DOJOCON 2010 Videos
First, thanks to Marcus Carey for inviting me out to DOJOCON. Be sure to check out the organizers http://www.dojocon.org/ and http://www.reversespace.com/ and donate to the cause if you like the event. Below are the videos from the conference, at least the ones I can show :), enjoy.
Index:
Tiffany Strauchs Rad, @tiffanyrad: International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping
John Strauchs, @strauchs: Security and IT Convergence
Richard Goldberg, @GoldbergLawDC: Rules of Engagment: Mitigating Risk in Information Security Work
Jon McCoy: Ninja Patching .NET
Marco Figueroa, @marcofigueroa & Kevin Figueroa: Detecting & Defending Your Network using Nepenthes/Shaolin Tools
Dave Marcus, @davemarcus: Using Social Networks To Profile, Find and 0wn Your Victims
Brian Baskin, @bbaskin: P2P Forensics
Jonathan Abolins, @jabolins: Internationalized Domain Names & Investigations in the Networked World
Deviant Ollam, @deviantollam: Don't Punch My Junk
Michael Shearer, @theprez98: How to 0wn an ISP in 10 Minutes
Christopher Witter, @mr_cwitter: Enterprise Packet Capture on Da'Cheap
Ben Smith: Printer Exploitation
Adrian Crenshaw, @irongeek_adc: Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?
Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007: Is the IDS Dead?
Chris Nickerson, @indi303: The State of (In)Security
Gal Shpantzer, @shpantzer: Security Outliers: Cultural Cues from High-Risk Professions
Michael Smith, @rybolov: DDoS
I think this is the fourth conference I've done videos like this for. I wonder if I should start offering a service where I help record/render videos for free if the conference can take care of travel and lodging for me? That would let me get to more hacker cons. :)
Tiffany Strauchs Rad, @tiffanyrad
International Cyber Jurisdiction: "Kill Switching" Cyberspace, Cyber Criminal
Prosecution & Jurisdiction Hopping
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo1.avi
John Strauchs, @strauchs
Security and IT Convergence
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo2.avi
Richard Goldberg, @GoldbergLawDC
Rules of Engagment: Mitigating Risk in Information Security Work
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo4.avi
Jon McCoy
Ninja Patching .NET
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo5.avi
Marco Figueroa, @marcofigueroa
& Kevin Figueroa
Detecting & Defending You Network using Nepenthes/Shaolin Tools
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo6.avi
Dave Marcus, @davemarcus
Using Social Networks To Profile, Find and 0wn Your Victims
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo7.avi
Brian Baskin, @bbaskin
P2P Forensics
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo8.avi
Jonathan Abolins, @jabolins
When Domain Names Look Like Spaghetti (or Whatever)
Internationalized Domain Names & Investigations in the Networked World
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo9.avi
Deviant Ollam, @deviantollam
Don't Punch My Junk
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo10.avi
Michael Shearer, @theprez98
How to 0wn an ISP in 10 Minutes
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo11.avi
Christopher Witter, @mr_cwitter
Enterprise Packet Capture on Da'Cheap
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo12.avi
Ben Smith
Printer Exploitation
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo13.avi
Adrian Crenshaw, @irongeek_adc
Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me?
Download:
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo14.avi
Download: Chris Nickerson, @indi303 Download:
Gal Shpantzer, @shpantzer Download: Download:
Shyaam Sundhar, @EvilFingers and
John Fulmer, @DaKahuna2007
Is the IDS Dead?
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo15.avi
The State of (In)Security
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo16.avi
Security Outliers: Cultural Cues from High-Risk Professions
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo17.avi
http://ia600305.us.archive.org/1/items/DojoconVideos/dojo18.avi
If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek