin: P2P Forensics
Jonathan Abolins, @jabolins: Internationalized Domain Names & Investigations in the Networked World
Deviant Ollam, @deviantollam: Don't Punch My Junk
Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes
Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap
Ben Smith: Printer Exploitation
Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?
Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS Dead?
Chris Nickerson, @indi303: The State of (In)Security
Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk Professions
Michael Smith, @rybolov: DDoS

I think this is the fourth conference I've done videos like this for. I wonder if I should start offering a service where I help record/render videos for free if the conference can take care of travel and lodging for me? That would let me get to more hacker cons. :)


Tiffany Strauchs Rad, @tiffanyrad
International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo1.avi

 

 


John Strauchs, @strauchs
Security and IT Convergence

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo2.avi

 

 


Richard Goldberg, @GoldbergLawDC
Rules of Engagment: Mitigating Risk in Information Security Work

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo4.avi

 

 



Jon McCoy
Ninja Patching .NET

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo5.avi

 

 

 


Marco Figueroa, @marcofigueroa & Kevin Figueroa
Detecting & Defending You Network using Nepenthes/Shaolin Tools

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo6.avi

 

 



Dave Marcus, @davemarcus
Using Social Networks To Profile, Find and 0wn Your Victims

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo7.avi

 

 

 

Brian Baskin, @bbaskin
P2P Forensics

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo8.avi

 

 


Jonathan Abolins, @jabolins
When Domain Names Look Like Spaghetti (or Whatever)
Internationalized Domain Names & Investigations in the Networked World

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo9.avi

 

 


Deviant Ollam, @deviantollam
Don't Punch My Junk

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo10.avi

 

 


Michael Shearer, @theprez98
How to 0wn an ISP in 10 Minutes

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo11.avi

 

 



Christopher Witter, @mr_cwitter
Enterprise Packet Capture on Da'Cheap

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo12.avi

 

 


Ben Smith
Printer Exploitation

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo13.avi

 

 



Adrian Crenshaw, @irongeek_adc
Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo14.avi

 

 


Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007
Is the IDS Dead?

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo15.avi

 

 

 

Chris Nickerson, @indi303
The State of (In)Security

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo16.avi

 

 

Gal Shpantzer, @shpantzer
Security Outliers: Cultural Cues from High-Risk Professions

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo17.avi

 

 



Michael Smith, @rybolov
DDoS

Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo18.avi

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast