Dailydave: by author

113 messages starting Apr 19 11 and ending Apr 02 11
Date index | Thread index | Author index


Abhijeet Patil

[Announcement] ClubHACK Magazine Issue 15-April 2011 released Abhijeet Patil (Apr 19)
[Announcement] ClubHack Magazine Issue 16-May 2011 released Abhijeet Patil (May 11)

Adam Behnke

Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 06)
Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 06)
SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 04)
Reversing x64 TDSS at InfoSec Institute Adam Behnke (Apr 20)

Adam Shostack

Re: Facebook Adam Shostack (May 20)

Adrien Kunysz

Re: Facebook Adrien Kunysz (May 21)

Alexander Sotirov

Assured Exploitation training in NYC Alexander Sotirov (May 09)

Alex McGeorge

PSN Breach Alex McGeorge (Apr 28)
Bad Medicine Alex McGeorge (Apr 27)

allison nixon

Re: Facebook allison nixon (May 20)

Andre Gironda

Re: The strategic difference of 0day Andre Gironda (Jun 15)

Andrew Sudbury

Re: Facebook Andrew Sudbury (May 20)

Anton Chuvakin

Re: The strategic difference of 0day Anton Chuvakin (Jun 14)

Arun Koshy

Re: Facebook Arun Koshy (May 20)

Brian Snow

Hackers doing God's work Brian Snow (Apr 08)

Christian Heinrich

Re: Fair and Balanced part 2! Christian Heinrich (Jun 10)
Re: Fair and Balanced part 2! Christian Heinrich (Jun 11)

dan

Re: Some quick notes on the CNAS report dan (Jun 30)

Daniel Bilar

Networked Computer Security Experiment with prizes: Call for Participants Daniel Bilar (May 02)

Daniel Clemens

Re: Exploits are important (or "Challenging your assumptions") Daniel Clemens (May 13)

dave

2 Videos to Watch dave (May 03)
CANVAS 6.68! dave (Apr 20)
Immunity's Guide to Being Mobile and Secure dave (Apr 18)
Without Wires dave (May 04)
Being on the net (aka, how to overpay) dave (Apr 08)
Watson was right. dave (Apr 18)

Dave Aitel

The WhitePhosphorus Exploit Pack - good enough to steal! Dave Aitel (Jun 24)
Naming things after your daughter part 1... Dave Aitel (Jun 17)
INFILTRATE 2011 Slides released dave aitel (May 09)
Sophisticated and Tenacious Email Clients! Dave Aitel (Jun 01)
Visualize their passwords :> dave aitel (May 05)
Cyber Governance (aka more CNAS) Dave Aitel (Jun 13)
Exploits are important (or "Challenging your assumptions") Dave Aitel (May 11)
Movie of the morning Dave Aitel (Jun 09)
Facebook Dave Aitel (May 20)
64 bit kernel rootkits FTW Dave Aitel (Jun 02)
INFILTRATE is almost upon us! Dave Aitel (Apr 06)
Arsenic Security Dave Aitel (May 29)
Sunday night reading. Dave Aitel (Jun 05)
The slow process of building a talk on "cyberwar" Dave Aitel (May 10)
A weapon of massive disruption[1] Dave Aitel (May 30)
CANVAS 6.69 Movie! Dave Aitel (May 17)
Fair and Balanced part 2! Dave Aitel (Jun 08)
SCADA and AV exploitation movies Dave Aitel (Jun 24)
The strategic difference of 0day Dave Aitel (Jun 14)
Some quick notes on the CNAS report Dave Aitel (Jun 01)
INFILTRATE 2011 keynote - Strategic Surprise - Nicolas Waisman dave aitel (May 06)
Hacker Maxim Friday Dave Aitel (May 27)
Tom Ricks, Cyber Strategy, Usenix. Dave Aitel (Jun 29)

Dobbins, Roland

Re: Standing up an intel op with seized funds Dobbins, Roland (Apr 12)
Re: Standing up an intel op with seized funds Dobbins, Roland (Apr 08)
Re: Facebook Dobbins, Roland (May 20)
Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Dobbins, Roland (Apr 08)

Haroon Meer

Re: A weapon of massive disruption Haroon Meer (May 31)
(ComputerSecurity) Conference Collecting... Haroon Meer (May 25)

hfortier

Recon 2011 - Accepted Talks , Training, Call For Papers Reminder - July 8 to 10, 2011 - Montreal, Quebec hfortier (Apr 14)

Intevydis

Old new exploits Intevydis (May 31)

Jeffrey Walton

Re: Fair and Balanced part 2! Jeffrey Walton (Jun 11)

Joe Klein

Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Joe Klein (Apr 08)

joe mendez

Re: Fair and Balanced part 2! joe mendez (Jun 10)

