From BruCON 2015
(→Schedule) |
Security4all (talk | contribs) |
||
Line 32: | Line 32: | ||
| height="26" | 9:00 | | height="26" | 9:00 | ||
| rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]] | | rowspan="2" | [[Presentations#Trusted_Cryptography | Trusted Cryptography]] | ||
− | | rowspan=" | + | | rowspan="4" | - |
| rowspan="4" | [[Workshops#Physical_locks_by_Toool | Lockpicking #1]] | | rowspan="4" | [[Workshops#Physical_locks_by_Toool | Lockpicking #1]] | ||
| rowspan="24" | [[Challenge | The Hex Factor]] | | rowspan="24" | [[Challenge | The Hex Factor]] | ||
Line 46: | Line 46: | ||
| height="129" | 10:00 | | height="129" | 10:00 | ||
| rowspan="2" | [[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]] | | rowspan="2" | [[Presentations#SQL_Injection_-_how_far_does_the_rabbit_hole_go.3F | SQL Injection - how far does the rabbit hole go?]] | ||
− | |||
| rowspan="2" | [[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)]] | | rowspan="2" | [[Presentations#.E2.80.9CI_am_walking_through_a_city_made_of_glass_and_I_have_a_bag_full_of_rocks.E2.80.9D_.28Dispelling_the_myths_and_discussing_the_facts_Global_Cyber-Warfare.29 | “I am walking through a city made of glass and I have a bag full of rocks” (Dispelling the myths and discussing the facts Global Cyber-Warfare)]] | ||
|- style="font-size:11pt" align="center" | |- style="font-size:11pt" align="center" | ||
| height="15" | 10:30 | | height="15" | 10:30 | ||
− | |||
|- style="font-size:11pt" align="center" | |- style="font-size:11pt" align="center" | ||
Line 143: | Line 141: | ||
| height="64" | 18:00 | | height="64" | 18:00 | ||
| rowspan="2" | [[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]] | | rowspan="2" | [[Presentations#Building_Hackerspaces_Everywhere | Building Hackerspaces Everywhere]] | ||
− | | rowspan="2" | [[Presentations# | + | | rowspan="2" | [[Presentations#The_Frogs_Who_Desired_A_King:_A_Virtualization_and_Cloud_Computing_Security_Fable_Set_To_Interpretive_Dance | The Frogs Who Desired A King: A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance ]] |
|- style="font-size:11pt" align="center" | |- style="font-size:11pt" align="center" |
Revision as of 14:00, 4 September 2009
- Wednesday 16/09 - Thursday 17/09: see Training
- Friday 18/09 - Saturday 19/09: Workshops + Presentations + Lightning Talks
Conference doors and registration will be open at 8:00 on Friday
Click here to see the complete Alphabetical list of speakers
Click here to see the complete Alphabetical list of presentations