0
0.0
Dec 22, 2020
12/20
by
Transpondency
audio
eye 0
favorite 0
comment 0
No Description
Topics: Podcast, avantgarde, collage, dadaism, discordianism, hipster, indie, mashup, metaphysics, music,...
10
10.0
Apr 17, 2018
04/18
by
DEFCONConference
movies
eye 10
favorite 0
comment 0
You are on the inside of the perimeter. And maybe you want to exfiltrate data, download a tool, or execute commands on your command and control server (C2). Problem is - the first leg of connectivity to your C2 is denied. Your DNS and ICMP traffic is being monitored. Access to your cloud drives is restricted. You've implemented domain fronting for your C2 only to discover it is ranked low by the content proxy, which is only allowing access to a handful of business related websites on the...
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...
10
10.0
May 11, 2015
05/15
by
Xnet Xnet-x.net
movies
eye 10
favorite 0
comment 0
http://2011.fcforum.net/ http://fcforum.net/ http://whois--X.net http://oxcars11.whois--X.net @X_net_ @fcforum_net Source: https://www.youtube.com/watch?v=xAF4AKRr8-o Uploader: Xnet Xnet-x.net Upload date: 2011-11-27
Topics: spanishrevolution, noviembre, 2011, fcforum, X.net, Xnet, cultura libre, internet, 15M, #15M, DRY,...
15
15
May 11, 2015
05/15
by
Xnet Xnet-x.net
movies
eye 15
favorite 0
comment 0
http://2011.fcforum.net/ http://fcforum.net/ http://whois--X.net http://oxcars11.whois--X.net @X_net_ @fcforum_net Source: https://www.youtube.com/watch?v=ae1in_hqJWk Uploader: Xnet Xnet-x.net Upload date: 2011-11-27
Topics: spanishrevolution, noviembre, 2011, fcforum, X.net, Xnet, cultura libre, internet, 15M, #15M, DRY,...
6
6.0
May 11, 2015
05/15
by
Xnet Xnet-x.net
movies
eye 6
favorite 0
comment 0
http://2011.fcforum.net/ http://fcforum.net/ http://xnet-x.net http://oxcars11.xnet-x.net/ @X_net_ @fcforum_net Source: https://www.youtube.com/watch?v=L4EUNVMCyRs Uploader: Xnet Xnet-x.net Upload date: 2011-11-27
Topics: spanishrevolution, noviembre, 2011, fcforum, X.net, Xnet, cultura libre, internet, 15M, #15M, DRY,...
9
9.0
Jul 9, 2019
07/19
by
Hak5
movies
eye 9
favorite 0
comment 0
Darren joins Jason and Geo to learn about BarKode the tremendous support of the hacker community. Source: https://www.youtube.com/watch?v=QUFb65LvlcA Uploader: Hak5
Topics: Youtube, video, Entertainment, barkode, hackers, bloodkode, blood drive, pnh, defcon
4
4.0
Jul 9, 2019
07/19
by
Hak5
movies
eye 4
favorite 0
comment 0
Hackers for Charity at DEFCON 19 Source: https://www.youtube.com/watch?v=UqfLOW3sSSY Uploader: Hak5
Topics: Youtube, video, Entertainment, defcon, moxie, johnny long, hackers for charity, sslstrip, ssl,...
6
6.0
Apr 17, 2018
04/18
by
DEFCONConference
movies
eye 6
favorite 0
comment 0
The current consensus within the security industry is that high-assurance systems cannot tolerate the presence of compromised hardware components. In this talk, we challenge this perception and demonstrate how trusted, high-assurance hardware can be built from untrusted and potentially malicious components. The majority of IC vendors outsource the fabrication of their designs to facilities overseas, and rely on post-fabrication tests to weed out deficient chips. However, such tests are not...
Topics: Youtube, video, Science & Technology, DEF CON 2017, DEF CON 25, DEF CON, DC25, hackers,...
17
17
Jul 18, 2018
07/18
by
Channel2600
movies
eye 17
favorite 0
comment 0
Friday, July 22, 2016: 3:00 pm (Lamarr): Get the latest information about how the law is racing to catch up with technological change from staffers at the Electronic Frontier Foundation, the nation’s premiere digital civil liberties group fighting for freedom and privacy in the computer age. This session will include updates on current EFF issues such as surveillance online, encryption (and backdoors), and fighting efforts to use intellectual property claims to shut down free speech and halt...
Topics: Youtube, video, Science & Technology, hack, hacking, hacker, hackers, computer, telephone,...
Matthew Olsen, President, Business Development, IronNet Cybersecurity, Inc. Terrorist groups, like ISIS and al-Qaida, are looking to build their capabilities to carry out cyberattacks. What is the nature of this threat, how is it growing and how should we respond? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=kuN0Zdo9EHU Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, RSA Conference 2017, Critical Infrastructure, Threat...
5
5.0
Apr 17, 2018
04/18
by
DEFCONConference
movies
eye 5
favorite 0
comment 0
Tinder. The Final Frontier. Pick gorgeous (or not so gorgeous) members of your desired sex with the tip of your finger, at the comfort of your sofa, your bed, and let’s admit it - your toilet seat. Research shows that there are 50 million active users on Tinder, who check their accounts 11 times per day and spend an average of 90 minutes per day on the app. Even celebrities, it seems… Source: https://www.youtube.com/watch?v=d5eV36wR5Ew Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
14
14
Apr 18, 2018
04/18
by
DEFCONConference
movies
eye 14
favorite 0
comment 0
Data breaches have become all too common. Major security incidents typically occur at least once a month. With the rise of both security incidents and full data breaches, blue teams are often left scrambling to put out fires and defend themselves without enough information. This is something that can be changed with the right tools. Tools now available allow blue teams to weaponize data and use it to their advantage. This talk reviews frameworks for clean, consistent data collection and...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
0
0.0
Jul 6, 2020
07/20
by
Villeneuve, Michel, 1955-
texts
eye 0
favorite 0
comment 0
145 pages ; 19 cm
Topics: Hackers -- Juvenile fiction, High schools -- Juvenile fiction, Swindlers and swindling -- Juvenile...
8
8.0
Oct 24, 2018
10/18
by
DEFCONConference
movies
eye 8
favorite 0
comment 0
Source: https://www.youtube.com/watch?v=HCK0yeGQI-U Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON, DEFCON, DEF CON 26, DC26, computer...
11
11
Oct 23, 2017
10/17
by
DEFCONConference
movies
eye 11
favorite 0
comment 0
Source: https://www.youtube.com/watch?v=ImgaEqOQlSQ Uploader: DEFCONConference
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
------------------------------------------------------------------------------------------------------ #HITB2012KUL (OCT 10-11) REGISTRATION NOW OPEN http://conference.hitb.org/hitbsecconf2012kul/ ------------------------------------------------------------------------------------------------------ Presentation Materials: http://conference.hitb.org/hitbsecconf2012ams/materials/ After very successful "Hacking printers for fun and profit" series of talks, I have decided to continue the...
Topics: Youtube, video, Science & Technology, hitb, hitb2012ams, hitbsecconf, hackinthebox, hack in the...
8
8.0
Oct 16, 2017
10/17
by
HackersSecurity
movies
eye 8
favorite 0
comment 0
Invest in IT Startups with as little as 10$ (or bitcoin) and watch your money grow every second! Withdraw instantly every $1 or 0.01BTC! http://bit.ly/1bQdMOQ Source: https://www.youtube.com/watch?v=UwUz5I29hPY Uploader: HackersSecurity
Topics: Youtube, video, Science & Technology, blackhat usa, blackhat 2012, blackhat hacking, blackhat,...
11
11
Jul 18, 2018
07/18
by
Channel2600
movies
eye 11
favorite 0
comment 0
Friday, July 22, 2016: 10:00 pm (Noether): Twelve years have passed since Nicholas Merrill first began his lawsuit challenging the constitutionality of the USA PATRIOT Act and, specifically, the warrantless searches known as National Security Letters (NSLs). Now that he can tell the full story, what really happened? How much has actually changed because of the 12-year court case? If the government lost, why are NSLs still being issued at a rate of 50,000 per year? Who is doing anything about...
Topics: Youtube, video, Science & Technology, hack, hacking, hacker, hackers, computer, telephone,...
12
12
Apr 18, 2018
04/18
by
DEFCONConference
movies
eye 12
favorite 0
comment 0
High productivity, extreme attention to detail, logical/calculated, passionate, and hyper-focused. These are all characteristics considered valuable in the information security industry. However, a certain group of people who exceed expectations in these skill sets are constantly overlooked for job positions. That group of people is the High Functioning Autistic (HFA) community. Individuals in the high functioning autistic community are often overlooked for job positions due to their social...
Topics: Youtube, video, Science & Technology, DEF, CON, DEF CON 2017, DEF CON 25, DEF CON, DC25,...
7
7.0
Aug 3, 2019
08/19
by
Marco Rodrigues e Ted Meira
audio
eye 7
favorite 0
comment 0
Neste Programa levantamos algumas inquietações, Oque podemos tirar no caso dos supostos HACKERS? E porque há Dois Pesos, e duas Medidas nos casos analisados? E para quem interessa tais atuações desiguais.
Topics: Dois Pesos duas Medididas, Hackers
14
14
Mar 5, 2017
03/17
by
Sánguche
audio
eye 14
favorite 0
comment 0
Ábrete Sésamo con Aureliano Calvo sobre Virus informáticos y otras dudas sobre hackers.
Topics: Aureliano Calvo, Virus computadoras, Sánguche, FM La Tribu, Ábrete Sésamo, hackers
17
17
Dec 20, 2014
12/14
by
Keith Hughes
audio
eye 17
favorite 0
comment 0
Ramblings Episode 86 – UNCLE! I talk about Sony’s reaction to the North Korean cyber-terrorists and what it might mean for the future. #RoaUMP
Topics: ramblings, podcast, RoaUMP, Sony, movies, north Korea, terrorism, cyber, hackers
0
0.0
movies
eye 0
favorite 0
comment 0
Justice and Treasury Department officials announced indictments against nine Iranian hackers who, government officials said, schemed on behalf of Tehran and stole about 31 terabytes of data from 144 U.S. universities, 176 foreign universities, the United Nations and five U.S. government agencies. Sponsor: Department of Justice
Topics: Iranian Hackers Indicted, Television Program
Source: Comcast Cable
9
9.0
data
eye 9
favorite 0
comment 0
Topics: warcarchives, blogs, blogspot, pakistan, hackers, cyber
17
17
Sep 23, 2016
09/16
by
tubeup.py
movies
eye 17
favorite 0
comment 0
(52 mins) Nicholas Merrill -- Twelve years have passed since Nicholas Merrill first began his lawsuit challenging the constitutionality of the USA PATRIOT Act and, specifically, the warrantless searches known as National Security Letters (NSLs). Now that he can tell the full story, what really happened? How much has actually changed because of the 12-year court case? If the government lost, why are NSLs still being issued at a rate of 50,000 per year? Who is doing anything about this problem,...
Topics: HOPE XI, Hackers, HOPE conference, HOPE
21
21
Sep 22, 2016
09/16
by
tubeup.py
movies
eye 21
favorite 0
comment 0
(120 mins) TOOOL and friends -- There have been plenty of talks at HOPE teaching you to pick conventional locks. But what about non-conventional locks? This panel - which will require much audience participation - is all about unique and interesting locks. Have a weird lock or even a strange key and want to know more about it? Bring it to the stage! If you can stump our esteemed panel, you'll win a prize! Don't be shy... bring out your unique and strange lock hardware and, if you're really...