J. Oquendo

Re: Facebook J. Oquendo (May 20)

Justin Seitz

El Jefe Demo Justin Seitz (May 13)

Kristian Erik Hermansen

Microsoft Windows Vista/Server 2008 "nsiproxy.sys" Local Kernel DoS Exploit Kristian Erik Hermansen (May 18)
Re: Without Wires Kristian Erik Hermansen (May 05)
Re: Without Wires Kristian Erik Hermansen (May 04)

Marc Heuse

Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Marc Heuse (Apr 05)
Another Microsoft (and other) IPv6 security issue: sniffer detection Marc Heuse (Apr 14)

Marc Maiffret

Re: Fair and Balanced part 2! Marc Maiffret (Jun 09)

Marco Ivaldi

Re: Immunity's Guide to Being Mobile and Secure Marco Ivaldi (Apr 21)

Marc OLANIE

REĀ : Without Wires Marc OLANIE (May 05)

Michal Zalewski

Re: WOOT '11 Call for Papers (reminder) Michal Zalewski (Jun 14)
WOOT '11 Call for Papers (reminder) Michal Zalewski (Apr 10)

Miroslav Stampar

[Tool] sqlmap 0.9 released Miroslav Stampar (Apr 12)

Mohammad Hosein

Re: Watson was right. Mohammad Hosein (Apr 18)
Re: Without Wires Mohammad Hosein (May 04)
Re: Exploits are important (or "Challenging your assumptions") Mohammad Hosein (May 12)
Re: Without Wires Mohammad Hosein (May 04)

Nate Lawson

Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Nate Lawson (Apr 05)

Nick Selby

Re: Standing up an intel op with seized funds Nick Selby (Apr 13)
Standing up an intel op with seized funds Nick Selby (Apr 08)
Re: Standing up an intel op with seized funds Nick Selby (Apr 13)
Re: Standing up an intel op with seized funds Nick Selby (Apr 10)

Nicolas Waisman

Hack Cup 2011 Nicolas Waisman (May 27)
Infiltrate 2011 Talk Announcement: State spaces and exploitation Nicolas Waisman (Apr 01)
Hack Cup 2011 Draw Nicolas Waisman (Jun 13)
Infiltrate 2011 Talk Announcement: State spaces and exploitation Nicolas Waisman (Apr 01)
Hack Cup 2011 - Errata Nicolas Waisman (May 27)
Blackhat sponsoring the Hack Cup 2011: New winner prizes! Nicolas Waisman (Jun 17)

Piotr Bania

PAPER: Securing The Kernel via Static Binary Rewriting and Program Shepherding Piotr Bania (May 09)

Rafal Los

Re: The strategic difference of 0day Rafal Los (Jun 15)

Riley Hassell

Android Vulns Riley Hassell (May 17)
Malicious Intent - Exploiting Android Activities to Escalate Privilege Riley Hassell (May 24)

Robert Graham

Re: Being on the net (aka, how to overpay) Robert Graham (Apr 08)
Re: Standing up an intel op with seized funds Robert Graham (Apr 09)

Robert Lemos

Re: The strategic difference of 0day Robert Lemos (Jun 15)

Sebastian Krahmer

Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Sebastian Krahmer (Apr 06)

security curmudgeon

Re: The strategic difference of 0day security curmudgeon (Jun 15)

Steve Lord

Announcement: 44Con Technical Call For Papers Steve Lord (May 03)

Terrence Miltner

The Case of the Great Router Robbery Terrence Miltner (May 24)
New malware research posted on Resources at InfoSec Institute Terrence Miltner (Apr 20)
Insecure Defaults Lead to Mass Open Proxies in China Terrence Miltner (Apr 27)

Thomas Lim

Slides for SyScan'11 Singapore Thomas Lim (May 12)
SyScan'11 Taipei Call For Papers Thomas Lim (Jun 03)

Timothy Shea

Re: Immunity's Guide to Being Mobile and Secure Timothy Shea (Apr 21)

Todd Haverkos

Re: Immunity's Guide to Being Mobile and Secure Todd Haverkos (Apr 20)

Tracy Reed

Re: Without Wires Tracy Reed (May 04)
Re: Facebook Tracy Reed (May 21)

Val Smith

Re: Exploits are important (or "Challenging your assumptions") Val Smith (May 12)
Re: Exploits are important (or "Challenging your assumptions") Val Smith (May 11)

Vitaly Osipov

Re: Exploits are important (or "Challenging your assumptions") Vitaly Osipov (May 13)

vulc@n ddtek

Defcon CTF moves to the Rio for 2011 and HBGary is awarded contract to clean CTF sheep stalls! vulc@n ddtek (Apr 02)