These convention recordings were made by The Sound of Knowledge.
Filename |
Size |
Description of the Audio |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
defcon-02.mp3 12960600 | Cryptography by Schneier
| defcon-03.mp3 | 8305162 | IP6 by Swift
| defcon-04.mp3 | 9622778 | Issues in Interrogations by Poulson and Grannick
| defcon-05-pt1.mp3 | 1890324 | Phreaking & PBX Tricks by Gh0st (Part 1)
| defcon-05-pt2.mp3 | 10372388 | Phreaking & PBX Tricks by Gh0st (Part 2)
| defcon-06.mp3 | 9269185 | The Firewall Appliance: Friend or Foe? by Darenroe
| defcon-07-pt1.mp3 | 5420826 | Legal Q & A by Thackeray and Higgins (Part 1)
| defcon-07-pt2.mp3 | 1194840 | Legal Q & A by Thackeray and Higgins (Part 2)
| defcon-07-pt3.mp3 | 4739134 | Legal Q & A by Thackeray and Higgins (Part 3)
| defcon-08.mp3 | 15903660 | Hacking Windows Window Registers & Shares by Mojo
| defcon-09.mp3 | 12258429 | Hacking Oracle 101 by Vandel
| defcon-10-pt1.mp3 | 10718458 | Hacking Las Vegas by Jorasch (Part 1)
| defcon-10-pt2.mp3 | 96026 | Hacking Las Vegas by Jorasch (Part 2)
| defcon-11-pt1.mp3 | 9014648 | Radio Guy (Part 1)
| defcon-11-pt2.mp3 | 3447849 | Radio Guy (Part 2)
| defcon-13-pt1.mp3 | 2800640 | Meet the Fed Panel (Part 1)
| defcon-13-pt2.mp3 | 1155970 | Meet the Fed Panel (Part 2)
| defcon-13-pt3.mp3 | 388388 | Meet the Fed Panel (Part 3)
| defcon-13-pt4.mp3 | 2109962 | Meet the Fed Panel (Part 4)
| defcon-13-pt5.mp3 | 5270360 | Meet the Fed Panel (Part 5)
| defcon-14.mp3 | 15800842 | Cyber Forensics by Stephenson
| defcon-16-pt1.mp3 | 10416065 | Fear and Loathing in Cyberspace: The Art and Science of Enemy Profiling by Angus Bitter (Part 1)
| defcon-16-pt2.mp3 | 3742511 | Fear and Loathing in Cyberspace: The Art and Science of Enemy Profiling by Angus Bitter (Part 2)
| defcon-18.mp3 | 11660329 |
| defcon-19-pt1.mp3 | 6972290 |
| defcon-19-pt2.mp3 | 469472 |
| defcon-19-pt3.mp3 | 604264 |
| defcon-20.mp3 | 10178873 |
| defcon-21.mp3 | 14030367 |
| defcon-22-pt1.mp3 | 3273978 |
| defcon-22-pt2.mp3 | 2549864 |
| defcon-23.mp3 | 9600000 |
| defcon-24-pt1.mp3 | 3331866 |
| defcon-24-pt2.mp3 | 4914886 |
| defcon-25.mp3 | 10358595 |
| defcon-26.mp3 | 7718765 |
| defcon-27.mp3 | 21091578 |
| defcon-28-pt1.mp3 | 7240620 |
| defcon-28-pt2.mp3 | 6026657 |
| defcon-30.mp3 | 14437041 |
| defcon-31.mp3 | 9912633 |
| defcon-33-pt1.mp3 | 4440711 |
| defcon-33-pt2.mp3 | 5015614 |
| defcon-33-pt3.mp3 | 898925 |
| defcon-33-pt4.mp3 | 545541 |
| defcon-33-pt5.mp3 | 224966 |
| defcon-33-pt6.mp3 | 1786044 |
| defcon-34.mp3 | 14214896 |
| defcon-35.mp3 | 11788643 |
| defcon-36.mp3 | 9229061 |
| defcon-38.mp3 | 5490207 |
| defcon-39-pt1.mp3 | 7212199 |
| defcon-39-pt2.mp3 | 5924257 |
| defcon-40-pt1.mp3 | 7079288 |
| defcon-40-pt2.mp3 | 3531023 |
| defcon-41-pt1.mp3 | 13521084 |
| defcon-41-pt2.mp3 | 45035 |
| defcon-42.mp3 | 19318804 | Lock Picking Demonstration by V1RU5
| defcon-43.mp3 | 17289613 | TEXTFILES, G-PHILES AND LOG FILES: Remembering the 1980's through ASCII by Scott
| defcon-44-pt1.mp3 | 483892 | How to Use BO2K by Reznor (Part 1)
| defcon-44-pt2.mp3 | 9052891 | How to Use BO2K by Reznor (Part 2)
| defcon-44-pt3.mp3 | 546586 | How to Use BO2K by Reznor (Part 3)
| defcon-44-pt4.mp3 | 1080528 | How to Use BO2K by Reznor (Part 4)
| defcon-44-pt5.mp3 | 4733492 | How to Use BO2K by Reznor (Part 5)
| defcon-45.mp3 | 9094060 | Follow Up on Micropower Radio by Professor Feedlebom
| defcon-47.mp3 | 7108127 | "Crypto Tales" by Parekh
| defcon-49.mp3 | 13477198 | Firewalls: Trends and Problems by Alexander
| defcon-52.mp3 | 12125727 | Embedded Systems Hacking by Peugeot
| defcon-53.mp3 | 13647098 | Wearable Systems by Mann
| defcon-54-pt1.mp3 | 8482377 | Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 1)
| defcon-54-pt2.mp3 | 1107278 | Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 2)
| defcon-54-pt3.mp3 | 1582080 | Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 3)
| defcon-54-pt4.mp3 | 2950060 | Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 4)
| defcon-54-pt5.mp3 | 2225528 | Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 5)
| defcon-54-pt6.mp3 | 1127758 | Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 6)
| defcon-54-pt7.mp3 | 925257 | Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel (Part 7)
| defcon-toc.txt | 2424 |
| |
There are 77 files for a total of 518,579,395 bytes. |