Topics: HOPE XI, Hackers, HOPE conference, HOPE
20
20
Sep 22, 2016
09/16
by
tubeup.py
movies
eye 20
favorite 0
comment 0
(48 mins) Weston Hecker -- Ransomware has been running rampant for the past six years and there has been very little done to stop infections aside from deprecated signature scans and classic malware scanners. This talk will unveil some proof of concepts that work on even the most current versions of the ransomware plaguing the networks of today, from a hacked USB device to a form of backup to making your physical machine look like a virtual machine which the malware ignores. Source:...
Topics: HOPE XI, Hackers, HOPE conference, HOPE
20
20
Sep 22, 2016
09/16
by
tubeup.py
movies
eye 20
favorite 0
comment 0
Benjamin Dean, Mariko Hirose -- A report on the new LinkNYC kiosks' origins, legislation, design, manufacture, installation, and operation, along with the civil liberties threat they pose and options we can implement to inhibit and avoid their spying capabilities. Source: http://livestream.com/internetsociety/hopeconf/videos/130816888 Uploader: tubeup.py Upload date: 2016-07-24
Topics: HOPE XI, Hackers, HOPE conference, HOPE
13
13
Sep 22, 2016
09/16
by
tubeup.py
movies
eye 13
favorite 0
comment 0
(52 mins) Gabriella "Biella" Coleman - Over the years, Biella has used many different words and phrases to describe Anonymous: hydra, trickster, confusing, enchanting, controversial, frustrating, unpredictable, stupid, and really stupid. But rarely has she ever argued seriously against the idea that Anonymous is tantamount to cyberterrorism. How did Anonymous avoid the title of cyberterrorists when they were perfectly positioned to earn it? Biella will discuss the reasons such as the...
Topics: HOPE XI, Hackers, HOPE conference, HOPE
27
27
Sep 23, 2016
09/16
by
tubeup.py
movies
eye 27
favorite 0
comment 0
(51 mins) Paul Kernfeld -- Managing a subversive digital library takes courage: Julian Assange is in exile and the founders of The Pirate Bay received prison sentences. How can we design a digital library without a central administrator to attack? To meet this challenge, we'll sneak data into the Bitcoin blockchain, permanently destroy bitcoins, and build a peer-to-peer network entirely out of browsers. If we do it right, we won't be able to take the library down even if we wanted to! Source:...
Topics: HOPE XI, Hackers, HOPE conference, HOPE
33
33
Jul 27, 2018
07/18
by
tubeup.py
movies
eye 33
favorite 0
comment 0
Jennifer Helsby The SecureDrop anonymous whistleblowing platform has become the journalism industry standard for communicating with anonymous sources and accepting high security leaks. The system was co-created by the late Aaron Swartz and first announced at HOPE four years ago. Each SecureDrop instance is physically hosted inside a news organization, and sources communicate with journalists by accessing a web application available over a Tor onion service....
Topics: HOPE XII, Hackers, HOPE conference, HOPE
16
16
Sep 22, 2016
09/16
by
tubeup.py
movies
eye 16
favorite 0
comment 0
(47 mins) Evan Koblentz -- Anyone can tell you something is true because they "researched" it. Evan will present some methods of performing historical research that stand up to challenges. Some of the methods are useful for social hacking, however the scope does not include any coding or technical subjects. Source: http://livestream.com/internetsociety2/hopeconf/videos/131656334 Uploader: tubeup.py Upload date: 2016-07-24
Topics: HOPE XI, Hackers, HOPE conference, HOPE
11
11
May 11, 2015
05/15
by
Xnet Xnet-x.net
movies
eye 11
favorite 0
comment 0
2011.fcforum.net/ fcforum.net/ whois--X.net oxcars11.whois--X.net @X_net_ @fcforum_net Source: https://www.youtube.com/watch?v=_PUdtHer99k Uploader: Xnet Xnet-x.net Upload date: 2011-11-27
Topics: spanishrevolution, noviembre, 2011, fcforum, X.net, Xnet, cultura libre, internet, 15M, #15M, DRY,...
Usenet newsgroups within "mail-list". Data donated by anonymous patron.
