Torrent Info
Title SOURCE
Category
Size 14.42GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
10-04-SOURCE-DetectingPenTesters.pptx 3.86MB
400 Apps in 40 Days.mp4 54.62MB
Aaron Katz - Pre-Conference Interview.eng.srt 19.86KB
Aaron Katz - Pre-Conference Interview.mp4 10.78MB
A Brief History of Physical Security.mp4 39.76MB
Achievement Unlocked - Designing a compelling security awareness program.mp4 42.04MB
Adam Meyers - Reverse Engineering Broken Arrows.mp4 53.39MB
Adam Meyers - Security Sucks.mp4 59.79MB
Adobe_SOURCEBoston.pptx 1.48MB
Advanced Linux Firewalls.mp4 54.82MB
Advanced SQL Injection with SQLol - The Configurable SQLi Testbed.mp4 43.48MB
Adversarial Resilience at the Planetary Scale.mp4 44.44MB
Allison Miller - Protecting Customers from Online Threats.mp4 65.00MB
All That Cybers Is Not War - SOURCE Security Conference Boston 2015.eng.srt 146.70KB
All That Cybers Is Not War - SOURCE Security Conference Boston 2015.mp4 125.78MB
All the Data That s Fit to Visualize.mp4 46.15MB
Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.eng.srt 14.79KB
Amirali Sanatinia - SOURCE Mesa Pre-Conference Interview.mp4 12.03MB
Analysis of The BroBot DDOS Attack.mp4 50.77MB
Analyzing the Chemistry of Data.mp4 46.13MB
Anand Srinivas - Speaker Interview - Source Boston 2019.eng.srt 30.88KB
Anand Srinivas - Speaker Interview - Source Boston 2019.mp4 17.10MB
Andrea Little Limbago - Speaker Interview - Source Boston 2019.mp4 7.16MB
Android Modding for the Security Practitioner.mp4 42.55MB
Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.eng.srt 75.97KB
Andy Ellis - Cognitive Injection - SOURCE Security Conference Boston 2015.mp4 58.77MB
Andy Purdy - Keynote.mp4 92.48MB
Anti-Debugging - A Developer s Viewpoint.mp4 58.70MB
Anti-Virus Product Testing Sessions.mp4 75.69MB
Anurag Dwivedy - Pre-Conference Interview.eng.srt 14.89KB
Anurag Dwivedy - Pre-Conference Interview.mp4 13.25MB
Applied Threat Modeling - Live.mp4 65.72MB
Aqua Vitae The Water of Life - Martin McKeay - SOURCE Dublin 2015.mp4 59.73MB
A Security Metric for Software Developer.mp4 38.98MB
Attacking Cloud Services with Source Code.mp4 46.30MB
Attacking Cloud Services with Source Code (2).mp4 46.01MB
Attacking Layer 8 - Client Side Penetration Testing.mp4 45.85MB
Automated Structural Malware Classification.mp4 58.65MB
A Virtualization and Cloud Computing Security Fable Set To Interpretive Dance.mp4 73.79MB
Avoiding Android App Security Pitfalls.mp4 43.78MB
Balancing the Pwn Trade Deficit.mp4 47.28MB
Banking on education - A case study on security training programs.mp4 62.35MB
Behind The Scenes - Pwning Satellite Cable TV.mp4 39.95MB
Big Data Big Liability.mp4 40.75MB
BillBlunden.pdf 2.22MB
Bill Blunden - An Uninvited Guest.mp4 81.64MB
Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques.mp4 47.85MB
Blitzing with your Defense.mp4 52.46MB
Bob Adams - SOURCE Pre-Conference Interview.eng.srt 20.46KB
Bob Adams - SOURCE Pre-Conference Interview.mp4 13.19MB
Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.eng.srt 118.21KB
Bob Rudis - Before and Beyond the Breach New Research in the 2015 DBIR.mp4 51.01MB
Brian Holyfield - Cracking the Foundation.mp4 66.36MB
Brianne Hughes - SOURCE Pre-Conference Interviews.eng.srt 13.37KB
Brianne Hughes - SOURCE Pre-Conference Interviews.mp4 10.77MB
Bring Your Own Device - Keeping it Simple and Effective.mp4 52.10MB
Broken Arrows Source.pdf 1.92MB
Browser Extensions - The Backdoor To Stealth Malware.mp4 54.11MB
Brueggemann.pptx 1.13MB
BugCrowd - Speaker Interview - Source Boston 2019.eng.srt 37.79KB
BugCrowd - Speaker Interview - Source Boston 2019.mp4 18.31MB
Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.eng.srt 73.74KB
Bugged Files Is Your Document Telling on You - Daniel Crowley and Damon Smith.mp4 44.53MB
Building Bridges - Forcing Hackers and Business to - Hug it Out.mp4 43.35MB
Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4 53.18MB
Building Your Own Packet Capture Platform.mp4 59.77MB
Business Logic Flaws.mp4 50.11MB
BYOD - The Risks, Rewards and Challenges.mp4 36.68MB
Carders.cc, the Rise and Fall of an Underground Forum.mp4 56.72MB
Career Management Workshop (part 1).mp4 81.89MB
Career Management Workshop (part 2).mp4 96.13MB
carmen.pdf 3.69MB
Carole Fennelly - Vulnerability Management Panel.mp4 62.93MB
Caroline Wong - SOURCE Mesa Pre-Conference Interview.eng.srt 23.23KB
Caroline Wong - SOURCE Mesa Pre-Conference Interview.mp4 21.61MB
Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.eng.srt 56.46KB
Catherine Pearce - Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols.mp4 58.81MB
Celebrating Bad Crypto.mp4 43.15MB
CEO Panel.mp4 44.52MB
Chasing Uniqueness, Understanding Normal - Neil King - SOURCE Dublin 2015.mp4 62.92MB
Chris Clark and Townsend Ladd Harris - Attacking WebOS.mp4 71.25MB
Chris Cornutt - Speaker Interview - SOURCE Austin.eng.srt 22.14KB
Chris Cornutt - Speaker Interview - SOURCE Austin.mp4 11.00MB
Chris Hoff - Cloudiforniturtles.mp4 69.84MB
Chris Romeo - SOURCE Mesa- Phoenix Conference Speaker.mp4 20.29MB
Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.eng.srt 63.58KB
Chris Wysopal - We See The Future And Its Not Pretty - SOURCE Security Conference.mp4 50.61MB
ColdFusion for Penetration Testers.mp4 35.62MB
Colin Ames - Neurosurgery With Meterpreter.mp4 43.86MB
Content Awareness - A Cornerstone to Data Prote.mp4 53.49MB
Covering your - aaS - Cloud Security Case Studies for SaaS, PaaS, and IaaS.mp4 39.71MB
Criticality, Rejectionists, Risk Tolerance - Keynote at Source Boston 2012.mp4 44.89MB
Cyber[Crime War] - Connecting the Dots.mp4 52.44MB
Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.eng.srt 50.98KB
Dakota Nelson - Monitoring Social Media in 5 Minutes a Week - SOURCE Security Conference.mp4 32.82MB
Dan Cornell - Pre-Conference Interview - SOURCE Austin.mp4 12.42MB
Dan Crowley - Windows File Pseudonyms.mp4 54.63MB
DanK.pptx 765.16KB
Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.eng.srt 47.70KB
Dan Lambright - Penetration Testing in the Cloud - SOURCE Security Conference.mp4 36.14MB
Data Breach - Let The Finger Pointing Begin.mp4 57.85MB
David Mortman - Too Many Cooks Spoil the Broth.mp4 65.05MB
De-constructing the Cost of a Data Breach.mp4 36.10MB
Deidre Diamond - Pre- conference Interview.mp4 15.81MB
Deperimetrisation - Dream Or Nightmare For Network Security.mp4 71.81MB
Detailed Thread Modeling.mp4 56.99MB
Developing an Incident Response Plan.mp4 62.05MB
Deviant Ollam - The Four Types of Locks.mp4 81.54MB
Dino.pdf 1.71MB
Dino Dai Zovi - Practical Return-Oriented Programming.mp4 77.39MB
Disruptive Innovation and the Future of Security.mp4 61.95MB
Dissecting Foreign Web Attacks.mp4 51.15MB
Distributed Security - Expanding the Toolkit for Institutional Resilience.mp4 54.19MB
Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.eng.srt 84.88KB
Doug Wilson and Thomas Millar - Cyber Information Sharing a Means not an End.mp4 56.55MB
Dov Yoran and Chris Hoff - Cloud Security.mp4 61.15MB
Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.eng.srt 87.03KB
Dr. David Rees & Karthik Raman - Why Developers And Vulnerability Researchers Should Collaborate.mp4 45.31MB
Employing PCI Compliance Programs.mp4 54.45MB
Encryption and Enterprise Data Security.mp4 55.75MB
Entrepreneur Panel.mp4 60.31MB
Erez Metula - Managed Code Rootkits.mp4 58.06MB
ERP Security - Myths, Problems, Solutions.mp4 71.05MB
Establishing a Security Metrics Program.mp4 49.03MB
Exploiting Unicode-enable Software.mp4 49.71MB
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics).mp4 54.09MB
Finding the Weak Link in Windows Binaries.mp4 36.20MB
From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.eng.srt 75.83KB
From Tech to Exec - Panel - SOURCE Security Conference Boston 2015.mp4 58.87MB
From The Garage To NASDAQ With Open Source - The Sourcefire Experience.mp4 63.50MB
Games We Play - Defenses and Disincentives.mp4 56.75MB
Games We Play - Payoffs & Chaos Monkeys.mp4 37.55MB
Garett Montgomery - Pre-Conference Interview - SOURCE Austin.eng.srt 13.72KB
Garett Montgomery - Pre-Conference Interview - SOURCE Austin.mp4 7.23MB
Georgia Weidman - SOURCE Boston Pre-Conference Interview.eng.srt 17.26KB
Georgia Weidman - SOURCE Boston Pre-Conference Interview.mp4 13.05MB
Get Rich or Die Trying - - Making Money on the Web the Black Hat Way.mp4 56.04MB
Growing Up A Maturity Model and Roadmap for Vulnerability Management.eng.srt 53.50KB
Growing Up A Maturity Model and Roadmap for Vulnerability Management.mp4 48.99MB
Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.eng.srt 65.11KB
Guillaume Ross - iOS App Analytics VS Privacy An analysis of the use of analytics.mp4 33.58MB
Hacking Back - is a Bad Idea.mp4 33.96MB
Hacking SAP BusinessObjects.mp4 30.36MB
Harry Sverdlove - Speaker Interview - SOURCE Austin.eng.srt 16.89KB
Harry Sverdlove - Speaker Interview - SOURCE Austin.mp4 7.61MB
Having a Defined Target for Software Security Testing.mp4 43.10MB
Haydn Johnson.eng.srt 19.88KB
Haydn Johnson.mp4 17.21MB
HDKeynote.pdf 5.07MB
HD Moore - Keynote.mp4 70.35MB
HD Moore - Making Penetration Testing Mainstream.mp4 84.69MB
Hiring Recruitment.mp4 85.25MB
Horseless Carriage Exploits and Eavesdropping Defenses.mp4 106.73MB
How Compliance Can Get You Killed.mp4 57.64MB
How Microsoft Fixes Security Vulnerabilities.mp4 57.53MB
How to Respond to an Unexpected Security Incident - A Reality Check.mp4 44.79MB
I Can Haz Privacy.mp4 49.98MB
If Black Hats always win, why is Albert Gonzalez in prison.mp4 47.71MB
Implementing a CSIRT - Lessons Learnt from Setting Up the Irish CERT.mp4 84.21MB
Information Operations.mp4 44.92MB
Information Security in Higher Education - Baby Steps.mp4 54.43MB
Insider Threat - Hunting for Authorized Evil.mp4 51.74MB
Inside the Black Hole Exploit Kit (BHEK).mp4 51.38MB
Inside the Duqu Command and Control Servers,.mp4 47.94MB
Interview With Security Innovations Joe Basirico - Security Innovation.eng.srt 30.65KB
Interview With Security Innovations Joe Basirico - Security Innovation.mp4 38.77MB
Introducing Heyoka - DNS Tunneling 2.0.mp4 48.32MB
Investigation Techniques for Social Networking Sites.mp4 58.15MB
iSEC_Securely_Moving_Into_The_Cloud.pdf 633.64KB
It isn’t all foggy in the Cloud Digital Forensic Investigations in the Cloud Environment.mp4 52.72MB
Izar Tarandach - Speaker Interview - Source Boston 2019.eng.srt 15.06KB
Izar Tarandach - Speaker Interview - Source Boston 2019.mp4 8.69MB
Jackpotting Automated Teller Machines.mp4 84.48MB
Jake Appelbaum - Anonymity, Privacy, and Cirvumvention with Tor.mp4 87.84MB
Jared Carlson - A Swift Teardown - SOURCE Security Conference Boston 2015.mp4 30.72MB
Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.eng.srt 105.06KB
Jason Bubolz & Rachel Engel - Unified Communications Information Loss Through the Front Door.mp4 53.83MB
Jason Hoenich - Pre-Conference Interview.eng.srt 37.56KB
Jason Hoenich - Pre-Conference Interview.mp4 24.71MB
Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.eng.srt 62.89KB
Jason Syversen - Quantifying cyber attacks to optimize and assess your defense.mp4 49.98MB
JavaScript Pitfalls.mp4 54.77MB
Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.eng.srt 135.12KB
Jen Ellis - Hacking the Media for Fame and Profit - SOURCE Security Conference Boston 2015.mp4 75.80MB
Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.eng.srt 53.54KB
Jeremiah O’Connor - Using NLP to detect phishing and APT CnC domains.mp4 45.34MB
Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt 85.82KB
Jim Routh - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 78.61MB
Joe Gray - SOURCE Pre-Conference Interview.mp4 19.18MB
Joel Scambray NCC Group - SOURCE Mesa Interview.mp4 10.79MB
John Cran - Realities of Starting a Security Company - Entrepreneurs Panel.mp4 68.73MB
Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.eng.srt 47.75KB
Jonathan Cran - Pwnie Express presents Practical MitM Pentesting - SOURCE Security Conference.mp4 41.53MB
Jon Oberheide - Linux Kernel Exploitation.mp4 37.16MB
Josh Bressers - Pre-Conference Interview - SOURCE Austin.eng.srt 25.72KB
Josh Bressers - Pre-Conference Interview - SOURCE Austin.mp4 11.52MB
Josh Corman - Realities of Starting a Security Company - Investors Panel.mp4 76.15MB
Josh Corman - Rugged Software.mp4 67.82MB
Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.eng.srt 62.75KB
Josh Pyorre - Protecting your cloud server with a cloud IDS - SOURCE Security Conference.mp4 55.92MB
Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.eng.srt 87.39KB
Julien Sobrier - Browser Extensions The Backdoor To Stealth Malware - SOURCE Security Conference.mp4 48.66MB
Just Another Day at the Office... September 11, 2001, The White House.mp4 39.75MB
Justine Bone - Pre-Conference Interview.eng.srt 9.12KB
Justine Bone - Pre-Conference Interview.mp4 16.71MB
Katy Anton - Speaker Interview - Source Boston 2019.mp4 12.54MB
Kevin Babcock - SOURCE Mesa Pre Conference Interview.eng.srt 17.13KB
Kevin Babcock - SOURCE Mesa Pre Conference Interview.mp4 12.49MB
Keynote - Andy Ellis.mp4 63.20MB
Keynote - Dan Geer.mp4 46.84MB
Keynote - Dan Geer & Richard Thieme.mp4 54.85MB
Keynote - Gene Kim.mp4 35.80MB
Keynote Speaker - Richard Clarke.mp4 39.52MB
Keynote - Steven Levy.mp4 48.67MB
L0phtCrack 6 Release.mp4 51.22MB
L0pht Panel.mp4 61.29MB
Lenny Zeltser - Knock Knock.mp4 60.33MB
Lessons Of Binary Analysis.mp4 108.16MB
Lessons Of Static Binary Analysis.mp4 52.47MB
Lessons of the Kobayashi Maru - If You re Not Cheating, You re Not Trying.mp4 38.57MB
Lester Godsey - SOURCE Mesa Interview.eng.srt 19.90KB
Lester Godsey - SOURCE Mesa Interview.mp4 11.45MB
Leveraging Collective Intelligence To Combat Cyber Crime.mp4 81.41MB
Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.eng.srt 159.22KB
Leveraging Collective Intelligence To Combat Cyber Crime - PANEL - SOURCE Security Conference.mp4 88.71MB
Leveraging Social Networking While Mitigating Risk.mp4 38.33MB
Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.eng.srt 56.46KB
Maddi Wallach - Excavating for Empathy - SOURCE Security Conference Boston 2015.mp4 86.80MB
Managed Code Rootkits - Erez Metula.ppt 2.34MB
Managing Your Career in Infosec.mp4 59.38MB
Mapping And Evolution Of Android Permissions.mp4 42.25MB
Marcus Carey - Speaker Interview - SOURCE Austin.mp4 6.02MB
Marcus Ranum Keynote.mp4 62.09MB
Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.eng.srt 72.17KB
Mark Ostrowski and Steven Baker - Evolution of Threat - SOURCE Security Conference.mp4 44.71MB
Mary Ann Davidson - Keynote.mp4 77.10MB
Masha Sedova - SOURCE Boston Pre-Conference Interview.eng.srt 31.21KB
Masha Sedova - SOURCE Boston Pre-Conference Interview.mp4 24.24MB
Massachusetts Data Breach Laws, Regulations, and Responsibilities.mp4 32.16MB
Master Class InfoSec Train the Trainer.mp4 6.48MB
Matthew Cheung - SOURCE Pre-Conference Interview.mp4 10.50MB
Matt Wood - Reactive JS Security Testing - Exploitation - SOURCE Security Conference.mp4 57.55MB
Maximizing ROI on Vulnerability Management.mp4 45.00MB
Media Hype in the Information Security Industry.mp4 35.28MB
Megan Roddie - Pre-Conference Interview - SOURCE Austin.eng.srt 28.59KB
Megan Roddie - Pre-Conference Interview - SOURCE Austin.mp4 15.64MB
Megan Roddie - SOURCE Mesa Pre-Conference Interview.eng.srt 18.68KB
Megan Roddie - SOURCE Mesa Pre-Conference Interview.mp4 18.21MB
Michael Borohovski - Speaker Interview - SOURCE Austin.mp4 11.68MB
Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.eng.srt 93.62KB
Michael Roytman - Who Watches the Watchers Metrics for Security Strategy.mp4 49.97MB
Microsoft s Response Process - 10 Years of Hard Knock Learning.mp4 54.98MB
Mike Kershaw - Wifi Security.mp4 59.82MB
Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt 85.33KB
Mike Murray - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 53.35MB
Mike Murray - Pre-Conference Interview - SOURCE Austin.eng.srt 26.49KB
Mike Murray - Pre-Conference Interview - SOURCE Austin.mp4 12.74MB
Ming Fu - Pre-Conference Interview.eng.srt 28.87KB
Ming Fu - Pre-Conference Interview.mp4 25.53MB
Mobile Snitch - Devices telling the world about you.mp4 37.78MB
