We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B

Episodes

Total: 61

During the course of 2004 and 2005, we have responded to dozens of computer security incidents at so

NX. It's known by different names to different people. AMD calls it Enhanced Virus Protection, or EV

We needed a protocol that allowed us to tell a server that we are who we say we are, have it work ac

Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one

There are many circumstances under which we would like to run code we don't trust. This talk present

David Litchfield leads the world in the discovery and publication of computer security vulnerabiliti

The security of an organization is composed of technology, people and processes. In the last few yea

This talk describes architecture flaws of the Oracle's database encryption packages dbms_crypto and

Almost every possible method and technique regarding Windows exploitation has been discussed in dept

Fueled by business needs such as supply chain integration and outsourcing, modern enterprises must o

Input validation is an important part of security, but it's also one of the most annoying parts. Fal

A Honeypot is a information gathering system, designed for attackers to interact with. A honeynet, s

The use of phishing/cross-site scripting hybrid attacks for financial gain is spreading. It's impera

The Grugq has been at the forefront of forensic research for the last six years, during which he has

Most users treat a hardware solution as an inherently trusted black box. "If it's hardware, it must

This will be a practical and theoretical tutorial on legal issues related to computer security pract

Don't get caught. Building off of Foster's log manipulation and bypassing forensics session at Bl

Has your network ever been hacked, and all you have to show for your investigative efforts is an IP

This presentation shows new ways to attack Oracle Databases. It is focused on SQL injection vulnerab

In a refreshing different format, Foster cracks the audience with a twenty minute comedic dissertati