Topic: mail.annex,mail-list.freebsd-hackers,maus.computer.ql.c,maus.computer.software.compiler,microsoft...
1
1.0
Oct 15, 2020
10/20
by
Schumacher, Markus Verfasser
texts
eye 1
favorite 0
comment 0
XI, 301 S. 24 cm
Topics: Hackers, Computer security, Cracker Computerkriminalität, Hacker, Rechnernetz,...
37
37
Jan 30, 2018
01/18
by
Singh, Shangara, 1952-
texts
eye 37
favorite 2
comment 0
Includes index
Topics: Adobe Photoshop, Adobe Photoshop, Computer graphics, Hackers, Computer graphics, Hackers
STATUS REPORT by Aaron Swartz (Filed: 07/25/2012)
Topics: Aaron Swartz, JSTOR, MIT, Hackers
JOINT STATUS REPORT by Aaron Swartz. Modified docket text on 5/16/2012 (Filed: 05/16/2012)
Topics: Aaron Swartz, JSTOR, MIT, Hackers
28
28
Jan 1, 2021
01/21
by
Trollop Rullez
movies
eye 28
favorite 0
comment 0
AGENT19 WAS KNOWN BY HIS ENEMIES AS VARIABLE6. AGENT19 PUBLICLY ADMITTED TO BEING VARIABLE6. I’M NOT RESPONSIBLE FOR AGENT19 SAYING HE WAS THE CHANNEL VARIABLE6. THIS IS COMEDY. THIS IS MY ART. #montaqraph #0ctoberReignz #gangstalkers TROLLOP RULLEZ VIDEOS ARE NOW ARCHIVED FOR ETERNITY AT: https://archive.org/details/@trollop_rullez
Topics: #agent19, #caliberhitting, #cointelpro, #cucklife, #cyberbully, #daveacton, #dontbeupset,...
11
11
Jul 4, 2020
07/20
by
Scarrow, Alex
texts
eye 11
favorite 0
comment 0
437 pages ; 20 cm
Topics: Time travel -- Juvenile fiction, Hackers -- Juvenile fiction, Manuscripts, Medieval -- Juvenile...
17
17
Aug 8, 2020
08/20
by
Jan Lamprecht
movies
eye 17
favorite 0
comment 0
The last 5 months of 2020 feel like a year for me. So much has happened, and I've had to do so much. This is my first update since March. I discuss in depth the events of this year, behind the scenes. I explain in detail what happened with the malware on my websites. I was freaked out when they managed to modify software on my server and later my servers were hacked and my websites brought down. My databases were destroyed and a ransom note was left for me. A very freaky occurrence was when...
Topics: hackers, malware, jews, criminal, lawsuit, hacking, 2020, covid, crazy, difficult, tough, update,...
Lineup I. INTRODUCTION II. SUMMITRY: LONDON AND BEYOND *Robert Kaiserm Washington Post deputy managing editor & author, Why Gorbachev Happened *Jeffrey Sachs, International economic consultant, New York III. MIAs: THE CONTROVERSY AND THE CULTURE *Clara Bingham, NEWSWEEK Washington Correspondent *Monica Stevenson, co-author (with William Stevenson) of Kiss the Boys Goodbye (in Thailand), *Sedgwick Tourison, former Acting Chief of Analysis, Special Office of POW and MIA Affairs, Defense...
Topics: Newsweek on Air, World Summit, MIA, Middle East, bank mergers, outlaw hackers
Source: Revox B215 Cassette Tape Deck>Lenovo B50 Touch Laptop
0
0.0
Aug 2, 2016
08/16
by
Funny or Die
movies
eye 0
favorite 0
comment 0
Hemp Beach TV Episode 16 "Force Unleashed, Hackers & California Laws" Hi-res version @ HempBeach . tv , with Mason Sharrow ,Freshman McFresh, Michael Perrelli & Sidney. Your weekly dose of 420 news and entertainment. Please leave your honest opinion, comments, questions or concerns so we may tweak the show for your future enjoyment!
