![]() |
||
|
USA | ||
Track/Speaker/Topic | Presentation |
Notes/Tools
|
See It | Hear It |
Keynote Presentation - Black Hat USA 1998 | ||||
Marcus Ranum How to REALLY Secure the Internet |
![]() |
![]() |
![]() |
|
Bruce Schneier Mistakes and Blunders: A Hacker Looks at Cryptography |
no media available | ![]() |
||
Richard Thieme Convergence -- Every Man (and Woman) a Spy |
no media available | ![]() |
||
Technical Track - Black Hat USA 1998 | ||||
Dominique Brezinski Penetrating NT Networks Through Information Leaks and Policy Weaknesses |
Presentation Notes!
|
![]() |
![]() |
|
John Bailey SOCKS, PPTP & IPSec: Implementation & Futures |
![]() |
![]() |
||
Ian Goldberg Cell Phone Security: A History and The State of the Art |
![]() |
![]() |
||
Dr. Mudge Problems with VPN Technologies |
no media available | ![]() |
||
Tom Ptacek Problems with Intrusion Detection Systems |
no media available | ![]() |
||
General Track - Black Hat USA 1998 | ||||
Jennifer Granick What's Different About Evidence in Computer Crime litigation |
![]() |
![]() |
||
Patrick Richard Open Network PKI Design Issues or Business as Usual |
![]() |
![]() |
||
Bruce K. Marshall Statistical Analysis of Reusable Password Systems and Their Alternatives |
![]() |
![]() |
||
Ira Winkler Information Security: Beyond the Hype |
![]() |
no media available | no media available | |
Speaker/Topic | Presentation |
Ancillary
|
Tools | Hear It |
Keynote Presentation - Black Hat USA 1997 | ||||
Richard Thieme | ![]() |
|||
Speaker/Presentation - Black Hat USA 1997 | ||||
Dominique Brezinski Security Posture Assessment (SPA) of Windows NT Networks |
![]() |
![]() |
||
Miles Connley Firewalls: Not Enough of a Good Thing |
![]() |
no media available | ||
Chris Goggans Internet Attack Methodologies |
![]() |
![]() |
||
Hobbit Microsoft LM athentication, CIFS, and All Kinds of Password Problems |
![]() |
|||
Ray Kaplan Meet The Enemy |
![]() |
|||
Mudge Secure Coding Practices and Source Code Analysis |
![]() |
|||
QMaster Secure Implementations of ActiveX in a Corporate Environment |
![]() |
|||
Priest Building the Business Case for Management for Increased Security |
![]() |
|||
Jeremy Rauch Security Implications of Distributed Network Management |
![]() |
![]() |
||
Route TCP/IP Insecurities |
![]() |
![]() |
![]() |
![]() |
Bruce Schneier Why Cryptograpy is Harder Than it Looks |
![]() |
website |
![]() |
|
Peter Shipley Securing your Network with Free Utilities |
![]() |
![]() |
||
Adam Shostack Code Reviews: Making them Worthwhile |
![]() |
no media available | ||
Sluggo Denial of Service Attacks, and Defensive Strategies |
![]() |
|||
Ira Winkler Who are the Real Black Hats? |
![]() |
|||
|