Hardware Black Magic - Building devices with FPGAs
DEF CON 1 - A Personal Account
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
Jailbreaking and the Law of Reversing
0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
Hacking WITH the iPod Touch
Advancing Video Application Attacks with Video Interception, Recording, and Replay
Computer and Internet Security Law - A Year in Review 2008 - 2009
Why Tor is Slow, and What We're Doing About It
BitTorrent Hacks
Attacking Tor at the Application Layer
10,000¢ Hacker Pyramid
Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival
Personal Survival Preparedness
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community
FOE -- Feeding Controversial News to Censored Countries (Without Using Proxy Servers)
PLA Information Warfare Development Timeline and Nodal Analysis
MSF Telephony
"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks"
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
Managed Code Rootkits - Hooking into Runtime Environments
Win at Reversing: Tracing and Sandboxing through Inline Hooking
Dradis Framework - Sharing Information will get you Root
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
Screen Scraper Tricks: Extracting Data from Difficult Websites
Dangerous Minds: The Art of Guerrilla Data Mining
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…