MonkeyBerries-SourceBoston-2010.pdf 1.54MB
Moxie.pdf 4.32MB
Moxie Marlinspike - Changing Threats to Privacy.mp4 86.88MB
Nathan Cooprider - SOURCE Mesa Pre-Conference Interview.mp4 18.96MB
No one is coming. We are the Cavalry - Claus Haumann - SOURCE Dublin 2015.mp4 88.18MB
Not Dead But Twitching - Anti-Virus Succumbs to the Scourge of Modern Malware.mp4 58.88MB
No Victims - How to Measure & Communicate Risk.mp4 48.60MB
NSSLabs - SourceBoston.ppt 2.10MB
NT Object (In)Security.pdf 599.30KB
Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.eng.srt 86.29KB
Ofer Shezaf - RESTful Services, The Web Security Blind Spot - SOURCE Security Conference.mp4 53.85MB
Panel Discussion - 2009 And Beyond.mp4 55.92MB
Panel Discussion - The tug-o-war between business and security.mp4 50.59MB
Panel - The Partial Disclosure Dilemma.mp4 96.92MB
Passwords in Corporate Networks.mp4 62.81MB
Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.eng.srt 72.50KB
Paul Asadoorian - Embedded Insecurity Can We Fix The Internet of Evil Things.mp4 55.63MB
Paul Asadoorian - Embedded System Hacking.mp4 73.80MB
Paul Asadoorian - SOURCE Boston Pre-Conference Interview.eng.srt 21.87KB
Paul Asadoorian - SOURCE Boston Pre-Conference Interview.mp4 17.53MB
PCI-right_wrong_2010-04-22.pdf 1.08MB
Personal Message From Our Executive Director.eng.srt 11.77KB
Personal Message From Our Executive Director.mp4 6.31MB
Perspectives of How to Develop a Winning Career in Infosec.mp4 36.01MB
Peter Kuper - Keynote.mp4 53.97MB
Phillip Maddux - SOURCE Pre-Conference Interview.eng.srt 17.19KB
Phillip Maddux - SOURCE Pre-Conference Interview.mp4 14.34MB
PLC SCADA Vulnerabilities in Correctional Facilities.mp4 53.18MB
Practical Exploitation of Embedded Systems.mp4 49.79MB
Privacy at the Border - A Guide for Traveling with Devices.mp4 54.20MB
Proactive Defense.mp4 44.23MB
Protecting sensitive information on iOS devices.mp4 51.00MB
Protecting Vulnerable Web Applications With IIS7.mp4 58.88MB
Pwnie Express presents Practical MitM Pentesting.mp4 44.55MB
Rafal Los and Matt Wood - Into the Rabbit Hole.mp4 84.83MB
Rafal Los - SOURCE Mesa Speaker Interview.mp4 29.61MB
Randolph Barr - Gain Comfort in Losing Control to the Cloud.mp4 58.39MB
RandyBarr.pptx 1.71MB
RESTful Services, The Web Security Blind Spot.mp4 48.77MB
Reverse Engineering Mobile Applications.mp4 49.29MB
Revolution or Evolution - Information Security 2020.mp4 35.08MB
Richard Stiennon - Speaker Interview - Source Boston 2019.eng.srt 35.33KB
Richard Stiennon - Speaker Interview - Source Boston 2019.mp4 31.87MB
Richard Thieme - Speaker Interview - SOURCE Austin 2018.eng.srt 34.59KB
Richard Thieme - Speaker Interview - SOURCE Austin 2018.mp4 19.71MB
Rich Mogull - Involuntary Case Studies in Data Breaches.mp4 89.54MB
Riley Hassell - NT Object Insecurity.mp4 57.04MB
Rise In ATM Compromises.mp4 44.88MB
Robert Clark.ppt 315.00KB
Robert Clark - Legal Aspects of Computer Network Security and Privacy.mp4 75.00MB
Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.eng.srt 97.21KB
Robert Lee - The Interim Years Of Cyberspace Security In A Domain Of Warfare.mp4 43.50MB
Robert Sell - SOURCE Mesa Pre-Conference Interview.mp4 16.60MB
Rocio Baeza - SOURCE Mesa Speaker Interview.mp4 17.43MB
Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.eng.srt 58.45KB
Rodrigo Montoro - Scoring PDF Structure To Detect Malicious Files - SOURCE Security Conference.mp4 37.14MB
Ron Gula - Detecting Penetration Testing.mp4 62.46MB
Roxy Dee - SOURCE Mesa 2018 Interview.eng.srt 15.88KB
Roxy Dee - SOURCE Mesa 2018 Interview.mp4 10.35MB
Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.eng.srt 67.52KB
Roy Wattanasin - Improving the State of Healthcare Information Security as a Security Investigator.mp4 44.73MB
Rugged Software Development_20100311(2).pdf 7.49MB
Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.eng.srt 58.67KB
Salvador Grec - Defending the Enterprise with Evernote - SOURCE Security Conference Boston 2015.mp4 40.05MB
Sandy Carielli - Pre-Conference Interview.mp4 11.30MB
sb2010-schedule.htm 142.40KB
SCAP for Everyone - A case study in transforming configurations.mp4 53.84MB
SCCP hacking Attacking the SS7 & SIGTRAN and Mapping the Phone System.mp4 72.80MB
Scoring PDF Structure To Detect Malicious Files.mp4 33.56MB
Secure Voice Communications - The Missing Piece in Mobile Security.mp4 54.22MB
Security in Agile PLC - Practical navigational aid for speed boats.mp4 42.01MB
Security in the SDLC - IT Doesn t Have To Be Painful.mp4 74.79MB
Security Start-Up Event (showcase).mp4 54.18MB
Security Startup Showcase.mp4 51.94MB
Security Sucks.mp4 35.92MB
SexyDefense - Maximizing the home-field advantage.mp4 49.91MB
Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.eng.srt 51.96KB
Silas Cutler - Adversary Profile Gothic Panda - SOURCE Security Conference.mp4 33.57MB
source10-linuxkernel-jonoberheide.pdf 874.75KB
SOURCE-Boston-2010.pdf 2.85MB
SOURCE Boston 2010 Clark slides.ppt 313.00KB
SOURCE Boston 2012 - Keynote - Anonymous 20 20 - The Beginning is Near.mp4 48.59MB
Source logo.jpg 24.23KB
SOURCE thank you.txt 765B
So You Want To Train An Army Of Ninjas.mp4 49.24MB
Splunk.mp4 54.06MB
Stacy Thayer - Pre-Conference Interview - SOURCE Austin.eng.srt 36.97KB
Stacy Thayer - Pre-Conference Interview - SOURCE Austin.mp4 19.36MB
Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.eng.srt 65.48KB
Stephanie Losi - Selling for Security Professionals - SOURCE Security Conference Boston 2015.mp4 44.54MB
SteveChristey.pptx 1.25MB
Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.eng.srt 101.33KB
Steve Werby & Randy Todd - Building Dictionaries And Destroying Hashes Using Amazon EC2.mp4 49.68MB
Strategic Analysis of the iOS Jailbreak Development Community.mp4 42.26MB
Successful Application Security Programs in an Uncertain Landscape.mp4 42.88MB
Suicide Risk Assessment and Intervention Tactics.mp4 53.46MB
Supplier Security Risk Assessment A Practical Guide - Marian Ventuneac.mp4 54.38MB
Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.eng.srt 82.96KB
Suzanne Schwartz - KEYNOTE - SOURCE Security Conference Boston 2015.mp4 72.75MB
Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.eng.srt 14.92KB
Swapnil Deshmukh - SOURCE Mesa 2018 Interviews.mp4 14.97MB
Telephone Defenses Against the Dark Arts (part1).mp4 113.26MB
Tenable Network Security.mp4 52.79MB
The Base Rate Fallacy - Information Security Needs To Understand This..mp4 50.08MB
