SOURCE
- 收录时间:2025-03-05 09:44:16
- 文件大小:14GB
- 下载次数:1
- 最近下载:2025-03-05 09:44:16
- 磁力链接:
-
文件列表
- SOURCE 2015 Boston/All That Cybers Is Not War - SOURCE Security Conference Boston 2015.mp4 126MB
- SOURCE 2010 Boston/Videos/Trend Micro - Measuring Security.mp4 121MB
- SOURCE 2008 Boston/Telephone Defenses Against the Dark Arts (part1).mp4 113MB
- SOURCE 2013 Boston/Lessons Of Binary Analysis.mp4 108MB
- SOURCE 2009 Boston/Horseless Carriage Exploits and Eavesdropping Defenses.mp4 107MB
- SOURCE 2009 Boston/Panel - The Partial Disclosure Dilemma.mp4 97MB
- SOURCE 2009 Boston/Career Management Workshop (part 2).mp4 96MB
- SOURCE 2010 Boston/Videos/Andy Purdy - Keynote.mp4 92MB
- SOURCE 2010 Boston/Videos/Rich Mogull - Involuntary Case Studies in Data Breaches.mp4 90MB
- SOURCE 2012 Seattle/Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.mp4 89MB
- SOURCE 2015 Dublin/No one is coming. We are the Cavalry - Claus Haumann - SOURCE Dublin 2015.mp4 88MB
- SOURCE 2010 Boston/Videos/Jake Appelbaum - Anonymity, Privacy, and Cirvumvention with Tor.mp4 88MB
- SOURCE 2010 Boston/Videos/Moxie Marlinspike - Changing Threats to Privacy.mp4 87MB
- SOURCE 2015 Boston/Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.mp4 87MB
- SOURCE 2013 Boston/Hiring Recruitment.mp4 85MB
- SOURCE 2010 Boston/Videos/Rafal Los and Matt Wood - Into the Rabbit Hole.mp4 85MB
- SOURCE 2010 Boston/Videos/HD Moore - Making Penetration Testing Mainstream.mp4 85MB
- SOURCE 2010 Barcelona/Jackpotting Automated Teller Machines.mp4 84MB
- SOURCE 2010 Barcelona/Implementing a CSIRT - Lessons Learnt from Setting Up the Irish CERT.mp4 84MB
- SOURCE 2009 Boston/Career Management Workshop (part 1).mp4 82MB
- SOURCE 2010 Boston/Videos/Bill Blunden - An Uninvited Guest.mp4 82MB
- SOURCE 2010 Boston/Videos/Deviant Ollam - The Four Types of Locks.mp4 82MB
- SOURCE 2013 Boston/Leveraging Collective Intelligence To Combat Cyber Crime.mp4 81MB
- SOURCE 2015 Boston/Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 79MB
- SOURCE 2010 Boston/Videos/Dino Dai Zovi - Practical Return-Oriented Programming.mp4 77MB
- SOURCE 2010 Boston/Videos/Mary Ann Davidson - Keynote.mp4 77MB
- SOURCE 2010 Boston/Videos/Josh Corman - Realities of Starting a Security Company - Investors Panel.mp4 76MB
- SOURCE 2015 Boston/Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.mp4 76MB
- SOURCE 2010 Barcelona/Anti-Virus Product Testing Sessions.mp4 76MB
- SOURCE 2010 Boston/Videos/Wendy Poland and David Lenoe - Bullseye on Your Back.mp4 75MB
- SOURCE 2010 Boston/Videos/Robert Clark - Legal Aspects of Computer Network Security and Privacy.mp4 75MB
- SOURCE 2010 Barcelona/Security in the SDLC - IT Doesn t Have To Be Painful.mp4 75MB
- SOURCE 2010 Boston/Videos/Paul Asadoorian - Embedded System Hacking.mp4 74MB
- SOURCE 2009 Boston/A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance.mp4 74MB
- SOURCE 2010 Barcelona/SCCP hacking Attacking the SS7 & SIGTRAN and Mapping the Phone System.mp4 73MB
- SOURCE 2015 Boston/Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 73MB
- SOURCE 2008 Boston/Deperimetrisation - Dream Or Nightmare For Network Security.mp4 72MB
- SOURCE 2010 Boston/Videos/Chris Clark and Townsend Ladd Harris - Attacking WebOS.mp4 71MB
- SOURCE 2010 Barcelona/ERP Security - Myths, Problems, Solutions.mp4 71MB
- SOURCE 2010 Boston/Videos/HD Moore - Keynote.mp4 70MB
- SOURCE 2010 Boston/Videos/Chris Hoff - Cloudiforniturtles.mp4 70MB
- SOURCE 2010 Boston/Videos/John Cran - Realities of Starting a Security Company - Entrepreneurs Panel.mp4 69MB
- SOURCE 2010 Boston/Videos/Josh Corman - Rugged Software.mp4 68MB
- SOURCE 2010 Barcelona/Using the the 36 stratagems for Social Engineering.mp4 67MB
- SOURCE 2010 Boston/Videos/Brian Holyfield - Cracking the Foundation.mp4 66MB
- SOURCE 2010 Barcelona/Applied Threat Modeling - Live.mp4 66MB
- SOURCE 2009 Boston/Wireless Sensor Networking As An Asset And A Liability.mp4 66MB
- SOURCE 2010 Boston/Videos/David Mortman - Too Many Cooks Spoil the Broth.mp4 65MB
- SOURCE 2010 Boston/Videos/Allison Miller - Protecting Customers from Online Threats.mp4 65MB
- SOURCE 2009 Boston/From The Garage To NASDAQ With Open Source - The Sourcefire Experience.mp4 63MB
- SOURCE 2013 Boston/Keynote - Andy Ellis.mp4 63MB
- SOURCE 2010 Boston/Videos/Carole Fennelly - Vulnerability Management Panel.mp4 63MB
- SOURCE 2015 Boston/Chasing Uniqueness, Understanding Normal - Neil King - SOURCE Dublin 2015.mp4 63MB
- SOURCE 2010 Barcelona/Passwords in Corporate Networks.mp4 63MB
- SOURCE 2010 Boston/Videos/Ron Gula - Detecting Penetration Testing.mp4 62MB
- SOURCE 2008 Boston/Banking on education - A case study on security training programs.mp4 62MB
- SOURCE 2009 Boston/Marcus Ranum Keynote.mp4 62MB
- SOURCE 2008 Boston/Developing an Incident Response Plan.mp4 62MB
- SOURCE 2008 Boston/Disruptive Innovation and the Future of Security.mp4 62MB
- SOURCE 2008 Boston/L0pht Panel.mp4 61MB
- SOURCE 2010 Boston/Videos/Dov Yoran and Chris Hoff - Cloud Security.mp4 61MB
- SOURCE 2008 Boston/The CERT C Secure Coding Standard.mp4 61MB
- SOURCE 2010 Boston/Videos/Travis Goodspeed - Breaking Zigbee Crypto.mp4 61MB
- SOURCE 2010 Boston/Videos/Lenny Zeltser - Knock Knock.mp4 60MB
- SOURCE 2008 Boston/Entrepreneur Panel.mp4 60MB
- SOURCE 2010 Boston/Videos/Mike Kershaw - Wifi Security.mp4 60MB
- SOURCE 2010 Boston/Videos/Adam Meyers - Security Sucks.mp4 60MB
- SOURCE 2013 Boston/Building Your Own Packet Capture Platform.mp4 60MB
- SOURCE 2015 Boston/Aqua Vitae The Water of Life - Martin McKeay - SOURCE Dublin 2015.mp4 60MB
- SOURCE 2008 Boston/Vulnerability in the Real World - Lessons from both sides of the fence.mp4 59MB
- SOURCE 2008 Boston/Managing Your Career in Infosec.mp4 59MB
- SOURCE 2009 Boston/Protecting Vulnerable Web Applications With IIS7.mp4 59MB
- SOURCE 2008 Boston/Not Dead But Twitching - Anti-Virus Succumbs to the Scourge of Modern Malware.mp4 59MB
- SOURCE 2015 Boston/From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.mp4 59MB
- SOURCE 2015 Boston/Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.mp4 59MB
- SOURCE 2015 Boston/Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.mp4 59MB
- SOURCE 2009 Boston/Anti-Debugging - A Developer s Viewpoint.mp4 59MB
- SOURCE 2008 Boston/Automated Structural Malware Classification.mp4 59MB
- SOURCE 2013 Boston/Unified Communications - Information Loss Through the Front Door.mp4 58MB
- SOURCE 2010 Boston/Videos/Randolph Barr - Gain Comfort in Losing Control to the Cloud.mp4 58MB
- SOURCE 2009 Boston/The Crisis in Information Security.mp4 58MB
- SOURCE 2008 Boston/Investigation Techniques for Social Networking Sites.mp4 58MB
- SOURCE 2010 Boston/Videos/Erez Metula - Managed Code Rootkits.mp4 58MB
- SOURCE 2013 Boston/Data Breach - Let The Finger Pointing Begin.mp4 58MB
- SOURCE 2008 Boston/How Compliance Can Get You Killed.mp4 58MB
- SOURCE 2015 Boston/Matt Wood - Reactive JS Security Testing - Exploitation - SOURCE Security Conference.mp4 58MB
- SOURCE 2009 Boston/How Microsoft Fixes Security Vulnerabilities.mp4 58MB
- SOURCE 2010 Boston/Videos/Riley Hassell - NT Object Insecurity.mp4 57MB
- SOURCE 2008 Boston/Detailed Thread Modeling.mp4 57MB
- SOURCE 2008 Boston/Web Application Panel.mp4 57MB
- SOURCE 2012 Boston/Games We Play - Defenses and Disincentives.mp4 57MB
- SOURCE 2010 Barcelona/Carders.cc, the Rise and Fall of an Underground Forum.mp4 57MB
- SOURCE 2008 Boston/Understanding Emerging Threats - The case of Nugache.mp4 57MB
- SOURCE 2015 Boston/Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.mp4 57MB
- SOURCE 2010 Boston/Videos/Timothy Brueggemann - Understanding The Key to Protecting Highly Sensitive PII.mp4 56MB
- SOURCE 2009 Boston/Get Rich or Die Trying - - Making Money on the Web the Black Hat Way.mp4 56MB
- SOURCE 2009 Boston/Panel Discussion - 2009 And Beyond.mp4 56MB
- SOURCE 2015 Boston/Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.mp4 56MB
- SOURCE 2009 Boston/Encryption and Enterprise Data Security.mp4 56MB
- SOURCE 2015 Boston/Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.mp4 56MB
- SOURCE 2012 Boston/Microsoft s Response Process - 10 Years of Hard Knock Learning.mp4 55MB
- SOURCE 2013 Boston/Keynote - Dan Geer & Richard Thieme.mp4 55MB
- SOURCE 2008 Boston/Advanced Linux Firewalls.mp4 55MB
- SOURCE 2013 Boston/JavaScript Pitfalls.mp4 55MB
- SOURCE 2010 Boston/Videos/Dan Crowley - Windows File Pseudonyms.mp4 55MB
- SOURCE 2009 Boston/400 Apps in 40 Days.mp4 55MB
- SOURCE 2009 Boston/Employing PCI Compliance Programs.mp4 54MB
- SOURCE 2009 Boston/Information Security in Higher Education - Baby Steps.mp4 54MB
- SOURCE 2015 Dublin/Supplier Security Risk Assessment A Practical Guide - Marian Ventuneac.mp4 54MB
- SOURCE 2009 Boston/Secure Voice Communications - The Missing Piece in Mobile Security.mp4 54MB
- SOURCE 2013 Boston/Privacy at the Border - A Guide for Traveling with Devices.mp4 54MB
- SOURCE 2013 Boston/Distributed Security - Expanding the Toolkit for Institutional Resilience.mp4 54MB
- SOURCE 2009 Boston/Security Start-Up Event (showcase).mp4 54MB
- SOURCE 2013 Boston/Browser Extensions - The Backdoor To Stealth Malware.mp4 54MB
- SOURCE 2013 Boston/Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics).mp4 54MB
- SOURCE 2009 Boston/Splunk.mp4 54MB
- SOURCE 2009 Boston/Peter Kuper - Keynote.mp4 54MB
- SOURCE 2012 Seattle/Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.mp4 54MB
- SOURCE 2012 Boston/SCAP for Everyone - A case study in transforming configurations.mp4 54MB
- SOURCE 2012 Seattle/Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.mp4 54MB
- SOURCE 2008 Boston/Content Awareness - A Cornerstone to Data Prote.mp4 53MB
- SOURCE 2013 Boston/Suicide Risk Assessment and Intervention Tactics.mp4 53MB
- SOURCE 2010 Boston/Videos/Adam Meyers - Reverse Engineering Broken Arrows.mp4 53MB
- SOURCE 2015 Boston/Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 53MB
- SOURCE 2013 Boston/We See The Future And It s Not Pretty.mp4 53MB
- SOURCE 2013 Boston/Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4 53MB
- SOURCE 2013 Boston/PLC SCADA Vulnerabilities in Correctional Facilities.mp4 53MB
- SOURCE 2009 Boston/Turning Science into Sound Bites - Lessons from - Prototype This.mp4 53MB
- SOURCE 2009 Boston/Tenable Network Security.mp4 53MB
- SOURCE 2015 Dublin/It isn’t all foggy in the Cloud Digital Forensic Investigations in the Cloud Environment.mp4 53MB
- SOURCE 2012 Boston/Lessons Of Static Binary Analysis.mp4 52MB
- SOURCE 2013 Boston/Blitzing with your Defense.mp4 52MB
- SOURCE 2010 Barcelona/Cyber[Crime War] - Connecting the Dots.mp4 52MB
- SOURCE 2013 Boston/Your PCI Assessor - Best Friend or Worst Enemy You Choose....mp4 52MB
- SOURCE 2013 Boston/Bring Your Own Device - Keeping it Simple and Effective.mp4 52MB
- SOURCE 2009 Boston/Security Startup Showcase.mp4 52MB
- SOURCE 2013 Boston/Insider Threat - Hunting for Authorized Evil.mp4 52MB
- SOURCE 2013 Boston/Inside the Black Hole Exploit Kit (BHEK).mp4 51MB
- SOURCE 2009 Boston/L0phtCrack 6 Release.mp4 51MB
- SOURCE 2009 Boston/Dissecting Foreign Web Attacks.mp4 51MB
- SOURCE 2015 Boston/Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.mp4 51MB
- SOURCE 2013 Boston/Protecting sensitive information on iOS devices.mp4 51MB
- SOURCE 2012 Seattle/William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.mp4 51MB
- SOURCE 2013 Boston/Analysis of The BroBot DDOS Attack.mp4 51MB
- Pre-Conference Interviews/Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.mp4 51MB
- SOURCE 2008 Boston/Panel Discussion - The tug-o-war between business and security.mp4 51MB
- SOURCE 2013 Boston/Vulnerabilities of Control Systems in Drinking Water Utilities.mp4 50MB
- SOURCE 2008 Boston/Business Logic Flaws.mp4 50MB
- SOURCE 2013 Boston/The Base Rate Fallacy - Information Security Needs To Understand This..mp4 50MB
- SOURCE 2015 Boston/Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.mp4 50MB
- SOURCE 2009 Boston/I Can Haz Privacy.mp4 50MB
- SOURCE 2015 Boston/Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.mp4 50MB
- SOURCE 2012 Boston/SexyDefense - Maximizing the home-field advantage.mp4 50MB
- SOURCE 2013 Boston/Practical Exploitation of Embedded Systems.mp4 50MB
- SOURCE 2009 Boston/Exploiting Unicode-enable Software.mp4 50MB
- SOURCE 2012 Seattle/Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4 50MB
- SOURCE 2012 Boston/Reverse Engineering Mobile Applications.mp4 49MB
- SOURCE 2009 Boston/So You Want To Train An Army Of Ninjas.mp4 49MB
- SOURCE 2012 Boston/Voight-Kampff ing The BlackBerry PlayBook.mp4 49MB
- SOURCE 2008 Boston/Establishing a Security Metrics Program.mp4 49MB
- SOURCE 2015 Boston/Growing Up A Maturity Model and Roadmap for Vulnerability Management.mp4 49MB
- SOURCE 2013 Boston/RESTful Services, The Web Security Blind Spot.mp4 49MB
- SOURCE 2008 Boston/Keynote - Steven Levy.mp4 49MB
- SOURCE 2012 Seattle/Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.mp4 49MB
- SOURCE 2012 Boston/No Victims - How to Measure & Communicate Risk.mp4 49MB
- SOURCE 2012 Boston/SOURCE Boston 2012 - Keynote - Anonymous 20 20 - The Beginning is Near.mp4 49MB
- SOURCE 2012 Seattle/Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.mp4 49MB
- SOURCE 2012 Boston/Watchtowers of the Internet - Analysis of Outbound Malware Communication.mp4 48MB
- SOURCE 2009 Boston/Introducing Heyoka - DNS Tunneling 2.0.mp4 48MB
- SOURCE 2012 Boston/Inside the Duqu Command and Control Servers,.mp4 48MB
- SOURCE 2013 Boston/Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques.mp4 48MB
- SOURCE 2010 Barcelona/If Black Hats always win, why is Albert Gonzalez in prison.mp4 48MB
- SOURCE 2010 Barcelona/Balancing the Pwn Trade Deficit.mp4 47MB
- SOURCE 2008 Boston/Your car passed inspection but what about your software.mp4 47MB
- SOURCE 2008 Boston/Keynote - Dan Geer.mp4 47MB
- SOURCE 2013 Boston/Attacking Cloud Services with Source Code.mp4 46MB
- SOURCE 2015 Boston/Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.mp4 46MB
- SOURCE 2008 Boston/All the Data That s Fit to Visualize.mp4 46MB
- SOURCE 2013 Boston/Analyzing the Chemistry of Data.mp4 46MB
- SOURCE 2013 Boston/Attacking Cloud Services with Source Code (2).mp4 46MB
- SOURCE 2013 Boston/Theory and Application of Realistic Capture the Flag Competitions.mp4 46MB
- SOURCE 2013 Boston/The Interim Years Of Cyberspace - Security In A Domain Of Warfare.mp4 46MB
- SOURCE 2009 Boston/Attacking Layer 8 - Client Side Penetration Testing.mp4 46MB
- SOURCE 2012 Seattle/Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.mp4 46MB
- SOURCE 2015 Boston/Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.mp4 45MB
- SOURCE 2012 Seattle/Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.mp4 45MB
- SOURCE 2009 Boston/Maximizing ROI on Vulnerability Management.mp4 45MB
- SOURCE 2008 Boston/Information Operations.mp4 45MB
- SOURCE 2012 Boston/Criticality, Rejectionists, Risk Tolerance - Keynote at Source Boston 2012.mp4 45MB
- SOURCE 2013 Boston/Rise In ATM Compromises.mp4 45MB
- SOURCE 2009 Boston/How to Respond to an Unexpected Security Incident - A Reality Check.mp4 45MB
- SOURCE 2015 Boston/Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.mp4 45MB
- SOURCE 2015 Boston/Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.mp4 45MB
- SOURCE 2013 Boston/Pwnie Express presents Practical MitM Pentesting.mp4 45MB
- SOURCE 2015 Boston/Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.mp4 45MB
- SOURCE 2015 Boston/Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.mp4 45MB
- SOURCE 2008 Boston/CEO Panel.mp4 45MB
- SOURCE 2013 Boston/Adversarial Resilience at the Planetary Scale.mp4 44MB
- SOURCE 2013 Boston/Proactive Defense.mp4 44MB
- SOURCE 2010 Boston/Videos/Colin Ames - Neurosurgery With Meterpreter.mp4 44MB
- SOURCE 2013 Boston/Avoiding Android App Security Pitfalls.mp4 44MB
- SOURCE 2012 Seattle/Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.mp4 43MB
- SOURCE 2012 Boston/Advanced SQL Injection with SQLol - The Configurable SQLi Testbed.mp4 43MB
- SOURCE 2010 Barcelona/Building Bridges - Forcing Hackers and Business to - Hug it Out.mp4 43MB
- SOURCE 2012 Boston/Celebrating Bad Crypto.mp4 43MB
- SOURCE 2008 Boston/Having a Defined Target for Software Security Testing.mp4 43MB
- SOURCE 2012 Boston/Successful Application Security Programs in an Uncertain Landscape.mp4 43MB
- SOURCE 2013 Boston/Android Modding for the Security Practitioner.mp4 43MB
- SOURCE 2013 Boston/Strategic Analysis of the iOS Jailbreak Development Community.mp4 42MB
- SOURCE 2013 Boston/Mapping And Evolution Of Android Permissions.mp4 42MB
- SOURCE 2013 Boston/Achievement Unlocked - Designing a compelling security awareness program.mp4 42MB
- SOURCE 2010 Barcelona/Security in Agile PLC - Practical navigational aid for speed boats.mp4 42MB
- Pre-Conference Interviews/Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.mp4 42MB
- SOURCE 2012 Boston/What Permissions Does Your Database User REALLY Need.mp4 41MB
- SOURCE 2013 Boston/Big Data Big Liability.mp4 41MB
- SOURCE 2015 Boston/Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.mp4 40MB
- SOURCE 2012 Boston/Behind The Scenes - Pwning Satellite Cable TV.mp4 40MB
- SOURCE 2013 Boston/A Brief History of Physical Security.mp4 40MB
- SOURCE 2013 Boston/Just Another Day at the Office... September 11, 2001, The White House.mp4 40MB
- SOURCE 2013 Boston/Covering your - aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS.mp4 40MB
- SOURCE 2008 Boston/Keynote Speaker - Richard Clarke.mp4 40MB
- SOURCE 2008 Boston/A Security Metric for Software Developer.mp4 39MB
- Pre-Conference Interviews/Interview With Security Innovations Joe Basirico - Security Innovation.mp4 39MB
- SOURCE 2013 Boston/Lessons of the Kobayashi Maru - If You re Not Cheating, You re Not Trying.mp4 39MB
- SOURCE 2008 Boston/Understanding and Preventing Data Breaches, The Real World Edition.mp4 38MB
- SOURCE 2010 Barcelona/Leveraging Social Networking While Mitigating Risk.mp4 38MB
- SOURCE 2012 Boston/Mobile Snitch - Devices telling the world about you.mp4 38MB
- SOURCE 2013 Boston/Games We Play - Payoffs & Chaos Monkeys.mp4 38MB
- SOURCE 2010 Boston/Videos/Jon Oberheide - Linux Kernel Exploitation.mp4 37MB
- SOURCE 2012 Seattle/Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.mp4 37MB
- SOURCE 2013 Boston/BYOD - The Risks, Rewards and Challenges.mp4 37MB
- SOURCE 2012 Boston/Finding the Weak Link in Windows Binaries.mp4 36MB
- SOURCE 2015 Boston/Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.mp4 36MB
- SOURCE 2012 Boston/De-constructing the Cost of a Data Breach.mp4 36MB
- SOURCE 2012 Boston/Perspectives of How to Develop a Winning Career in Infosec.mp4 36MB
- SOURCE 2010 Barcelona/Security Sucks.mp4 36MB
- SOURCE 2013 Boston/Keynote - Gene Kim.mp4 36MB
- SOURCE 2013 Boston/ColdFusion for Penetration Testers.mp4 36MB
- SOURCE 2012 Boston/Media Hype in the Information Security Industry.mp4 35MB
- SOURCE 2010 Barcelona/Revolution or Evolution - Information Security 2020.mp4 35MB
- SOURCE 2013 Boston/Hacking Back - is a Bad Idea.mp4 34MB
- SOURCE 2015 Boston/Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.mp4 34MB
- SOURCE 2015 Boston/Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.mp4 34MB
- SOURCE 2013 Boston/Scoring PDF Structure To Detect Malicious Files.mp4 34MB
- SOURCE 2015 Boston/Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.mp4 33MB
- SOURCE 2009 Boston/Massachusetts Data Breach Laws, Regulations, and Responsibilities.mp4 32MB
- Pre-Conference Interviews/Richard Stiennon - Speaker Interview - Source Boston 2019.mp4 32MB
- SOURCE 2012 Boston/Using capture-the-flag to enhance teaching and training.mp4 31MB
- SOURCE 2013 Boston/Why Developers And Vulnerability Researchers Should Collaborate.mp4 31MB
- SOURCE 2015 Boston/Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.mp4 31MB
- SOURCE 2015 Boston/Jared Carlson - A Swift Teardown - SOURCE Security Conference Boston 2015.mp4 31MB
- SOURCE 2010 Barcelona/Hacking SAP BusinessObjects.mp4 30MB
- Pre-Conference Interviews/Rafal Los - SOURCE Mesa Speaker Interview.mp4 30MB
- Pre-Conference Interviews/Ming Fu - Pre-Conference Interview.mp4 26MB
- Pre-Conference Interviews/Jason Hoenich - Pre-Conference Interview.mp4 25MB
- Pre-Conference Interviews/Masha Sedova - SOURCE Boston Pre-Conference Interview.mp4 24MB
- Pre-Conference Interviews/Caroline Wong - SOURCE Mesa Pre-Conference Interview.mp4 22MB
- Pre-Conference Interviews/Thomas Fischer - SOURCE Boston Pre-Conference Interview.mp4 21MB
- Pre-Conference Interviews/Chris Romeo - SOURCE Mesa- Phoenix Conference Speaker.mp4 20MB
- Pre-Conference Interviews/Richard Thieme - Speaker Interview - SOURCE Austin 2018.mp4 20MB
- Pre-Conference Interviews/Stacy Thayer - Pre-Conference Interview - SOURCE Austin.mp4 19MB
- Pre-Conference Interviews/Joe Gray - SOURCE Pre-Conference Interview.mp4 19MB
- Pre-Conference Interviews/Nathan Cooprider - SOURCE Mesa Pre-Conference Interview.mp4 19MB
- Pre-Conference Interviews/BugCrowd - Speaker Interview - Source Boston 2019.mp4 18MB
- Pre-Conference Interviews/Megan Roddie - SOURCE Mesa Pre-Conference Interview.mp4 18MB
- Pre-Conference Interviews/Paul Asadoorian - SOURCE Boston Pre-Conference Interview.mp4 18MB
- Pre-Conference Interviews/Rocio Baeza - SOURCE Mesa Speaker Interview.mp4 17MB
- Pre-Conference Interviews/Haydn Johnson.mp4 17MB
- Pre-Conference Interviews/Anand Srinivas - Speaker Interview - Source Boston 2019.mp4 17MB
- Pre-Conference Interviews/Justine Bone - Pre-Conference Interview.mp4 17MB
- Pre-Conference Interviews/Robert Sell - SOURCE Mesa Pre-Conference Interview.mp4 17MB
- Pre-Conference Interviews/Deidre Diamond - Pre- conference Interview.mp4 16MB
- Pre-Conference Interviews/Megan Roddie - Pre-Conference Interview - SOURCE Austin.mp4 16MB
- Pre-Conference Interviews/Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.mp4 15MB
- Pre-Conference Interviews/Phillip Maddux - SOURCE Pre-Conference Interview.mp4 14MB
- Pre-Conference Interviews/Walter Williams - Pre-Conference Interview.mp4 13MB
- Pre-Conference Interviews/Anurag Dwivedy - Pre-Conference Interview.mp4 13MB
- Pre-Conference Interviews/Bob Adams - SOURCE Pre-Conference Interview.mp4 13MB
- Pre-Conference Interviews/Georgia Weidman - SOURCE Boston Pre-Conference Interview.mp4 13MB
- Pre-Conference Interviews/Mike Murray - Pre-Conference Interview - SOURCE Austin.mp4 13MB
- Pre-Conference Interviews/Katy Anton - Speaker Interview - Source Boston 2019.mp4 13MB
- Pre-Conference Interviews/Kevin Babcock - SOURCE Mesa Pre Conference Interview.mp4 12MB
- Pre-Conference Interviews/Dan Cornell - Pre-Conference Interview - SOURCE Austin.mp4 12MB
- Pre-Conference Interviews/Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.mp4 12MB
- Pre-Conference Interviews/Michael Borohovski - Speaker Interview - SOURCE Austin.mp4 12MB
- Pre-Conference Interviews/Josh Bressers - Pre-Conference Interview - SOURCE Austin.mp4 12MB
- Pre-Conference Interviews/Lester Godsey - SOURCE Mesa Interview.mp4 11MB
- Pre-Conference Interviews/Sandy Carielli - Pre-Conference Interview.mp4 11MB
- Pre-Conference Interviews/Chris Cornutt - Speaker Interview - SOURCE Austin.mp4 11MB
- Pre-Conference Interviews/Joel Scambray NCC Group - SOURCE Mesa Interview.mp4 11MB
- Pre-Conference Interviews/Aaron Katz - Pre-Conference Interview.mp4 11MB
- Pre-Conference Interviews/Brianne Hughes - SOURCE Pre-Conference Interviews.mp4 11MB
- Pre-Conference Interviews/Matthew Cheung - SOURCE Pre-Conference Interview.mp4 10MB
- Pre-Conference Interviews/Roxy Dee - SOURCE Mesa 2018 Interview.mp4 10MB
- Pre-Conference Interviews/Valery Berestetsky, Jonathan Schaaf - Speaker Interview - SOURCE Austin.mp4 10MB
- Pre-Conference Interviews/Vince Warrington - Pre-Conference Interview - SOURCE Boston.mp4 9MB
- Pre-Conference Interviews/Izar Tarandach - Speaker Interview - Source Boston 2019.mp4 9MB
- Pre-Conference Interviews/Harry Sverdlove - Speaker Interview - SOURCE Austin.mp4 8MB
- SOURCE 2010 Boston/Presentation Slides/Rugged Software Development_20100311(2).pdf 7MB
- Pre-Conference Interviews/Garett Montgomery - Pre-Conference Interview - SOURCE Austin.mp4 7MB
- Pre-Conference Interviews/Andrea Little Limbago - Speaker Interview - Source Boston 2019.mp4 7MB
- Pre-Conference Interviews/Master Class InfoSec Train the Trainer.mp4 6MB
- Pre-Conference Interviews/Personal Message From Our Executive Director.mp4 6MB
- Pre-Conference Interviews/Marcus Carey - Speaker Interview - SOURCE Austin.mp4 6MB
- SOURCE 2010 Boston/Presentation Slides/HDKeynote.pdf 5MB
- SOURCE 2010 Boston/Presentation Slides/Moxie.pdf 4MB
- SOURCE 2010 Boston/Presentation Slides/10-04-SOURCE-DetectingPenTesters.pptx 4MB
- SOURCE 2010 Boston/Presentation Slides/carmen.pdf 4MB
- SOURCE 2010 Boston/Presentation Slides/SOURCE-Boston-2010.pdf 3MB
- SOURCE 2010 Boston/Presentation Slides/Managed Code Rootkits - Erez Metula.ppt 2MB
- SOURCE 2010 Boston/Presentation Slides/BillBlunden.pdf 2MB
- SOURCE 2010 Boston/Presentation Slides/NSSLabs - SourceBoston.ppt 2MB
- SOURCE 2010 Boston/Presentation Slides/Broken Arrows Source.pdf 2MB
- SOURCE 2010 Boston/Presentation Slides/RandyBarr.pptx 2MB
- SOURCE 2010 Boston/Presentation Slides/Dino.pdf 2MB
- SOURCE 2010 Boston/Presentation Slides/MonkeyBerries-SourceBoston-2010.pdf 2MB
- SOURCE 2010 Boston/Presentation Slides/Adobe_SOURCEBoston.pptx 1MB
- SOURCE 2010 Boston/Presentation Slides/SteveChristey.pptx 1MB
- SOURCE 2010 Boston/Presentation Slides/Brueggemann.pptx 1MB
- SOURCE 2010 Boston/Presentation Slides/PCI-right_wrong_2010-04-22.pdf 1MB
- SOURCE 2010 Boston/Presentation Slides/source10-linuxkernel-jonoberheide.pdf 875KB
- SOURCE 2010 Boston/Presentation Slides/DanK.pptx 765KB
- SOURCE 2010 Boston/Presentation Slides/Windows File Pseudonyms.pptx 710KB
- SOURCE 2010 Boston/Presentation Slides/iSEC_Securely_Moving_Into_The_Cloud.pdf 634KB
- SOURCE 2010 Boston/Presentation Slides/NT Object (In)Security.pdf 599KB
- SOURCE 2010 Boston/Presentation Slides/Robert Clark.ppt 315KB
- SOURCE 2010 Boston/Presentation Slides/SOURCE Boston 2010 Clark slides.ppt 313KB
- SOURCE 2010 Boston/Presentation Slides/VulnPanel.pptx 165KB
- SOURCE 2012 Seattle/Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.eng.srt 159KB
- SOURCE 2015 Boston/All That Cybers Is Not War - SOURCE Security Conference Boston 2015.eng.srt 147KB
- SOURCE 2010 Boston/Presentation Slides/sb2010-schedule.htm 142KB
- SOURCE 2015 Boston/Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.eng.srt 135KB
- SOURCE 2015 Boston/Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.eng.srt 118KB
- SOURCE 2012 Seattle/Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.eng.srt 105KB
- SOURCE 2012 Seattle/Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.eng.srt 101KB
- SOURCE 2012 Seattle/Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.eng.srt 97KB
- SOURCE 2015 Boston/Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.eng.srt 94KB
- SOURCE 2012 Seattle/Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.eng.srt 88KB
- SOURCE 2012 Seattle/Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.eng.srt 87KB
- SOURCE 2012 Seattle/Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.eng.srt 87KB
- SOURCE 2012 Seattle/Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.eng.srt 86KB
- SOURCE 2015 Boston/Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt 86KB
- SOURCE 2012 Seattle/Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.eng.srt 86KB
- SOURCE 2015 Boston/Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt 85KB
- SOURCE 2015 Boston/Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.eng.srt 85KB
- SOURCE 2012 Seattle/William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.eng.srt 84KB
- SOURCE 2015 Boston/Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt 83KB
- SOURCE 2015 Boston/Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.eng.srt 81KB
- SOURCE 2015 Boston/Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.eng.srt 76KB
- SOURCE 2015 Boston/From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.eng.srt 76KB
- SOURCE 2015 Boston/Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.eng.srt 74KB
- SOURCE 2015 Boston/Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.eng.srt 72KB
- SOURCE 2015 Boston/Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.eng.srt 72KB
- SOURCE 2015 Boston/Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.eng.srt 68KB
- SOURCE 2015 Boston/Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.eng.srt 65KB
- SOURCE 2015 Boston/Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.eng.srt 65KB
- Pre-Conference Interviews/Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.eng.srt 64KB
- SOURCE 2015 Boston/Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.eng.srt 63KB
- SOURCE 2015 Boston/Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.eng.srt 63KB
- SOURCE 2015 Boston/Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.eng.srt 59KB
- SOURCE 2012 Seattle/Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.eng.srt 58KB
- SOURCE 2015 Boston/Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.eng.srt 56KB
- SOURCE 2015 Boston/Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.eng.srt 56KB
- SOURCE 2015 Boston/Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.eng.srt 55KB
- SOURCE 2015 Boston/Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.eng.srt 54KB
- SOURCE 2015 Boston/Growing Up A Maturity Model and Roadmap for Vulnerability Management.eng.srt 54KB
- SOURCE 2015 Boston/Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.eng.srt 52KB
- SOURCE 2015 Boston/Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.eng.srt 51KB
- Pre-Conference Interviews/Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.eng.srt 48KB
- SOURCE 2015 Boston/Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.eng.srt 48KB
- Pre-Conference Interviews/BugCrowd - Speaker Interview - Source Boston 2019.eng.srt 38KB
- Pre-Conference Interviews/Jason Hoenich - Pre-Conference Interview.eng.srt 38KB
- Pre-Conference Interviews/Stacy Thayer - Pre-Conference Interview - SOURCE Austin.eng.srt 37KB
- Pre-Conference Interviews/Richard Stiennon - Speaker Interview - Source Boston 2019.eng.srt 35KB
- Pre-Conference Interviews/Richard Thieme - Speaker Interview - SOURCE Austin 2018.eng.srt 35KB
- Pre-Conference Interviews/Masha Sedova - SOURCE Boston Pre-Conference Interview.eng.srt 31KB
- Pre-Conference Interviews/Anand Srinivas - Speaker Interview - Source Boston 2019.eng.srt 31KB
- Pre-Conference Interviews/Interview With Security Innovations Joe Basirico - Security Innovation.eng.srt 31KB
- Pre-Conference Interviews/Thomas Fischer - SOURCE Boston Pre-Conference Interview.eng.srt 29KB
- Pre-Conference Interviews/Ming Fu - Pre-Conference Interview.eng.srt 29KB
- Pre-Conference Interviews/Megan Roddie - Pre-Conference Interview - SOURCE Austin.eng.srt 29KB
- Pre-Conference Interviews/Mike Murray - Pre-Conference Interview - SOURCE Austin.eng.srt 26KB
- Pre-Conference Interviews/Josh Bressers - Pre-Conference Interview - SOURCE Austin.eng.srt 26KB
- Source logo.jpg 24KB
- Pre-Conference Interviews/Caroline Wong - SOURCE Mesa Pre-Conference Interview.eng.srt 23KB
- Pre-Conference Interviews/Chris Cornutt - Speaker Interview - SOURCE Austin.eng.srt 22KB
- Pre-Conference Interviews/Paul Asadoorian - SOURCE Boston Pre-Conference Interview.eng.srt 22KB
- Pre-Conference Interviews/Walter Williams - Pre-Conference Interview.eng.srt 21KB
- Pre-Conference Interviews/Bob Adams - SOURCE Pre-Conference Interview.eng.srt 20KB
- Pre-Conference Interviews/Lester Godsey - SOURCE Mesa Interview.eng.srt 20KB
- Pre-Conference Interviews/Haydn Johnson.eng.srt 20KB
- Pre-Conference Interviews/Aaron Katz - Pre-Conference Interview.eng.srt 20KB
- Pre-Conference Interviews/Megan Roddie - SOURCE Mesa Pre-Conference Interview.eng.srt 19KB
- Pre-Conference Interviews/Georgia Weidman - SOURCE Boston Pre-Conference Interview.eng.srt 17KB
- Pre-Conference Interviews/Phillip Maddux - SOURCE Pre-Conference Interview.eng.srt 17KB
- Pre-Conference Interviews/Kevin Babcock - SOURCE Mesa Pre Conference Interview.eng.srt 17KB
- Pre-Conference Interviews/Harry Sverdlove - Speaker Interview - SOURCE Austin.eng.srt 17KB
- Pre-Conference Interviews/Roxy Dee - SOURCE Mesa 2018 Interview.eng.srt 16KB
- Pre-Conference Interviews/Izar Tarandach - Speaker Interview - Source Boston 2019.eng.srt 15KB
- Pre-Conference Interviews/Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.eng.srt 15KB
- Pre-Conference Interviews/Anurag Dwivedy - Pre-Conference Interview.eng.srt 15KB
- Pre-Conference Interviews/Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.eng.srt 15KB
- Pre-Conference Interviews/Garett Montgomery - Pre-Conference Interview - SOURCE Austin.eng.srt 14KB
- Pre-Conference Interviews/Brianne Hughes - SOURCE Pre-Conference Interviews.eng.srt 13KB
- Pre-Conference Interviews/Vince Warrington - Pre-Conference Interview - SOURCE Boston.eng.srt 13KB
- Pre-Conference Interviews/Personal Message From Our Executive Director.eng.srt 12KB
- Pre-Conference Interviews/Justine Bone - Pre-Conference Interview.eng.srt 9KB
- SOURCE thank you.txt 765B