We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B

Episodes

Total: 86

You’ve heard about Trustworthy Computing and you’ve seen some security improvements from Microsoft.

The OODA Loop theory was conceived by Col John Boyd, AF fighter pilot. He believed that a pilot in a

A fundamental of many SAN solutions is to use metadata to provide shared access to a SAN. This is tr

This topic will present a new web-app/DB pen-test tool. This tool supports both proxy (passive) mode

Imagine you’re visiting a popular website and invisible JavaScript exploit code steals your cookies,

This talk provides an overview of new RFID technologies used for dual-interface cards (credit cards,

Hardware-supported CPU virtualization extensions such as Intel's VT-x allow multiple operating syste

Hotpatching is a common technique for modifying the behavior of a closed source applications and ope

This presenation will offer a technical overview of the security engineering process behind Windows

How often have you encountered random-looking cookies or other data in a web application that didn‚t

There is an often overlooked security design flaw in many web applications today. Web applications o

Monkeyspaw is a unified, single-interface set of security-related website evaluation tools. Implemen

Ajax can mean different things to different people. To a user, Ajax means smooth web applications li

How could an attacker steal the phone numbers stored on your mobile, eavesdrop your conversations, s

In the past couple years there have been major advances in the field of rootkit technology, from Jam

Intrusion detection systems have come a long way since Ptacek and Newsham released their paper on el

TCP/IP is on the front lines in defending against network attacks, from intrusion attempts to denial

If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you

Assessing and analyzing storage networks are key to protecting sensitive data at rest; however, the

The VoIP Security Essentials presentation will introduce the audience to voice over IP (VoIP) techno