Conventions: DEFCON 7

These convention recordings were made by The Sound of Knowledge.


Filename
Size
Description of the Audio
defcon-02.mp3 12960600
Cryptography by Schneier
defcon-03.mp3 8305162
IP6 by Swift
defcon-04.mp3 9622778
Issues in Interrogations by Poulson and Grannick
defcon-05-pt1.mp3 1890324
Phreaking & PBX Tricks by Gh0st (Part 1)
defcon-05-pt2.mp3 10372388
Phreaking & PBX Tricks by Gh0st (Part 2)
defcon-06.mp3 9269185
The Firewall Appliance: Friend or Foe? by Darenroe
defcon-07-pt1.mp3 5420826
Legal Q & A by Thackeray and Higgins (Part 1)
defcon-07-pt2.mp3 1194840
Legal Q & A by Thackeray and Higgins (Part 2)
defcon-07-pt3.mp3 4739134
Legal Q & A by Thackeray and Higgins (Part 3)
defcon-08.mp3 15903660
Hacking Windows Window Registers & Shares by Mojo
defcon-09.mp3 12258429
Hacking Oracle 101 by Vandel
defcon-10-pt1.mp3 10718458
Hacking Las Vegas by Jorasch (Part 1)
defcon-10-pt2.mp3 96026
Hacking Las Vegas by Jorasch (Part 2)
defcon-11-pt1.mp3 9014648
Radio Guy (Part 1)
defcon-11-pt2.mp3 3447849
Radio Guy (Part 2)
defcon-13-pt1.mp3 2800640
Meet the Fed Panel (Part 1)
defcon-13-pt2.mp3 1155970
Meet the Fed Panel (Part 2)
defcon-13-pt3.mp3 388388
Meet the Fed Panel (Part 3)
defcon-13-pt4.mp3 2109962
Meet the Fed Panel (Part 4)
defcon-13-pt5.mp3 5270360
Meet the Fed Panel (Part 5)
defcon-14.mp3 15800842
Cyber Forensics by Stephenson
defcon-16-pt1.mp3 10416065
Fear and Loathing in Cyberspace: The Art and Science of Enemy Profiling by Angus Bitter (Part 1)
defcon-16-pt2.mp3 3742511
Fear and Loathing in Cyberspace: The Art and Science of Enemy Profiling by Angus Bitter (Part 2)
defcon-18.mp3 11660329
defcon-19-pt1.mp3 6972290
defcon-19-pt2.mp3 469472
defcon-19-pt3.mp3 604264
defcon-20.mp3 10178873
defcon-21.mp3 14030367
defcon-22-pt1.mp3 3273978
defcon-22-pt2.mp3 2549864
defcon-23.mp3 9600000
defcon-24-pt1.mp3 3331866
defcon-24-pt2.mp3 4914886
defcon-25.mp3 10358595
defcon-26.mp3 7718765
defcon-27.mp3 21091578
defcon-28-pt1.mp3 7240620
defcon-28-pt2.mp3 6026657
defcon-30.mp3 14437041
defcon-31.mp3 9912633
defcon-33-pt1.mp3 4440711
defcon-33-pt2.mp3 5015614
defcon-33-pt3.mp3 898925
defcon-33-pt4.mp3 545541
defcon-33-pt5.mp3 224966
defcon-33-pt6.mp3 1786044
defcon-34.mp3 14214896
defcon-35.mp3 11788643
defcon-36.mp3 9229061
defcon-38.mp3 5490207
defcon-39-pt1.mp3 7212199
defcon-39-pt2.mp3 5924257
defcon-40-pt1.mp3 7079288
defcon-40-pt2.mp3 3531023
defcon-41-pt1.mp3 13521084
defcon-41-pt2.mp3 45035
defcon-42.mp3 19318804
Lock Picking Demonstration by V1RU5
defcon-43.mp3 17289613
TEXTFILES, G-PHILES AND LOG FILES: Remembering the 1980's through ASCII by Scott
defcon-44-pt1.mp3 483892
How to Use BO2K by Reznor (Part 1)
defcon-44-pt2.mp3 9052891
How to Use BO2K by Reznor (Part 2)
defcon-44-pt3.mp3 546586
How to Use BO2K by Reznor (Part 3)
defcon-44-pt4.mp3 1080528
How to Use BO2K by Reznor (Part 4)
defcon-44-pt5.mp3 4733492
How to Use BO2K by Reznor (Part 5)
defcon-45.mp3 9094060
Follow Up on Micropower Radio by Professor Feedlebom
defcon-47.mp3 7108127
"Crypto Tales" by Parekh
defcon-49.mp3 13477198
Firewalls: Trends and Problems by Alexander
defcon-52.mp3 12125727
Embedded Systems Hacking by Peugeot
defcon-53.mp3 13647098
Wearable Systems by Mann
defcon-54-pt1.mp3 8482377
Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 1)
defcon-54-pt2.mp3 1107278
Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 2)
defcon-54-pt3.mp3 1582080
Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 3)
defcon-54-pt4.mp3 2950060
Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 4)
defcon-54-pt5.mp3 2225528
Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 5)
defcon-54-pt6.mp3 1127758
Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 6)
defcon-54-pt7.mp3 925257
Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 7)
defcon-toc.txt 2424

There are 77 files for a total of 518,579,395 bytes.