magnet:?xt=urn:btih:59578564DE797FA6E34993D2B8B17E55BF2DF280
Goa 2012/nullcon Goa 2012 Content Sniffing Algorithm bypassing Techniques By Anil and Chaitany.mp4 459.4 MB
Delhi 2012/nullcon Delhi 2012 Another Security Lab - By Joerg Simon.mp4 44.3 MB
Delhi 2012/nullcon Delhi 2012 Automating behavioral analysis for mobile apps - By Michael and Pradeep.mp4 49.1 MB
Delhi 2012/nullcon Delhi 2012 Evaluation of Set Top Box Security - By Zoltan Hornak.mp4 37.8 MB
Delhi 2012/nullcon Delhi 2012 Forensics Timeline Analysis - By Ashish Kunte.mp4 54.7 MB
Delhi 2012/nullcon Delhi 2012 Highly Harmful Audio Waves aka DTMF Fuzzing - By Rahul Sasi.mp4 50.7 MB
Delhi 2012/nullcon Delhi 2012 Microsoft EMET Attack Mitigations - By Neil Sikka.mp4 37.2 MB
Delhi 2012/nullcon Delhi 2012 Securing Software Ventures - By Aiden Riley Eller.mp4 35.7 MB
Delhi 2012/nullcon Delhi 2012 The art of Passive Web Vul Analysis with IronWASP - By LavaKumar.mp4 41.5 MB
Goa 2012/nullcon Delhi 2012 How secure is internet banking in India - By Ajit Hatti.mp4 44.7 MB
Goa 2012/nullcon Goa 2012 An effective Incident Response Triage framework in the age of APT - By Albert Hui.mp4 126.8 MB
Goa 2012/nullcon Goa 2012 Application security cost management - By Ketan Vyas.mp4 107.4 MB
Goa 2012/nullcon Goa 2012 Attacking and Defending the Smart Grid - By Justin Searle.mp4 145.4 MB
Goa 2012/nullcon Goa 2012 Attacking Backup Software - By Nibin Varghese.mp4 148.8 MB
Goa 2012/nullcon Goa 2012 Best practices to improve security grading of your product - By Hemant Khandelwal.mp4 166.2 MB
Goa 2012/nullcon Goa 2012 Binary God - By Atul Alex.mp4 158.9 MB
Goa 2012/nullcon Goa 2012 CAPTCHAs for fun and profit - By Gursev Kalra.mp4 240.5 MB
Delhi 2012/nullcon Delhi 2012 Analysis of Fraud Activity in Online Gambling Industry - By Neyolov Evgeny.mp4 37.3 MB
Goa 2012/nullcon Goa 2012 HaxdroiD Empowering Handsets - By Anant & Pardhu.mp4 98.9 MB
Goa 2012/nullcon Goa 2012 IVR Security Internal Network Attacks via Phone - By Rahul Sasi.mp4 186.9 MB