Friday July 9th
|
Newbie Area A
|
Break Out Area B
|
Big Area C
|
14:00-14:50 |
|
|
|
15:00-15:50 |
|
|
Kevin Poulsen & Jennifer Granick: |
16:00-16:50 |
Gh0st: Phreaking and PBX tricks |
Darenoe: The Firewall Appliance: Friend
or Foe? |
Gail Thackeray: |
17:00-17:50 |
Mojo: hacking Window registers &
shares |
Vic Vandel: Hacking Oracle 101 |
James Jorasch: Hacking Las Vegas! |
18:00-18:50 |
Radio Guy: |
Room Closed for Band
Set-up
|
Meet the Fed Panel: |
19:00-19:50 |
|
Bands Start
|
Angus Blitter: Fear and
Loathing in Cyberspace: The art and science of enemy profiling |
|
|
|
|
Saturday July 10th
|
Newbie Area A
|
Break Out Area B
|
Big Area C
|
10:00-10:50 |
Cyber: How to use BSD to set up a
firewall/gateway. |
Rooster: Insecurities in networking
Devices |
Phillip J. Loranger: the ethics / morality /
practicality / patriotism of hacking. |
11:00-11:50 |
Attention, vous
sortez de Kitetoa pour aller chercher la présentation powerpoint de Punkis
Punkis: Introduction to TCP/IP |
Dead Addict: SET Technology |
Michael J. Martinez:Hackers
and the Media: A Love-Hate Thing. |
12:00-12:50 |
Peter Shipley: Intro to TCP/IP exploits |
Band Setup
|
Ira Winkler: The myths of hiring
hackers. |
13:00-13:50 |
M0dify: Introduction to scanning. |
Bands start
|
Sarah Gordon: Viruses on (and off) the
Internet. Panel Session. |
14:00-14:50 |
|
|
Cult of the Dead Cow: BO 2K is announed and released! |
15:00-15:50 |
Robert Lupo:
Introduction to Vrius. |
|
John Q. Newman: #1 |
16:00-16:50 |
Freaky: Mackintosh security |
|
Dr. Byte: IPv6:
Who/What/When/Where/How/Why. |
17:00-17:50 |
Cyber: What are Public Keys? |
|
Winn Schwartau:
HERF Guns, EMP Bombs and Weapons of Mass Disruption (UnClassified) |
18:00-18:50 |
Craig H. Rowland: How to be aware of
security problems on your network. |
|
DefCon 7.0 "Who Are You, Anyways?" Social
Engineering Contest. |
|
|
|
|
Sunday July 11th
|
|
|
|
10:00-10:50 |
Richard Windmann: The Defcon Proxy
Server |
Ian Goldberg: Zero Knowldge Networks
update. |
Tom: Security problems associated with
client-side scripting. |
11:00-11:50 |
Jonathan
Wignall: Extra Border Hacking |
V1RU5: Lock Picking demo. |
Jason Scott: TEXTFILES, G-PHILES, AND
LOG FILES: Remembering the 1980's Through ASCII |
12:00-12:50 |
A.J. Reznor: How to use BO2K. |
Prof. Feedlebom: Follow up on Micropower Radio. |
Richard Thieme: Trust,
Betrayal, and Nested Levels of Loyalty: Who Do We Think You Are and How Do We Think We
Know? |
13:00-13:50 |
|
Sameer Parekh: "Crypto Tales" |
Security Experts Panel: |
14:00-14:50 |
|
Steven Alexander-Firewalls: Trends and
Problems. |
Jericho: Fakes walk among us. |
15:00-15:50 |
|
Christian Hedegaard-Schou: Open source |
Deanna Peugeot: Embedded
systems hacking. |
16:00-16:50 |
|
Charles Faulkner:
Hacking Human Minds. |
David Sobel: Internet
Anonymity Under Assault: The 'John Doe' Lawsuits |