Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 2

Start here:
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1
 
 
Stearic acid, it turns out, is really an important component of this explosive, and if you use the wrong proportions, it will not work. This test video shows what happens if it is not enough in relation to aluminum - just an explosion and everything has flown apart. This is a complete failure. When the content of stearic acid is correct, it turns out that - the explosion on the video has a directional character and is similar to the launch of a rocket.
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 2 ...
+ 0 -

Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1

Hello, DEFCON! I'm going to break the tradition and this time to begin the performance a minute earlier, because I want to show you so many things that I'm afraid not to be in time. I'm sure that in this presentation there are many more explosive moments than in the whole history of presentations for 25 years of the existence of "Defcon".
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1  
 
This is not a solo project, I used many ideas from my friends. This presentation was inspired by the performances of Bruce Potter, who already spoke here, Shane Lawson and Diviant Ollam at the DefCon 19 conference. They told how they launched a data center in which ...
+ 0 -

DEFCON 23. "Recognition of a professional cyber-stalker". Ken Westin

My name is Ken Westin, I'll tell you what it means to be a professional cyberstalker (cyberstalking is the use of the Internet to search for a person, a group of people or an organization) .
 
 
DEFCON 23. "Recognition of a professional cyber-stalker". Ken Westin  
 
I'm the founder of the company GadgetTrak, in which I was a hacker and part-time general manager, and a developer of hardware that allows you to return stolen from people devaysy. I also created a search engine for searching EXIF ​​data in images.
 
Now I do not work for GadgetTrak and currently I am the current senior security analyst at Tripwire Inc., participate in many investigations, collect information ...
+ 0 -

Course MIT "Security of computer systems." Lecture 4: "Division of Privileges", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 4: "Separation of privileges", part 3

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 4: "Division of privileges", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 3: "Buffer overflow: exploits and protection", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 2: "Control of hacker attacks", part 1

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 2: "Control of hacker attacks", part 2

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -

Course MIT "Security of computer systems." Lecture 2: "Control of hacker attacks", part 3

Massachusetts Institute of Technology. The course of lectures # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014


 
Computer Systems Security is a course on developing and implementing secure computer systems. Lectures cover threat models, attacks that threaten security, and security techniques based on recent scientific work. Topics include operating system security (OS), capabilities, information flow management, language security, network protocols, hardware protection and security in web applications.
 
 
Lecture 1: "Introduction: threat models" ...[/h]
+ 0 -