Skip to DEF CON:
- CN B
- CN 1
was held July 9-11, 1999 at the Alexis Park Hotel & Resort
Speakers & Presentations
Cult of the Dead Cow - BO2K!
What will we be doing? R0xiN the HAU-aus, BIzaTch!!!@@!2121lf... But that goes with out saying. In addition to the rocking of the aforementioned house, we will also be releasing BO2k. We won't reveal our sekrets of BO-Fu, but trust me when we tell you that it will make BackOrifice v1.0 look like LOGO for the TI99/4a.
See It! (m4v video) Hear it! (m4b Audio)
Using the Internet Pseudonymously: One Year Later
TEXTFILES, G-PHILES, AND LOG FILES: Remembering the 1980's Through ASCII
Lock Picking Explored
How To Be Aware of Security Problems On Your Network
Currency Systems, Credit Systems and Associations
HERF Guns, EMP Bombs and Weapons of Mass Disruption (UnClassified)
The Ethics/Morality/Practicality/Patriotism of Hacking
Fear and Loathing in Cyberspace: The Art and Science of Enemy Profiling
Maricopa Count Prosecutor, AZ & Kevin Higgins - Nevada Attorney General's Office
Introduction to Cyber Forensic Analysis.
Security Problems Associated with Client-side Scripting in Popular Web-based Services
The Legalities and Practicalities of Searches and Interrogations
"Internet Anonymity Under Assault: The 'John Doe' Lawsuits"
Extra Border Hacking - How a Company Can Be Hacked Without the Hacker Ever Picking on That Companies Machine
Hacking Windows Registries and Shares