- published: 21 Mar 2012
- views: 127
- author: SecurityTubeCons2
40:31
Defcon17 - 0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securit...
published: 21 Mar 2012
author: SecurityTubeCons2
Defcon17 - 0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
Defcon17 - 0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net Defcon17 - 0-day, gh0stnet and the inside story of the Ad...- published: 21 Mar 2012
- views: 127
- author: SecurityTubeCons2
40:31
DEFCON 17: 0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
Speakers: Matt Richard Malicious Code Researcher, Raytheon Steven Adair Researcher, Shadow...
published: 15 Jan 2011
author: Christiaan008
DEFCON 17: 0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
DEFCON 17: 0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
Speakers: Matt Richard Malicious Code Researcher, Raytheon Steven Adair Researcher, Shadowserver This talk is the story of 0-day PDF attacks, the now famous ...- published: 15 Jan 2011
- views: 935
- author: Christiaan008
1:56
Xerox Copiers Change Numbers On Documents
Photocopiers made by Xerox are changing numbers on documents, a German computer scientist ...
published: 06 Aug 2013
Xerox Copiers Change Numbers On Documents
Xerox Copiers Change Numbers On Documents
Photocopiers made by Xerox are changing numbers on documents, a German computer scientist has discovered. David Kriesel found that copies he made of construction plans had altered room dimensions. Other users have replicated the problem, which has been blamed on faults with compression software used by several Xerox models. The company has not yet issued a fix for the problem, but it told the BBC it was preparing a statement. Mr Kriesel said he worried that numbers could be altered on invoices and other important documents. Shrinking room He questioned whether incorrect figures could leave a company liable to legal action. Niri Shan, a partner at London-based law firm Taylor Wessing, told the BBC it could raise interesting legal implications. "The person who provided the figures would be liable [for any issues]. Then the question would be, could they turn round to the photocopying company and say, 'Hold on a minute, this is your fault'? "Often in commercial contracts, the manufacturer may have limitations of liability on consequential loss." In his tests, Mr Kriesel found that often the number "6" would be turned into an "8", and vice versa, with other numbers being affected too. One room on his copied plans had its dimensions shrunk from 21.11m to 14.13m. Substitute figures He said the anomaly is caused by Jbig2, an image compression standard. Image compression is typically used in scanners and copiers to make file sizes of scans smaller. Jbig2 would substitute figures it thought were the same, meaning similar numbers were being wrongly swapped. Mr Kriesel said the two models affected were the Xerox Workcentre 7535 and 7556. However, since posting details of the fault online, several other users have come forward with problems on other machines.- published: 06 Aug 2013
- views: 3
0:33
ezPDF Reader PDF Annotate Download Full Version for Android No Torrents!
Compatible with Android Smartphones and Tablets, including Nexus 7. Please send us an emai...
published: 02 Oct 2012
author: paralleldesktop7free
ezPDF Reader PDF Annotate Download Full Version for Android No Torrents!
ezPDF Reader PDF Annotate Download Full Version for Android No Torrents!
Compatible with Android Smartphones and Tablets, including Nexus 7. Please send us an email for a TRIAL VERSION. Please leave your comments, reviews, bug rep...- published: 02 Oct 2012
- views: 331
- author: paralleldesktop7free
0:41
GdPicture v8.1.0.1 Full Download
Downlaod Full and Free 100% Click this Link http://full-soft-doownload1.blogspot.com/2011/...
published: 02 Sep 2011
author: dcoks3
GdPicture v8.1.0.1 Full Download
GdPicture v8.1.0.1 Full Download
Downlaod Full and Free 100% Click this Link http://full-soft-doownload1.blogspot.com/2011/08/gdpicture-v8101-full-download.html Full and Free Software Downlo...- published: 02 Sep 2011
- views: 314
- author: dcoks3
1:30
BoorkM
Bookr wird wohl jeder kennen, der sich eine Weile mit iRShell beschäftigt hat, dort ist da...
published: 24 Jun 2009
author: ThePspTester
BoorkM
BoorkM
Bookr wird wohl jeder kennen, der sich eine Weile mit iRShell beschäftigt hat, dort ist das Homebrew schon sehr lange standardmäßig integriert. Ein unbekannt...- published: 24 Jun 2009
- views: 214
- author: ThePspTester
49:00
DEF CON 17 - Matt Weir - Cracking 400000 Passwords
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Lit...
published: 20 Nov 2013
DEF CON 17 - Matt Weir - Cracking 400000 Passwords
DEF CON 17 - Matt Weir - Cracking 400000 Passwords
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High... Matt Weir PhD Student, Florida State University Professor Sudhir Aggarwal Florida State University Remember when phpbb.com was hacked in January and over 300,000 usernames and passwords were disclosed? Don't worry though, the hacker only tried to crack a third of them, (dealing with big password lists is a pain), and of those he/she only broke 24%. Of course the cracked password weren't very surprising. Yes, we already know people use "password123". What's interesting though is figuring out what the other 76% of the users were doing. In this talk I'll discuss some of my experiences cracking passwords, from dealing with large password lists, (89% of the phpbb.com list cracked so far), salted lists, (Web Hosting Talk), and individual passwords, (TrueCrypt is a pain). I'll also be releasing the tools and scripts I've developed along the way. Matt Weir is a PhD student at Florida State University who is specializing in password cracking research. Before his journey back into academia he worked as a network security engineer for Northrop Grumman. The projects he's been a part of have ranged from providing first responders with wireless access, to assisting the Defense Department with computer forensics. Why he decided to go back to school no one knows (including him sometimes). It wasn't the pay that's for sure! Sudhir Aggarwal has been Professor of Computer Science at Florida State University since the fall of 2002 where he directs the E-Crime Investigative Technologies Laboratory. Previous to his current position, he was Chief Technology Officer of the Internet Content Delivery and Distribution business unit of Lucent Technologies where he was responsible for the architecture, portfolio, and development of the Imminet product line. Dr. Aggarwal's current research interests are in building software tools and systems that support cybersecurity and digital forensics. He is also interested in computer and communication networks where he has investigated infrastructures for network games and techniques for building efficient overlay networks. For copies of the slides and additional materials please see the DEF CON 17 Archive here: https://defcon.org/html/links/dc-archives/dc-17-archive.html- published: 20 Nov 2013
- views: 61
66:12
Team Cornell and the 2007 Urban Challenge: Research, Results and Next Steps
Google Tech Talks January, 17 2008 ABSTRACT Team Cornell was one of six teams to complete ...
published: 19 Jan 2008
author: GoogleTechTalks
Team Cornell and the 2007 Urban Challenge: Research, Results and Next Steps
Team Cornell and the 2007 Urban Challenge: Research, Results and Next Steps
Google Tech Talks January, 17 2008 ABSTRACT Team Cornell was one of six teams to complete the 2007 DARPA Urban Challenge, completing over 55 miles of autonom...- published: 19 Jan 2008
- views: 10679
- author: GoogleTechTalks
0:53
PaperScan 1.5.5.1 Professional Edition Download
Downlaod Full and Free 100% Click this Link: http://www.full-software-downloads.info/2012/...
published: 07 Jun 2012
author: gimir2012
PaperScan 1.5.5.1 Professional Edition Download
PaperScan 1.5.5.1 Professional Edition Download
Downlaod Full and Free 100% Click this Link: http://www.full-software-downloads.info/2012/06/paperscan-1-5-5-1-professional-edition-download.html Free Wordpr...- published: 07 Jun 2012
- views: 248
- author: gimir2012
46:33
Defcon17 - Fragging Game Servers
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securit...
published: 21 Mar 2012
author: SecurityTubeCons2
Defcon17 - Fragging Game Servers
Defcon17 - Fragging Game Servers
This video is part of the Infosec Video Collection at SecurityTube.net: http://www.securitytube.net Defcon17 - Fragging Game Servers https://www.defcon.org/i...- published: 21 Mar 2012
- views: 84
- author: SecurityTubeCons2
51:59
Richard Thieme - Hacking Biohacking and the Future of Humanity
Richard Thieme - Hacking Biohacking and the Future of Humanity....
published: 14 May 2011
author: basic204
Richard Thieme - Hacking Biohacking and the Future of Humanity
Richard Thieme - Hacking Biohacking and the Future of Humanity
Richard Thieme - Hacking Biohacking and the Future of Humanity.- published: 14 May 2011
- views: 125
- author: basic204
2:07
Bond...James Bond Sky Fall International Spy Shop Cross Promotion TV Interview
Bond...James Bond Sky Fall International Spy Shop Cross Promotion TV Interview....
published: 14 Nov 2012
author: INTLSPYSHOP
Bond...James Bond Sky Fall International Spy Shop Cross Promotion TV Interview
Bond...James Bond Sky Fall International Spy Shop Cross Promotion TV Interview
Bond...James Bond Sky Fall International Spy Shop Cross Promotion TV Interview.- published: 14 Nov 2012
- views: 693
- author: INTLSPYSHOP
7:50
Ghost.net Three
The Retarded Oinky Unleashed....
published: 18 Jun 2010
author: baldkerrOnline
Ghost.net Three
Ghost.net Three
The Retarded Oinky Unleashed.- published: 18 Jun 2010
- views: 55
- author: baldkerrOnline
Youtube results:
39:20
Defcon 18 Max Kelly - Perspectives in Cybersecurity and Cyberwarfare
Defcon 18 Max Kelly - Perspectives in Cybersecurity and Cyberwarfare....
published: 06 May 2011
author: basic204
Defcon 18 Max Kelly - Perspectives in Cybersecurity and Cyberwarfare
Defcon 18 Max Kelly - Perspectives in Cybersecurity and Cyberwarfare
Defcon 18 Max Kelly - Perspectives in Cybersecurity and Cyberwarfare.- published: 06 May 2011
- views: 148
- author: basic204
40:31
Mark Ryan Del Moral Talabis - Dangerous Minds The Art of Guerrilla Data Mining
Mark Ryan Del Moral Talabis - Dangerous Minds The Art of Guerrilla Data Mining....
published: 13 May 2011
author: basic204
Mark Ryan Del Moral Talabis - Dangerous Minds The Art of Guerrilla Data Mining
Mark Ryan Del Moral Talabis - Dangerous Minds The Art of Guerrilla Data Mining
Mark Ryan Del Moral Talabis - Dangerous Minds The Art of Guerrilla Data Mining.- published: 13 May 2011
- views: 142
- author: basic204
43:10
Sean Taylor - Binary Obfuscation from the Top Down Obfuscating Executables Without Writing Assembly
Sean Taylor - Binary Obfuscation from the Top Down Obfuscating Executables Without Writing...
published: 14 May 2011
author: basic204
Sean Taylor - Binary Obfuscation from the Top Down Obfuscating Executables Without Writing Assembly
Sean Taylor - Binary Obfuscation from the Top Down Obfuscating Executables Without Writing Assembly
Sean Taylor - Binary Obfuscation from the Top Down Obfuscating Executables Without Writing Assembly.- published: 14 May 2011
- views: 72
- author: basic204