Presentaciones de la LinuxCon Europe 2012
- November 16, 2012
- tuxotron
- Don't Play Dice with Random Numbers - H. Peter Anvin, Intel (View Slides)
- Legal Issues Facing Linux in the Cloud - Robert Blasi, Goodwin Procter LLP (View Slides)
- State of Linux and UEFI Secure Boot - James Bottomley, Parallels (View Slides)
- Life After BerkeleyDB: OpenLDAP's Memory-Mapped Database - Howard Chu, Symas Corporation (View Slides)
- Resource Isolation: The Failure of Operating Systems & How We Can Fix It - Glauber Costa, Parallels (View Slides)
- RepOSS: A Flexible OSS Assessment Repository - Masahiro Date, Fujitsu (View Slides)
- Video4Linux2: Path to a Standardized Video Codec API - Kamil Debski, Samsung (View Slides)
- Building and Monitoring a Large Database Cluster - Tim Ellis, Palomino (View Slides)
- Open Source Community Metrics: Tips and Techniques for Measuring Participation - Dawn Foster, Puppet Labs (View Slides)
- Developing and Testing Industrial Hardware With QEMU - Alberto Garcia, Igalia (View Slides)
- Optimizing the Performance of Linux Servers - Davor Guttierrez, 3 Gen d.o.o. (View Slides)
- Tizen Overview and Architecture - Carsten Haitzler, Samsung Electronics (View Slides)
- Yami Nabe Revisited: How Much Duplicated Work is There in the (Android) Kernel? - Armijn Hemel, Tjaldur Software Governance Solutions (View Slides)
- Taking the Fear Out of Contributing: Open Source Mentoring - Stephen Hemminger, Vyatta (View Slides)
- kdump on the Mainframe - Michael Holzheu, IBM (View Slides)
- (Tutorial) FreeIPA - Jakub Hrozek, Red Hat (View Slides)
- How to Develop a Dream Product: OEM and FOSS OSV Synergy - Dmitry Komissarov, ROSA (View Slides)
- Qt Project and Qt 5 - Thiago Macieira, Intel (View Slides)
- Performance Prediction and Optimization using Linux/Cgroups with IO Throttle - Yuzuru Maya, Hitachi (View Slides)
- Automotive Bluetooth Telephony: Combining BlueZ and the Modern Vehicle - Timo Mueller, BMW (View Slides)
- Contiguous Memory Allocator Usage Basics - Michal Nazarwicz, Google (View Slides)
- MySQL Security Model and Pluggable Authentication - Kristofer Pettersson, Oracle (View Slides)
- Parallel Workload Management Using Linux CFS and Hard Limits - Sorana Rabinovici, Teradata (View Slides)
- Edge Virtual Bridging: Introduction and Implementation in Linux (open-lldp) - Thomas Richter, IBM (View Slides)
- Assembling a Kernel Test Grid With Autotest - Lucas Meneghel Rodrigues, Red Hat (View Slides)
- Grilo: Easy Access to Online Multimedia Content - Juan A. Suarez Romero, Igalia (View Slides)
- Cloud Storage Reloaded: Distributed Filesystems (CephFS and GlusterFS) - Udo Seidel, Amadeus Data Processing GmbH (View Slides)
- Optimizing File System Performance When Memory is Tight - Theodore Ts'o, Google (View Slides)
- LibreOffice Certification Program - Italo Vignoli, The Document Foundation (View Slides)
- Bootstrapping the Debian and Ubuntu ARM64 Ports - Wookey, Linaro (View Slides)
- Generic PM Domains And Device PM QoS - Rafael J. Wysocki, Intel OTC (View Slides)
- Status of Linux Tracing - Elena Zannoni, Oracle (View Slides)
La semana pasada, del 5 al 9 de noviembre se celebró en Barcelona (España) una de las conferencias más grandes sobre Linux, la LinuxCon Europe. Para los que no tuvimos el privilegio de poder asistir, nos tendremos que conformar con el material que vayan publicando. Por lo pronto ya están las presentaciones disponibles, esperemos que hagan lo propio con los vídeos.
Mientras tanto, aquí tenéis la lista de las presentaciones:
Fotografiado el primer planeta errante
- November 14, 2012
- cybercaronte
La luz azul más brillante es el planeta errante. Foto EurekaAlert.org
Pues sí, hay planetas que no están unidos a una estrella, que vagan por el Universo sin estar atados a ninguna fuerza de atracción. Hasta ahora era sólo una teoría prácticamente ya comprobada, hasta que un equipo de la Universidad de Montreal ha conseguido fotografiar uno de ellos.
Al principio este tipo de planetas se iban a catalogar en principio como estrellas marrones que no habían podido iniciar las reacciones nucleares para convertirse en estrella tal y como las conocemos. Al no orbitar una estrella madre, este objeto sólo puede ser detectado por infrarrojos, ya que no refleja ningún tipo de luz. Tiene ese color azul por las moléculas que componen su atmósfera (posiblemente metano).