The CERT C Secure Coding Standard.mp4 60.95MB
The Crisis in Information Security.mp4 58.33MB
The Interim Years Of Cyberspace - Security In A Domain Of Warfare.mp4 45.90MB
Theory and Application of Realistic Capture the Flag Competitions.mp4 45.91MB
Thomas Fischer - SOURCE Boston Pre-Conference Interview.eng.srt 29.45KB
Thomas Fischer - SOURCE Boston Pre-Conference Interview.mp4 20.97MB
Timothy Brueggemann - Understanding The Key to Protecting Highly Sensitive PII.mp4 56.27MB
Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.eng.srt 85.59KB
Tony Rucci - Just Another Day at the Office September 11, 2001, The White House.mp4 45.77MB
Travis Goodspeed - Breaking Zigbee Crypto.mp4 60.89MB
Trend Micro - Measuring Security.mp4 121.21MB
Turning Science into Sound Bites - Lessons from - Prototype This.mp4 52.86MB
Understanding and Preventing Data Breaches, The Real World Edition.mp4 38.48MB
Understanding Emerging Threats - The case of Nugache.mp4 56.60MB
Unified Communications - Information Loss Through the Front Door.mp4 58.43MB
Using capture-the-flag to enhance teaching and training.mp4 31.19MB
Using the the 36 stratagems for Social Engineering.mp4 66.69MB
Valery Berestetsky, Jonathan Schaaf - Speaker Interview - SOURCE Austin.mp4 10.05MB
Vince Warrington - Pre-Conference Interview - SOURCE Boston.eng.srt 12.96KB
Vince Warrington - Pre-Conference Interview - SOURCE Boston.mp4 8.99MB
Voight-Kampff ing The BlackBerry PlayBook.mp4 49.21MB
Vulnerabilities of Control Systems in Drinking Water Utilities.mp4 50.37MB
Vulnerability in the Real World - Lessons from both sides of the fence.mp4 59.39MB
VulnPanel.pptx 164.64KB
Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.eng.srt 80.76KB
Wade Woolwine and Josh Feinblum - Getting the most from your managed security providers.mp4 46.17MB
Walter Williams - Pre-Conference Interview.eng.srt 20.86KB
Walter Williams - Pre-Conference Interview.mp4 13.33MB
Watchtowers of the Internet - Analysis of Outbound Malware Communication.mp4 48.45MB
Web Application Panel.mp4 56.90MB
Wendy Poland and David Lenoe - Bullseye on Your Back.mp4 75.03MB
We See The Future And It s Not Pretty.mp4 53.21MB
What Permissions Does Your Database User REALLY Need.mp4 41.16MB
Why Developers And Vulnerability Researchers Should Collaborate.mp4 31.16MB
William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.eng.srt 83.67KB
William Cook and McGuire- Woods Data Breach - Let The Finger Pointing Begin.mp4 50.89MB
Windows File Pseudonyms.pptx 709.70KB
Wireless Sensor Networking As An Asset And A Liability.mp4 65.55MB
Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.eng.srt 54.87KB
Xiaoning Li - iROP Interesting ROP gadgets - SOURCE Security Conference.mp4 30.93MB
Your car passed inspection but what about your software.mp4 46.85MB
Your PCI Assessor - Best Friend or Worst Enemy You Choose....mp4 52.13MB
Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.eng.srt 87.84KB
Zach Lanier - Mapping And Evolution Of Android Permissions - SOURCE Security Conference.mp4 48.54MB
Distribution statistics by country
United States (US) 6
France (FR) 1
United Kingdom (GB) 1
Singapore (SG) 1
Russia (RU) 1
Turkey (TR) 1
Total 11
IP List List of IP addresses which were distributed this torrent