Topics: Funny or Die Video Archive, Beach TV, California, Episode 16, Force Unleashed, Hackers, Hemp, Laws,...
47
47
Sep 23, 2016
09/16
by
tubeup.py
movies
eye 47
favorite 0
comment 0
(47 mins) Gareth Llewellyn -- Following the Snowden revelations and with the U.K. government's revival of the Snooper's Charter legislation, Gareth was one of many people who accepted the EFF Tor challenge. Unfortunately, many U.K. ISPs' colocation providers do not appreciate Tor exits and, after several abruptly terminated servers, he decided to build his own privacy centric, non-profit ISP so he could operate Tor exits and offer Unix shells, etc. on his own terms. This talk explores the...
Topics: HOPE XI, Hackers, HOPE conference, HOPE
159
159
Oct 1, 2010
10/10
by
media monarchy
movies
eye 159
favorite 0
comment 0
fbi raids, cyber storm iii, phoney farmer's markets Welcome back to the New World Next Week - the video series from CorbettReport.com & MediaMonarchy.com . This week: Story #1: FBI Raids on Antiwar Activists - Intimidation, Not Investigation Related: The Mysterious Institute That Spied on Activists Story #2: 'Cyber Storm III' Tests US on Cyber Attack UnRelated: Stuxnet, Iran Computer Attack, Linked To Wealthy Group Or Nation Story #3: Pacific Northwest Grocery Stores Setting Up Fake Farmers...
Topics: alternative news, corbett report, cyber/space\war, drills, food world order, hackers, iran, media...
33
33
Jul 27, 2018
07/18
by
tubeup.py
movies
eye 33
favorite 0
comment 0
Kurt Opsahl, Vivian Brown, Bill Budington, Sydney Li, Cooper Quintin Get the latest information about how the law is racing to catch up with technological change from staffers at the Electronic Frontier Foundation, the nation’s premiere digital civil liberties group fighting for freedom and privacy in the computer age. This session will include updates on current EFF issues, such as the government’s effort to undermine encryption (and add backdoors), the fight for network neutrality,...
Topics: HOPE XII, Hackers, HOPE conference, HOPE
257
257
audio
eye 257
favorite 0
comment 0
This week Matt is all by his lonesome as he talks about the Phil Fish Saga, Xbox One headsets, Chinese hackers, palm readings, sharks in odd places, and much more!
Topics: Phil Fish, Fez 2, China, Hackers, Games, Gaming, Technology, Comedy, Podcast, 3 Hit Combo Podcast,...
14
14
Jul 18, 2018
07/18
by
Channel2600
movies
eye 14
favorite 0
comment 0
Saturday, July 23, 2016: 5:00 pm (Friedman): Managing a subversive digital library takes courage: Julian Assange is in exile and the founders of The Pirate Bay received prison sentences. How can we design a digital library without a central administrator to attack? To meet this challenge, we’ll sneak data into the Bitcoin blockchain, permanently destroy bitcoins, and build a peer-to-peer network entirely out of browsers. If we do it right, we won’t be able to take the library down even if...
Topics: Youtube, video, Science & Technology, hack, hacking, hacker, hackers, computer, telephone,...
12
12
Aug 24, 2020
08/20
by
Hackers
audio
eye 12
favorite 0
comment 0
Show #140 - 8.22.2020 - Latest headlines - What happens when you create a worm and release it. Live from Florida This is show 140
Topics: Computer Worm, Hackers, Virus, Podcast
13
13
Sep 23, 2016
09/16
by
tubeup.py
movies
eye 13
favorite 0
comment 0
(44 mins) XioNYC -- In a GUI-dominated cyberspace, the blind user is prey. When a UX change can mean the difference between productivity and disenfranchisement, when an interstitial scareware alert is indistinguishable from a legitimate error dialog, and when security cannot be established because accessibility is left to the aftermarket, the frustrating onus upon a non-visual user exceeds the empowerment the sighted user takes for granted. This talk will shed light on some of these invisible...
Topics: HOPE XI, Hackers, HOPE conference, HOPE