Recreación artística del planeta
El planeta en cuestión se ha llamado CFBDSIR2149, el primer planeta errante confirmado.
Visto en Eurekaalert.orgMaterial de la Defcon 20
- November 13, 2012
- tuxotron
- Welcome & Making the DEF CON 20 Badge - Slides Video m4b Audio
- DEF CON Documentary Trailer - Slides Video m4b Audio
- Before, During, and After - Slides Video m4b Audio
- Shared Values, Shared Responsibility - Slides Video m4b Audio
- Owning Bad Guys {And Mafia} With Javascript Botnets - PDF White Paper Slides Video m4b Audio
- The Darknet of Things, Building Sensor Networks That Do Your Bidding - PDF Slides Video m4b Audio
- Drones! - Slides Video m4b Audio
- PDF Extras Slides Video m4b Audio
- Blind XSS - PDF Slides Video m4b Audio
- Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated - Slides Video m4b Audio
- Cryptohaze Cloud Cracking - Slides Video m4b Audio
- Overwriting the Exception Handling Cache PointerDwarf Oriented Programming - PDF Slides Video m4b Audio
- Exploit Archaeology: Raiders of the Lost Payphones - PDF Slides Video m4b Audio
- Hardware Backdooring is Practical - PDF White Paper Slides Video m4b Audio
- DIY Electric Car - PDF Slides Video m4b Audio
- Tenacious Diggity: Skinny Dippin' in a Sea of Bing - Slides Video m4b Audio
- KinectasploitV2: Kinect Meets 20 Security Tools - PDF Slides Video m4b Audio
- Fuzzing Online Games - Slides Video m4b Audio
- The Open Cyber Challenge Platform - Slides Video m4b Audio
- Into the Droid: Gaining Access to Android User Data - PDF Slides Video m4b Audio
- Panel: Meet the Feds 1 - Law Enforcement - Slides Video m4b Audio
- Meet the Feds 2 - Policy - Slides Video m4b Audio
- SIGINT and Traffic Analysis for the Rest of Us - Slides Video m4b Audio
- Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing - PDF Slides Video m4b Audio
- Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement - PDF Slides Video m4b Audio
- Owning the Network: Adventures in Router Rootkits - PDF Slides Video m4b Audio
- World War 3.0: Chaos, Control & the Battle for the Net - PDF Slides Video m4b Audio
- Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole - PDF Slides Video m4b Audio
- Looking Into The Eye Of The Meter - PDF White Paper Slides Video m4b Audio
- SQL Injection to MIPS Overflows: Rooting SOHO Routers - PDF White Paper Extras Slides Video m4b Audio
- DC RECOGNIZE Awards - Slides Video m4b Audio
- Hacking Humanity: Human Augmentation and You - PDF Slides Video m4b Audio
- Connected Chaos: Evolving the DCG/Hackspace Communication Landscape - Slides Video m4b Audio
- Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit - PDF Extras Slides Video m4b Audio
- DivaShark - Monitor your Flow - Slides Video m4b Audio
- Beyond the War on General Purpose Computing: What's Inside the Box? - Slides Video m4b Audio
- Sploitego - Maltego's (Local) Partner in Crime - PDF Extras Slides Video m4b Audio
- Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting? - PDF Images Slides Video m4b Audio
- Post Metasploitation: Improving Accuracy and Efficiency in Post Exploitation Using the Metasploit Framework - Slides Video m4b Audio
- The Paparazzi Platform: Flexible, Open-Source, UAS Software and Hardware - PDF Slides Video m4b Audio
- Hacking the Google TV - PDF Slides Video m4b Audio
- Owned in 60 Seconds: From Network Guest to Windows Domain Admin - PDF Slides Video m4b Audio
- Hellaphone: Replacing the Java in Android - PDF Slides Video m4b Audio
- Hacking [Redacted] Routers - Slides Video m4b Audio
- Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network - PDF Extras Slides Video m4b Audio
- New Techniques in SQLi Obfuscation: SQL never before used in SQLi - PDF Slides Video m4b Audio
- Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol - PDF Slides Video m4b Audio
- Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions - PDF Slides Video m4b Audio
- The Art of Cyberwar - PDF Extras Slides Video m4b Audio
- More Projects of Prototype This! - PDF Slides Video m4b Audio
- Hacking Measured Boot and UEFI - PDF Slides Video m4b Audio
- Exchanging Demands - PDF Extras Slides Video m4b Audio
- Changing the Security Paradigm: Taking Back Your Network and Bringing Pain to the Adversary - Slides Video m4b Audio
- Busting the BARR: Tracking "Untrackable" Private Aircraft for Fun & Profit - Slides Video m4b Audio
- Crypto and the Cops: the Law of Key Disclosure and Forced Decryption - Slides Video m4b Audio
- Passive Bluetooth Monitoring in Scapy - PDF Extras Slides Video m4b Audio
- How to Hack All the Transport Networks of a Country - Slides Video m4b Audio
- Bigger Monster, Weaker Chains: The National Security Agency and the Constitution - Slides Video m4b Audio
- Black Ops - Slides Video m4b Audio
- Owning One to Rule Them All - Slides Video m4b Audio
- Detecting Reflective Injection - PDF Slides Video m4b Audio
- An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets - PDF Extras Slides Video m4b Audio
- No More Hooks: Detection of Code Integrity Attacks - PDF Slides Video m4b Audio
- DDoS Black and White "Kungfu" Revealed - PDF Slides Video m4b Audio
- NFC Hacking: The Easy Way - PDF Slides Video m4b Audio
- Robots: You're Doing It Wrong 2 - Slides Video m4b Audio
- Anonymous and the Online Fight for Justice - PDF Slides Video m4b Audio
- OPFOR 4Ever - PDF Slides Video m4b Audio
- Weaponizing the Windows API with Metasploit's Railgun - PDF Slides Video m4b Audio
- Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2 - Slides Video m4b Audio
- SCADA HMI and Microsoft Bob: Modern Authentication Flaws With a 90's Flavor - Slides Video m4b Audio
- Don't Stand So Close To Me: An Analysis of the NFC Attack Surface - PDF Slides Video m4b Audio
- How to Hack VMware vCenter Server in 60 Seconds - PDF Slides Video m4b Audio
- DEF CON Comedy Jam V, V for Vendetta - PDF Slides Video m4b Audio
- Cortana: Rise of the Automated Red Team - PDF Slides Video m4b Audio
- Making Sense of Static - New Tools for Hacking GPS - Slides Video m4b Audio
- SQL ReInjector - Automated Exfiltrated Data Identification - PDF Extras Slides Video m4b Audio
- Meet the EFF - Slides Video m4b Audio
- The End of the PSTN As You Know It - PDF Slides Video m4b Audio
- APK File Infection on an Android System - PDF Slides Video m4b Audio
- Panel: The Making of DEF CON 20 - Slides Video m4b Audio
- Adventures in Bouncerland -
- Anti-Forensics and Anti-Anti-Forensics: Attacks and Mitigating Techniques for Digital-Forensic Investigations - PDF Slides Video m4b Audio
- Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”) - Slides Video m4b Audio
- Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors - PDF Slides Video m4b Audio
- Bypassing Endpoint Security for $20 or Less - PDF Slides Video m4b Audio
- The Safety Dance - Wardriving the Public Safety Band - Slides Video m4b Audio
- Kevin Poulsen Answers Your Questions - Slides Video m4b Audio
- Q&A with the Men (and Women) in Black - Slides Video m4b Audio
- Hacker + Airplanes = No Good Can Come Of This - PDF Slides Video m4b Audio
- MegaUpload: Guilty or Not Guilty? - PDF Slides Video m4b Audio
- Stamp Out Hash Corruption! Crack All The Things! - PDF White paper Extras Slides Video m4b Audio
- Spy vs Spy: Spying on Mobile Device Spyware - PDF Slides Video m4b Audio
- Scylla: Because There's no Patch for Human Stupidity - White Paper Slides Video m4b Audio
- Bruce Schneier Answers Your Questions - Slides Video m4b Audio
- Programming Weird Machines with ELF Metadata - PDF Slides Video m4b Audio
- We Have You by the Gadgets - PDF Slides Video m4b Audio
- Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data - Slides Video m4b Audio
- Botnets Die Hard - Owned and Operated - PDF Slides Video m4b Audio
- How to Channel Your Inner Henry Rollins - PDF Slides Video m4b Audio
- Can Twitter Really Help Expose Psychopath Killers' Traits? - PDF Slides Video m4b Audio
- Attacking TPM Part 2: A Look at the ST19WP18 TPM Device - Slides Video m4b Audio
- Twenty Years Back, Twenty Years Ahead: The Arc of DEF CON Past and Future - Slides Video m4b Audio
- Off-Grid Communications with Android: Meshing the Mobile World - PDF White paper Slides Video m4b Audio
- Socialized Data: Using Social Media as a Cyber Mule - Slides Video m4b Audio
- Safes and Containers: Insecurity Design Excellence - PDF Slides Video m4b Audio
- Rapid Blind SQL Injection Exploitation with BBQSQL - PDF Extras Slides Video m4b Audio
- Subterfuge: The Automated Man-in-the-Middle Attack Framework - PDF White paper Slides Video m4b Audio
- Drinking From the Caffeine Firehose We Know as Shodan - PDF Slides Video m4b Audio
- The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet - Slides Video m4b Audio
- The Christopher Columbus Rule and DHS - Slides Video m4b Audio
- The Art Of The Con - Slides Video m4b Audio
- Improving Web Vulnerability Scanning - PDF Slides Video m4b Audio
Yeah! Material oficial de la Defcon 20 ya disponible: vídeos, audio, etc. Aquí tenéis la lista de lo que hay disponible en la web oficial:
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec




