White Ball - TRONA (DJ)
Registration at Royale Registration Desk
Skytalks
Hello, My Name is /hostname/
Hacking, Biohacking, and the Future of Humanity
Managed Code Rootkits - Hooking into Runtime Environments
Down the Rabbit Hole: Uncovering a Criminal Server
Advanced SQL Injection
Scavenger Hunt
World of Warcraft Subversion
eXercise in Messaging and Presence Pwnage
Hacking Sleep: How to Build Your Very Own Sleep Lab
Win at Reversing: Tracing and Sandboxing through Inline Hooking
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
Hack The Textbook
Unmasking You
Good Vibrations: Hacking Motion Sickness on the Cheap
Dradis Framework - Sharing Information will get you Root
Who Invented the Proximity Card?
Wi-Fish Finder: Who Will Bite the Bait
Attacks Against 2wire Residential Gateways
Search And Seizure Explained - They Took My Laptop!
Your Mind: Legal Status, Rights and Securing Yourself
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
Lockpicking Forensics
Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
AAPL- Automated Analog Telephone Logging
Hackerspaces: The Legal Bases
Slight of Mind: Magic and Social Engineering
Screen Scraper Tricks: Extracting Data from Difficult Websites
RAID Recovery: Recover your PORN by Sight and Sound
30k Feet Look at WiFi
Robot Shark Laser! What Hackerspaces Do
Confidence Game Theater
Dangerous Minds: The Art of Guerrilla Data Mining
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
USB Attacks: Fun with Plug & 0wn
Introduction to WiMAX Hacking
Social Zombies: Your Friends Want to Eat Your Brains
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
The Psychology of Security Unusability
De Gustibus, or Hacking your Tastebuds
Closing Ceremonies hosted by The Dark Tangent