hope schedule (PDF)




File information


Author: micah

This PDF 1.4 document has been generated by Writer / LibreOffice 3.5, and has been sent on pdf-archive.com on 11/07/2012 at 20:33, from IP address 199.83.x.x. The current document download page has been viewed 815 times.
File size: 40.44 KB (3 pages).
Privacy: public file












File preview


FRIDAY
1000
1100

1200

1300
1400
1500
1600
1700
1800
1900

2000

2100

2200

2300

Dennis
Community
Fabrication: Four
Years Later
State of Open Source
Hardware

Sassaman
Smartphone
Penetration Testing
Framework
Technology to
Change Society
Testing the Two
The Autism Spectrum Party Tyranny &
& You
Open Source
Everything
Using a Space Camp
Cryptome Tracks the
Model for Security
NYPD Ring of Steel
Training
Keynote: William
Keynote: William
Binney
Binney
(continued)
(continued)
Legal Processes As
Hacktivism, Tools, &
Infrastructure
the Arab Spring
Attacks
“Kill the Internet” Destroying Evidence
MemeFactory
Before It’s Evidence
Why You Shouldn’t
Advanced Handcuff
Write Off Higher
Hacking
Education
Mastering MasterNymwars
Keyed Systems
Wikileaks,
Exploiting ZigBee &
Whistleblowers, & the
the Internet of
War on the First
Things
Amendment
Sierra Zulu - How to
Jason Scott’s Digital
Create a Film About
History
the Digital Age
How to
The Internet is for
Communicate with
Porn!
Your Car’s Network
Hosting irc.2600.net My Life with the Thrill Computer Forensics
Kill Cult

Nutt

Infrastructure Mediated Sensing
Messing with Nmap through Smoke
& Mirrors

Crimeware Tools & Techniques
Keynote: William Binney (1st hour)
Real Advances in Android Malware
Building Radios to Talk to the Dead
HIDIOUS Methods of Keystroke
Injection
We Will Be Legion: Decentralizing
the Web
Digital Security in Health Care
Institutions
Make Your Laws

Printable Electronics & the Future of
Open Hardware
“No Natural Resources Were Hurt
Assembling This Sofa”
Solving More Than
#firstworldproblems

SATURDAY
1000
1100
1200
1300
1400
1500
1600
1630
1700
1800
1900

2000
2100
2200

2300

2359

Dennis

Sassaman
Nutt
I’m Not a Real Friend,
Occupy the Airwaves But I Play One on the Why Browser Cryptography is Bad
Internet
Protecting Your
Historic Hacks in
Advancements in Botnet Attacks
Data from the Cops Portable Computing
Phone Phreak
Practical Insecurity in
Hacking Mindsets
Confidential
Encrypted Radio
Keynote: The Yes
Keynote: The Yes Men Keynote: The Yes Men (1st hour)
Men
An Aesthetic Critique of Fictional
(continued)
(continued)
Media
SCADA/PLC
Privacy Tricks for Activist Web
Exploitation &
Geeks & Depression
Developers
Disclosure
Patents: How to Get Them & How
Pwn the Drones
(continued)
to Beat Them
Electric Bodies &
(continued)
(continued)
Possible Worlds
Privacy - A
(continued)
The Weather is Not Boring!
Postmortem
Combat Robots Then
(continued)
The Original WWII Hackers
& Now
Hacking the Cosmos via
(continued)
Project Byzantium
Crowdsourced Particle
Astronomy
Twitter Revolution
Taking a Bite Out of
Meets Surveillance
IPv6 Now! What Does This Mean?
Logs with Sagan
State
Designing Free
Social Engineering
Social Engineering
Hardware
3D Printing: Making The ARRIStocrats:
DKIM: You’re Doing It Wrong
Friends in DC
Cable Modem Lulz
Activist DDoS
Attacks: When
Your Cell Phone is
The Emergence of Hacker as
Analogies &
Covered in Spiders!
Artist & Artist as Hacker
Metaphors Fail
Film Screening:
Spy Improv: Reality
Monochrom’s Kiki and
Unfiltered
Bubu: Rated R Us

SUNDAY
1000

1100
1200
1300

1400

1500

1600
1700
1800
1900

Dennis
When the Founder is
Gone: Open Projects
Longevity
Information
Distribution in the
Arab Spring
DUI/DWI Testing - A
Hacker’s View
How to Retrofit the
First Law of
Robotics
DARPA Funding for
Hackers: A Good
Thing?
Cell Site Location
Data &
Nontrespassory
Surveillance
Explosive
Steganography

Sassaman
Countermeasures
Against Ubiquitous
Surveillance

Nutt
Recent Advances in Single Packet
Authorization

Hackers & Media
Hype

Using Browser-based Tools to
Open Up the Web

Brain Chemistry

Manufacturing Modern Computer
Chips

Hacking the Spaces

Hack the Law

Dead in a Pool of
Blood & Millions in
Net Art

Why Names Matter

Privacy by Design

Re-wired: Hacking the Auditory
Experience

ICANN’s New gTLD
Declassifying Government
Program
Anti-Censorship &
Open Source
Anti-Surveillance
State of HTTPS
Telephony Network
Tools
Old School
Anti-Censorship Best
Phreaking
Practices
Closing Ceremonies






Download hope schedule



hope_schedule.pdf (PDF, 40.44 KB)


Download PDF







Share this file on social networks



     





Link to this page



Permanent link

Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line..




Short link

Use the short link to share your document on Twitter or by text message (SMS)




HTML Code

Copy the following HTML code to share your document on a Website or Blog




QR Code to this page


QR Code link to PDF file hope_schedule.pdf






This file has been shared publicly by a user of PDF Archive.
Document ID: 0000041667.
Report illicit content