HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Summary of 29c3
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Summary of 29c3  
> Access to the content HTML Beginning of the presentation
PDF PDF version [17.2 ]  
> Description Presentation of the some talks seen during the 29th edition of the Chaos Communication Congress (29c3).  
> Context & Dates Talk presented during OSSIR, on 8 January 2013. , on 8 January 2013.
 
> Author Jérémy Rubert et Steeve Barbeau 
> Type [ French - HTML ]  
> Abstract &
Table of content
Flyleaf
Chaos Communication Congress 2012
Chaos Communication Congress 2012
Keynote : Not my departement - Jacob Appelbaum
ISP Black blox - Luka Perkov
Setting mobile phones free - Mark van Cuijk
Re-igniting the Crypto Wars on the Web - Harry Halpin
Privacy and the Car of the Future - Christie Dudley
The Ethics of Activist DDOS Actions - Molly Sauter
Hacking Cisco phones - Ang Cui & Michael Costello
Hacking Cisco phones - Ang Cui & Michael Costello
Hacking Cisco phones - Ang Cui & Michael Costello
Hacking Cisco phones - Ang Cui & Michael Costello
Hacking Cisco phones - Ang Cui & Michael Costello
Hacking Cisco phones - Ang Cui & Michael Costello
Hacking Cisco phones - Ang Cui & Michael Costello
EveryCook - Alexis Wiasmitinow
FactHacks - djb & Nadia Heninger & Tanja Lange
Defeating Windows memory forensics - Luka Milkovic
Defeating Windows memory forensics - Luka Milkovic
Let Me Answer That for You - Nico Golde
Stylometry and Online Underground Markets - Aylin Caliskan Islam & Sadia Afroz
Analytical Summary of the BlackHole Exploit kit - Julia wolf
Writing a Thumbdrive from Scratch - Travis Goodspeed
Low cost chip microprobing Philipp - Maier & Karsten Nohl
Security Evaluation of Russian GOST Cipher - Dr. Nicolas T. Courtois
Further hacks on the Calypso platform - Sylvain Munaut
Protocol reversing and simulation - Frédéric Guihéry & Georges Bossert
Protocol reversing and simulation - Frédéric Guihéry & Georges Bossert
Conclusion
Questions  
> Related documents
> Copyright © 2013, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 16 January 2013 at 17:00:48 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants