Общая информация
Название NoNameCon
Тип
Размер 3.56Гб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
10 major steps for Cybersecurity (English version) - Bert Heitink.en.transcribed.srt 59.08Кб
10 major steps for Cybersecurity (English version) - Bert Heitink.mp4 30.16Мб
10 major steps for Cybersecurity (Ukrainian version) - Bert Heitink.mp4 15.09Мб
A DECEPTICON and AUTOBOT walk into a bar Python for enhanced OPSEC - Joe Gray.mp4 58.41Мб
Advanced reverse engineering techniques in unpacking (English version) - Ievgen Kulyk.mp4 12.74Мб
Advanced reverse engineering techniques in unpacking (Ukrainian version) - Ievgen Kulyk.mp4 45.75Мб
All Roads Lead to OpenVPN Pwn’ing Industrial Remote Access Clients. - Sharon Brizinov.eng.srt 93.76Кб
All Roads Lead to OpenVPN Pwn’ing Industrial Remote Access Clients. - Sharon Brizinov.mp4 34.85Мб
Android Application Hacking with Damn Vulnerable Bank. - R. Tammana, A. Jaiswal, H. Kakade.eng.srt 106.74Кб
Android Application Hacking with Damn Vulnerable Bank. - R. Tammana, A. Jaiswal, H. Kakade.mp4 85.32Мб
Attacks on Windows Infrastructure (Blue Team edition). - Bogdan Vennyk.eng.srt 82.05Кб
Attacks on Windows Infrastructure (Blue Team edition). - Bogdan Vennyk.mp4 62.55Мб
Automation in modern Incident Detection & Response (IDR) process (English version) - Nazar Tymoshyk.mp4 53.22Мб
Automation in modern Incident Detection & Response (IDR) process (Ukr version) - Nazar Tymoshyk.mp4 52.37Мб
Bert Heitink - доповідач NoNameCon.en.transcribed.srt 3.42Кб
Bert Heitink - доповідач NoNameCon.mp4 4.67Мб
Bug bounty hunting Workshop - Philippe Delteil.eng.srt 323.78Кб
Bug bounty hunting Workshop - Philippe Delteil.mp4 275.84Мб
Car Hacking 101 - Andrey Voloshin, Alexander Olenyev.mp4 60.16Мб
Car Hacking Yes, You can do that (English version) - Andrey Voloshin.mp4 45.67Мб
Car Hacking Yes, You can do that (Ukrainian version) - Andrey Voloshin.mp4 44.94Мб
Centralised Monitoring and Alerting system over AWS. - Saransh Rana.eng.srt 76.50Кб
Centralised Monitoring and Alerting system over AWS. - Saransh Rana.mp4 41.37Мб
Cryptographic protection of ML models. - Anastasiia Voitova.eng.srt 103.37Кб
Cryptographic protection of ML models. - Anastasiia Voitova.mp4 76.02Мб
Cyber Attacks Against Georgia (October 2019) and Georgian Internet Security - Mikheil Basilaia.eng.srt 72.41Кб
Cyber Attacks Against Georgia (October 2019) and Georgian Internet Security - Mikheil Basilaia.mp4 48.10Мб
DFA and code control flow obfuscation a real-world example. Dima Kovalenko.eng.srt 52.61Кб
DFA and code control flow obfuscation a real-world example. Dima Kovalenko.mp4 44.60Мб
Discovering C&C in Malicious PDF using deobfuscation, encoding, and other techniques. - Filipi Pires.eng.srt 73.04Кб
Discovering C&C in Malicious PDF using deobfuscation, encoding, and other techniques. - Filipi Pires.mp4 50.90Мб
Dzień dobry, you’re hacked. - Andriy Varusha.eng.srt 112.97Кб
Dzień dobry, you’re hacked. - Andriy Varusha.mp4 66.27Мб
Executable Code Protection in ARM Systems - Eugene Kulik, Pavel Kryvko.mp4 37.57Мб
Getting Secure Against Challenges vs Getting Security Challenges Done - Eugene Pilyankevich.mp4 57.63Мб
Hacking Robots Before Skynet - Lucas Apa UKR.mp4 57.11Мб
Help, my browser is leaking Exploring XSLeaks attacks and defenses - Tom Van Goethem.mp4 42.74Мб
How 2 remove a viru$ - Oksana Safronova.mp4 45.49Мб
How to check if security team is ready before incident happens (English version) - Oksana Safronova.mp4 34.43Мб
How to check if security team is ready before incident happens (Ukr version) - Oksana Safronova.mp4 33.44Мб
Hunting for APT in network logs - Oleh Levytskyi, Bogdan Vennyk.mp4 185.89Мб
Kalina, Kupina, and other flora of domestic cryptography (English version) - Ruslan Kiyanchuk.mp4 48.22Мб
Kalina, Kupina, and other flora of domestic cryptography (Ukrainian version) - Ruslan Kiyanchuk.mp4 48.46Мб
Knock Knock Security threats with Kubernetes (Eng version) - Igor Khoroshchenko, Stanislav Kolenkin.en.transcribed.srt 55.06Кб
Knock Knock Security threats with Kubernetes (Eng version) - Igor Khoroshchenko, Stanislav Kolenkin.mp4 16.63Мб
Knock Knock Security threats with Kubernetes (Ukr version) - Igor Khoroshchenko, Stanislav Kolenkin.mp4 50.23Мб
Let's play a game. - Oksana Safronova.eng.srt 79.94Кб
Let's play a game. - Oksana Safronova.mp4 59.91Мб
Live-patching weak crypto with OpenSSL engines (English version) - Ignat Korchaginen.en.transcribed.srt 42.80Кб
Live-patching weak crypto with OpenSSL engines (English version) - Ignat Korchaginen.mp4 32.62Мб
Live-patching weak crypto with OpenSSL engines (Ukrainian version) - Ignat Korchagin.mp4 34.46Мб
MacOS Security threats (English version) - Vitaliy Mechytashvili.en.transcribed.srt 36.17Кб
MacOS Security threats (English version) - Vitaliy Mechytashvili.mp4 29.73Мб
MacOS Security threats (Ukrainian version) - Vitaliy Mechytashvili.mp4 29.46Мб
Mobile Anti-Virus apps exposed (English version) - Stephanie Vanroelen.en.transcribed.srt 44.20Кб
Mobile Anti-Virus apps exposed (English version) - Stephanie Vanroelen.mp4 24.96Мб
Mobile Anti-Virus apps exposed (Ukrainian version) - Stephanie Vanroelen.mp4 25.81Мб
NoNameCon logo.jpg 25.14Кб
NoNameCon logo 2.jpg 4.37Кб
NoNameCon thank you.txt 969б
Official Press-conference NoNameCon 2018, Kyiv.mp4 57.06Мб
Passing Security By - Serhii Korolenko.mp4 51.81Мб
Paste Wars fighting for copypaste freedom - Ignat Korchagin.mp4 57.32Мб
PEASS - Privilege Escalation Awesome Scripts Suite - Carlos Polop.mp4 58.78Мб
Post-quantum security should you care - Jean-Philippe Aumasson.mp4 67.45Мб
Professional Debates - Професійні дебати.mp4 63.84Мб
Remote Forensics of a Linux Server Without Physical Access - Serhii Aleynikov.mp4 33.83Мб
Search over encrypted records from academic dreams to production-ready tool (Eng) - Artem Storozhuk.mp4 13.52Мб
Search over encrypted records from academic dreams to production-ready tool (Ukr) - Artem Storozhuk.mp4 35.10Мб
Special exclusive interview with Bruce Schneier.mp4 60.51Мб
Special Interview with Daniel Miessler.eng.srt 110.04Кб
Special Interview with Daniel Miessler.mp4 59.10Мб
Special Keynote Eva Galperin.eng.srt 144.14Кб
Special Keynote Eva Galperin.mp4 133.39Мб
State Cybersecurity vs. Cybersecurity of the State. #FRD Lessons (Eng version) - Kostiantyn Korsun.mp4 51.53Мб
State Cybersecurity vs. Cybersecurity of the State. #FRD Lessons (Ukr version) - Kostiantyn Korsun.mp4 52.23Мб
Technical Insights for the SOC as Technical Centre for IT Security Defense - Bert Heitink EN.en.transcribed.srt 145.04Кб
Technical Insights for the SOC as Technical Centre for IT Security Defense - Bert Heitink EN.mp4 52.12Мб
Technical Insights for the SOC as Technical Centre for IT Security Defense - Bert Heitink UKR.mp4 52.29Мб
The country of unlearned lessons - Kostiantyn Korsun.eng.srt 43.53Кб
The country of unlearned lessons - Kostiantyn Korsun.mp4 39.94Мб
Threat Intelligence particularities world-wide. Real life use-cases - Oleg Bondarenko.mp4 64.51Мб
Tips and tricks for the efficient white-box security audit - Igor Andriushchenko EN.mp4 31.17Мб
Tips and tricks for the efficient white-box security audit - Igor Andriushchenko UKR translation.mp4 31.62Мб
Using cloud implementations to hack IoT - Alex Jay Balan.eng.srt 113.21Кб
Using cloud implementations to hack IoT - Alex Jay Balan.mp4 63.49Мб
Volodymyr Lysenko, PhD - University of Arizona.mp4 8.05Мб
What is autumn like in prison camps (English version) - Pavlo Zhavoronkov.mp4 50.80Мб
What is autumn like in prison camps (Ukrainian version) - Pavlo Zhavoronkov.mp4 49.88Мб
Why can't developers make it secure - Julia Potapenko.eng.srt 67.23Кб
Why can't developers make it secure - Julia Potapenko.mp4 42.87Мб
Why the Options Pattern is Great for Security. - Dima Kotik.eng.srt 76.51Кб
Why the Options Pattern is Great for Security. - Dima Kotik.mp4 46.69Мб
Ігор Мальченюк - доповідач CyberKids.mp4 8.82Мб
Антон Павлушко - журналіст, InformNapalm.mp4 6.05Мб
Артем Карпинський - Співзасновник NoNameCon.mp4 5.79Мб
Валентин Петров - Керівник служби з питань інформаційної безпеки РНБОУ.mp4 5.32Мб
Володимир Стиран - співзасновник NoNameCon.mp4 6.85Мб
Де моя стратегія, чумба - Костянтин Корсун.mp4 96.21Мб
Захист вiд ботiв без шкоди для бiзнесу - Igor Bondarenko.mp4 47.74Мб
Костянтин Корсун - Co-founder & CEO, Berezha Security.mp4 24.51Мб
Сергій Демедюк - Начальник Департаменту кіберполіції Національної поліції України.mp4 5.60Мб
Похожие торрент-файлы
12.50Гб
4.21Гб
1.64Гб
1.40Гб
5.39Гб
3.89Гб
9.37Гб
15.01Гб
1.04Гб
23.87Гб
Статистика распространения по странам
США (US) 5
Сингапур (SG) 1
Всего 6
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент