Announcement

Collapse
No announcement yet.

DEF CON 7 Video .rss now on-line

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • DEF CON 7 Video .rss now on-line

    Also on i-tunes, here is all known video from DEF CON 7!

    https://www.defcon.org/podcast/defcon-7-video.rss

    Please post here with any errors or problems you find and we will fix them if at all possible.
    PGP Key: https://defcon.org/html/links/dtangent.html

  • #2
    Re: DEF CON 7 Video .rss now on-line

    This is not a video: mpg, mp4, avi, etc
    <?xml version="1.0" encoding="UTF-8"?>
    <rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
    <title>DEFCON 7 [Video] Speeches from the Hacker Convention.</title>
    <description>.DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;

    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <copyright>(c)2009 DEF CON Communications Inc, All rights reserved except for non-profit educational uses</copyright>
    <docs>http://blogs.law.harvard.edu/tech/rss</docs>
    <language>en-us</language>
    <lastBuildDate>Fri, 11 Dec 2009 15:39:05 -0800</lastBuildDate>
    <managingEditor>dtangent@defcon.org (The Dark Tangent)</managingEditor>
    <pubDate>Fri, 11 Dec 2009 15:38:48 -0800</pubDate>
    <webMaster>dtangent@defcon.org (The Dark Tangent)</webMaster>
    <generator>FeedForAll Mac v2.1 (2.1.0.1); http://www.FeedForAll.com/</generator>
    <itunes:subtitle>DEFCON 7 [Video] Speeches from the Hacker Convention.</itunes:subtitle>
    <itunes:summary>.DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA

    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:category text="Technology"/>
    <itunes:category text="Technology">
    <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Technology">
    <itunes:category text="Software How-To"/>
    </itunes:category>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>The Dark Tangent</itunes:author>
    <itunes:owner>
    <itunes:email>dtangent@defcon.org (The Dark Tangent)</itunes:email>
    <itunes:name>The Dark Tangent</itunes:name>
    </itunes:owner>
    <itunes:image href="http://media.defcon.org/dc-7/defcon-7-itunes-logo.jpg" />
    <itunes:explicit>no</itunes:explicit>
    <atom:link href="www.defcon.org/podcast/defcon-7-video.rss" rel="self" type="application/rss+xml"/>
    <image>
    <url>http://media.defcon.org/dc-7/defcon-7-itunes-logo.jpg</url>
    <title>DEFCON 7 [Video] Speeches from the Hacker Convention.</title>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <description></description>
    <width>141</width>
    <height>300</height>
    </image>
    <item>
    <title>Angus Blitter - Fear and Loathing in Cyberspace: The art and science of enemy profiling</title>
    <description>Quickly identifying your opponent, in any conflict, can mean the difference between success and failure. Knowing their capabilities, resources and limitations can provide the tactical advantage. The lack of this type of decision support is a serious deficiency in most information warrior's arsenals. Relying on single source intelligence is pure folly. Charlatans and carpetbaggers are salivating at the millions in government and corporate dollars earmarked for such a competitive advantage. Our discussion will provide a working definition for &quot;profiling&quot;, how it is used and why it effects everyone!&lt;br /&gt;
    &lt;br /&gt;
    Angus Blitter is the founder and Grand Poopa of HSK.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-16-Angus_Bitter-The_Art_and_Science_of_Enemy_Profiling.m4v" length="122824074" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">FE71E204-89D7-49ED-866E-BA4E098402B6</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:54 -0800</pubDate>
    <itunes:subtitle>Angus Blitter - Fear and Loathing in Cyberspace: The art and science of enemy profiling</itunes:subtitle>
    <itunes:summary>Quickly identifying your opponent, in any conflict, can mean the difference between success and failure. Knowing their capabilities, resources and limitations can provide the tactical advantage. The lack of this type of decision support is a serious deficiency in most information warrior's arsenals. Relying on single source intelligence is pure folly. Charlatans and carpetbaggers are salivating at the millions in government and corporate dollars earmarked for such a competitive advantage. Our discussion will provide a working definition for &quot;profiling&quot;, how it is used and why it effects everyone!

    Angus Blitter is the founder and Grand Poopa of HSK.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>1:02:04</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Angus Blitter</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Craig H. Rowland - How to be aware of security problems on your network.</title>
    <description><![CDATA[
    A critical component of network security is being aware of what is occurring on your systems so you can spot security problems before they become a big headache. The Abacus Project is a suite of free security tools that allows administrators to monitor critical aspects of system operations on a variety of Unix hosts to help increase their awareness.<br />
    <br />
    The core components of the project attempt to address the more common indicators of an attack such as:<br />
    1) Strange messages in audit files indicating errors or invalid input that indicate security problems.<br />
    2) Port probes that are a pre-cursor to attack and compromise.<br />
    3) Compromised user accounts and suspicious user activity.<br />
    <br />
    The three currently released tools address the above issues using generic techniques that work on a number systems. These tools are: Logcheck, PortSentry, and HostSentry.<br />
    <br />
    This talk will detail why it is important to watch your systems closely for problems and how these and other free security tools can help bolster your site security using a variety of simple techniques. <br />
    <br />
    Craig H. Rowland is a security software developer and consultant currently working for Cisco Systems Inc. His area of focus falls into network attack tool programming and intrusion detection systems. He is the author of several free security tools on the Internet and maintains the Psionic Software website to distribute security tools, papers, and advice.
    <br />
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA<br />
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.<br />
    ]]></description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-35-Rowland-How_to_be_aware_of_security_problems_on_your_netwo rk.m4v" length="98619528" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">C7FC9441-A545-46F1-B876-1BC7354F49D9</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:09 -0800</pubDate>
    <itunes:subtitle>Craig H. Rowland - How to be aware of security problems on your network.</itunes:subtitle>
    <itunes:summary>A critical component of network security is being aware of what is occurring on your systems so you can spot security problems before they become a big headache. The Abacus Project is a suite of free security tools that allows administrators to monitor critical aspects of system operations on a variety of Unix hosts to help increase their awareness.

    The core components of the project attempt to address the more common indicators of an attack such as:
    1) Strange messages in audit files indicating errors or invalid input that indicate security problems.
    2) Port probes that are a pre-cursor to attack and compromise.
    3) Compromised user accounts and suspicious user activity.

    The three currently released tools address the above issues using generic techniques that work on a number systems. These tools are: Logcheck, PortSentry, and HostSentry.

    This talk will detail why it is important to watch your systems closely for problems and how these and other free security tools can help bolster your site security using a variety of simple techniques.

    Craig H. Rowland is a security software developer and consultant currently working for Cisco Systems Inc. His area of focus falls into network attack tool programming and intrusion detection systems. He is the author of several free security tools on the Internet and maintains the Psionic Software website to distribute security tools, papers, and advice.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>49:49</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Craig H. Rowland</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Cult of the Dead Cow - BO2K!</title>
    <description>What will we be doing? R0xiN the HAU-aus, BIzaTch!!!@@!2121lf... But that goes with out saying. In addition to the rocking of the aforementioned house, we will also be releasing BO2k. We won't reveal our sekrets of BO-Fu, but trust me when we tell you that it will make BackOrifice v1.0 look like LOGO for the TI99/4a.&lt;br /&gt;
    &lt;br /&gt;
    Founded in 1984, the Cult of the Dead Cow (cDc) is the oldest group still active in the computer underground; the only group (aside from a few layme p1RaT3 gR0oPzZz) with a female group member; the only group to host its own annual HoHoCon hacker convention; and, with over 300 text files in circulation, the most prolific group. cDc is definitely cooler than the Legion of Doom (LoD), and more importantly, our T-shirts are more colorful. We also have stickers.&lt;br /&gt;
    &lt;br /&gt;
    Great, you may say, but have we ever disrupted communications on two continents by moving telecommunications satellites? Mhm. Hacked computing resources belonging to the three-letter agencies and the Pentagon? Yep. Altered environmental controls in local malls via modem? Done that. But unlike other hacker groups you've undoubtedly read about, we've never been caught.&lt;br /&gt;
    &lt;br /&gt;
    With qualifications like these, it's not surprising that over the past few years, the media has looked to us as the darling boy (and girl) torch-bearers of the DIY-cyber-hacker-underground movement. It's our unfortunate cross to bear. But as the whole of Generation X follows our lead into the new millennium, we feel it is our duty to our peers to maintain the struggle and &quot;raise high our freak flag,&quot; as it were. On their behalf, we intend to dominate and subvert the media wherever possible. Information is a virus. And we intend to infect all of you.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-44-Reznor-How_To_Use_BO2K.m4v" length="137902046" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">E55DA5CA-47E7-4189-8BD0-369B3DCB8C32</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:16 -0800</pubDate>
    <itunes:subtitle>Cult of the Dead Cow - BO2K!</itunes:subtitle>
    <itunes:summary>What will we be doing? R0xiN the HAU-aus, BIzaTch!!!@@!2121lf... But that goes with out saying. In addition to the rocking of the aforementioned house, we will also be releasing BO2k. We won't reveal our sekrets of BO-Fu, but trust me when we tell you that it will make BackOrifice v1.0 look like LOGO for the TI99/4a.

    Founded in 1984, the Cult of the Dead Cow (cDc) is the oldest group still active in the computer underground; the only group (aside from a few layme p1RaT3 gR0oPzZz) with a female group member; the only group to host its own annual HoHoCon hacker convention; and, with over 300 text files in circulation, the most prolific group. cDc is definitely cooler than the Legion of Doom (LoD), and more importantly, our T-shirts are more colorful. We also have stickers.

    Great, you may say, but have we ever disrupted communications on two continents by moving telecommunications satellites? Mhm. Hacked computing resources belonging to the three-letter agencies and the Pentagon? Yep. Altered environmental controls in local malls via modem? Done that. But unlike other hacker groups you've undoubtedly read about, we've never been caught.

    With qualifications like these, it's not surprising that over the past few years, the media has looked to us as the darling boy (and girl) torch-bearers of the DIY-cyber-hacker-underground movement. It's our unfortunate cross to bear. But as the whole of Generation X follows our lead into the new millennium, we feel it is our duty to our peers to maintain the struggle and &quot;raise high our freak flag,&quot; as it were. On their behalf, we intend to dominate and subvert the media wherever possible. Information is a virus. And we intend to infect all of you.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>1:09:41</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Cult of the Dead Cow</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Cyber - How to set up a firewall with xBSD O/S</title>
    <description>How to set up a firewall with xBSD O/S
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-34-Cyber-How_To_Use_BSD_Set_up_a_Firewall.m4v" length="118015067" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">51479472-AB2E-4395-8AD7-41E157AC21C1</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:08 -0800</pubDate>
    <itunes:subtitle>Cyber - How to set up a firewall with xBSD O/S</itunes:subtitle>
    <itunes:summary>How to set up a firewall with xBSD O/S

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>59:38</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Cyber</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Daremoe - The Firewall Appliance: Friend or Foe?</title>
    <description>An introduction to appliance firewalls. What they are, how they work and what you can expect when you encounter them in the wild. These &quot;new breed&quot; firewalls are popping up everywhere, so be prepared when you meet them...&lt;br /&gt;
    &lt;br /&gt;
    Daremoe is the Alpha-Dog of the WolfPak, a &quot;614 based group of security minded individuals&quot;. He is an independent computer security consultant with over ten years experience in e-commerce. He has just completed a comprehensive evaluation of appliance firewalls and their market.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-06-Darenroe-Firewall_Applience_friend_or_foe.m4v" length="76829842" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">5A73705D-A4A7-4AB7-9729-68CC46E84D60</guid>
    <pubDate>Fri, 4 Dec 2009 14:59:01 -0800</pubDate>
    <itunes:subtitle>Daremoe - The Firewall Appliance: Friend or Foe?</itunes:subtitle>
    <itunes:summary>An introduction to appliance firewalls. What they are, how they work and what you can expect when you encounter them in the wild. These &quot;new breed&quot; firewalls are popping up everywhere, so be prepared when you meet them...

    Daremoe is the Alpha-Dog of the WolfPak, a &quot;614 based group of security minded individuals&quot;. He is an independent computer security consultant with over ten years experience in e-commerce. He has just completed a comprehensive evaluation of appliance firewalls and their market.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>38:48</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Daremoe</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Dead Addict - Currency systems, credit systems and associations.</title>
    <description>After working for The Man (TM) for several years, DA is finally working for the little guy - implementing worldwide financial systems for multinational banking corporations.&lt;br /&gt;
    &lt;br /&gt;
    He will speak on currency systems, credit systems and associations, SET technology, its message flow, crypto usage, implementation issues, and surrounding industry issues. He will alsobriefly discuss security issues with current ecommerce implementations.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-25-Dead_Addict-SET_Technology.m4v" length="86916451" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">2ABE95A7-D62D-4477-8DF6-5C91B5AEED2B</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:02 -0800</pubDate>
    <itunes:subtitle>Dead Addict - Currency systems, credit systems and associations.</itunes:subtitle>
    <itunes:summary>After working for The Man (TM) for several years, DA is finally working for the little guy - implementing worldwide financial systems for multinational banking corporations.

    He will speak on currency systems, credit systems and associations, SET technology, its message flow, crypto usage, implementation issues, and surrounding industry issues. He will alsobriefly discuss security issues with current ecommerce implementations.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>43:54</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Dead Addict</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Deanna Peugeot - Embedded systems hacking.</title>
    <description>Deanna Peugeot - Embedded systems hacking.&lt;br /&gt;
    &lt;br /&gt;
    Embedded systems can often go where the average hacker cannot. They don't reside on the server to be detected by a vigilant sysop, nor do they need the dedicated resources of a computer. But no one in the hacking community seems to be taking advantage of this arena. This will cover the possible uses for a custom embedded system and how to go about creating it.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-52-Peugeot-Embedded_Systems_Hacking.m4v" length="100336830" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">DE1CAB85-56B2-42FD-9F29-F76214C0F030</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:21 -0800</pubDate>
    <itunes:subtitle>Deanna Peugeot - Embedded systems hacking.</itunes:subtitle>
    <itunes:summary>Deanna Peugeot - Embedded systems hacking.

    Embedded systems can often go where the average hacker cannot. They don't reside on the server to be detected by a vigilant sysop, nor do they need the dedicated resources of a computer. But no one in the hacking community seems to be taking advantage of this arena. This will cover the possible uses for a custom embedded system and how to go about creating it.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>50:41</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Deanna Peugeot</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Dr. Byte- IPv6: Who/What/When/Where/How/Why.</title>
    <description>The Internet Protocol has undergone substantial changes in past few years from version 4 (Classical IP) to version 6 (Next Generation IP). This presentation will overview who's using the new protocol, what the new protocol's features are, when it will become mainstream, where it's being deployed, how the transition from IPv4 to IPv6 is planned, and why we need a new fundamental protocol on the Internet. This speech will contain many technical details and will assume the knowledge of the basics of TCP/IP.&lt;br /&gt;
    &lt;br /&gt;
    Dr. Byte is a Ph.D. candidate in Computer Engineering and an instructor of Computer Engineering at a major university. He received his B.S. and M.S. in Computer Engineering in 1994 and 1997 respectively. For his M.S., he worked with a real time bit error rate simulator, and developed a next generation real time hardware system for bit error rate simulations. He has developed a 16 bit RISC microprocessor in VHDL in a Field Programmable Gate Array (FPGA) able to run compiled 'C' code. His research interests include developing a taxonomy of attacks and applying it to different network environments. He has co-authored 3 papers on IEEE 802.11 and IPv6.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-33-Dr.Byte-IPv6%20Who%20What%20When%20Where%20How%20Why.m4v" length="110655692" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">433E4A30-5E6F-4F7D-9B25-C85B52D914CF</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:07 -0800</pubDate>
    <itunes:subtitle>Dr. Byte- IPv6: Who/What/When/Where/How/Why.</itunes:subtitle>
    <itunes:summary>The Internet Protocol has undergone substantial changes in past few years from version 4 (Classical IP) to version 6 (Next Generation IP). This presentation will overview who's using the new protocol, what the new protocol's features are, when it will become mainstream, where it's being deployed, how the transition from IPv4 to IPv6 is planned, and why we need a new fundamental protocol on the Internet. This speech will contain many technical details and will assume the knowledge of the basics of TCP/IP.

    Dr. Byte is a Ph.D. candidate in Computer Engineering and an instructor of Computer Engineering at a major university. He received his B.S. and M.S. in Computer Engineering in 1994 and 1997 respectively. For his M.S., he worked with a real time bit error rate simulator, and developed a next generation real time hardware system for bit error rate simulations. He has developed a 16 bit RISC microprocessor in VHDL in a Field Programmable Gate Array (FPGA) able to run compiled 'C' code. His research interests include developing a taxonomy of attacks and applying it to different network environments. He has co-authored 3 papers on IEEE 802.11 and IPv6.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>55:55</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Dr. Byte</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Freaky - Introduction to Macintosh Security</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-31-Freaky-Macintosh%20Security.m4v" length="82221710" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">99B60638-0374-4796-8AE1-EEBA1EA90C62</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:06 -0800</pubDate>
    <itunes:subtitle>Freaky - Introduction to Macintosh Security</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>42:32</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Freaky</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Gail Thackeray &amp; Kevin Higgins - Legal Q &amp; A</title>
    <description>Gail Thackeray - Maricopa Count Prosecutor,AZ - &lt;br /&gt;
    Kevin Higgins - Nevada Attorney General's Office - &lt;br /&gt;
    &lt;br /&gt;
    &lt;br /&gt;
    Each will do a brief thing on a topic near &amp; dear to their hearts, and then open the session to an &quot;ask the prosecutor&quot; Q &amp; A so people with Burning Questions can ask about whatever interests them.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-07-Gail_Thackery-Legal_Q_and_A.m4v" length="97897097" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">30A09F1B-04CF-4748-831F-733568B32CDA</guid>
    <pubDate>Fri, 4 Dec 2009 14:59:09 -0800</pubDate>
    <itunes:subtitle>Gail Thackeray &amp; Kevin Higgins - Legal Q &amp; A</itunes:subtitle>
    <itunes:summary>Gail Thackeray - Maricopa Count Prosecutor,AZ - Kevin Higgins - Nevada Attorney General's Office - Each will do a brief thing on a topic near &amp; dear to their hearts, and then open the session to an &quot;ask the prosecutor&quot; Q &amp; A so people with Burning Questions can ask about whatever interests them. DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>49:27</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Gail Thackeray &amp; Kevin Higgins</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Gh0st - Phreaking and PBX tricks</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-05-Gh0st-Phreaking_and_PBX.m4v" length="102806321" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">4265DAE0-D996-4979-B4EA-E747F47844F8</guid>
    <pubDate>Fri, 4 Dec 2009 14:59:08 -0800</pubDate>
    <itunes:subtitle>Gh0st - Phreaking and PBX tricks</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>51:56</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Gh0st</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Ian Goldberg -Using the Internet Pseudonymously: One Year Later</title>
    <description>&lt;br /&gt;
    Last year we told you about the plans for the Freedom network from Zero-Knowledge Systems: user-trivial, strong-crypto, pseudonymous use of the Internet. See how far we've gotten now. We will present the current status of the network, and discuss the challenges and obstacles we've encountered along the way.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-39-Ian_Goldberg-Zero_Knowledge_Update.m4v" length="110426332" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">92C0678C-EFE0-4BBA-9A15-0D8C4286BCBC</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:11 -0800</pubDate>
    <itunes:subtitle>Ian Goldberg -Using the Internet Pseudonymously: One Year Later</itunes:subtitle>
    <itunes:summary>Last year we told you about the plans for the Freedom network from Zero-Knowledge Systems: user-trivial, strong-crypto, pseudonymous use of the Internet. See how far we've gotten now. We will present the current status of the network, and discuss the challenges and obstacles we've encountered along the way.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>55:48</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Ian Goldberg</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Ira Winkler - The myths associated with hiring hackers.</title>
    <description>&lt;br /&gt;
    While Ira Winkler is not an advocate of hiring your off the street hacker, he has come to the opinion that many of them are more useful than people who call themselves security professionals. He believes that compounding the problems are bureaucrats who don't understand the problem, and try to form solutions without thinking. For example, the Critical Infrastructure Assurance Office (CIAO), formed by a Presidential Directive to help protect the Critical Infrastructure, was considering a plan to recruit a group of teenagers who they would guide through their college careers to be the Info Warriors of the future.&lt;br /&gt;
    &lt;br /&gt;
    Ira talks about the myths associated with hiring hackers and security professionals, as well as the problems with the efforts to supposedly protect the Infrastructure. An &quot;Are you Clueless?&quot; test for &quot;Security professionals&quot; is given. Also recommendations to excel in the corporate world are given for hackers who are really skilled.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-23-Ira_Winkler-Myths_of_Hiring_Hackers.m4v" length="79591155" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">9D51CEFF-80DE-4504-853A-E231F1E172B9</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:00 -0800</pubDate>
    <itunes:subtitle>Ira Winkler - The myths associated with hiring hackers.</itunes:subtitle>
    <itunes:summary>While Ira Winkler is not an advocate of hiring your off the street hacker, he has come to the opinion that many of them are more useful than people who call themselves security professionals. He believes that compounding the problems are bureaucrats who don't understand the problem, and try to form solutions without thinking. For example, the Critical Infrastructure Assurance Office (CIAO), formed by a Presidential Directive to help protect the Critical Infrastructure, was considering a plan to recruit a group of teenagers who they would guide through their college careers to be the Info Warriors of the future.

    Ira talks about the myths associated with hiring hackers and security professionals, as well as the problems with the efforts to supposedly protect the Infrastructure. An &quot;Are you Clueless?&quot; test for &quot;Security professionals&quot; is given. Also recommendations to excel in the corporate world are given for hackers who are really skilled.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>40:12</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Ira Winkler</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>James Jorasch - Hacking Las Vegas</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-10-Jorasch-Hacking_Las_Vegas.m4v" length="93916793" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">65D09DCC-7D3F-4999-B8EF-0D0E08198CD9</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:09 -0800</pubDate>
    <itunes:subtitle>James Jorasch - Hacking Las Vegas</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>47:27</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>James Jorasch</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Jason Scott - TEXTFILES, G-PHILES, AND LOG FILES: Remembering the 1980's Through ASCII</title>
    <description>In the 1980's, life started to move online, bringing with it all the wonder, terror, and breadth of human nature. Most markedly, an entire generation of teenagers turned their energies and efforts onto this growing culture and turned the world of Bulletin Board Systems into a combination street corner and clubhouse, sharing their knowledge, lying and bragging into infamy, and creating a shared experience that lasts in their hearts and minds to this day as they become the foundation of the Internet Society.&lt;br /&gt;
    &lt;br /&gt;
    While the unique forces that combined to make BBSes the experience they were have since shifted and formed other cultures in the years since, a feel for the 1980's can be found in the Textfiles (also known as g-files or 'philes') that nearly every self-respecting BBS traded, offered, or created as a matter of gaining notoriety (and more importantly, callers) in a sea of similar voices. In these textfiles, readers can reminisce or learn anew about what the BBS experience meant to those who lived through it, and easy parallels can be drawn to the 'scenes' that are now thriving online today.&lt;br /&gt;
    &lt;br /&gt;
    This talk will attempt to give historical perspective and narrative to the BBS 'scene' of the 1980's, presented by a user who was around for a good portion of it and took notes. Expect shouted refutations from the audience and eerily familiar battles waged across the message boards to live again.&lt;br /&gt;
    &lt;br /&gt;
    Jason Scott (Formerly The Slipped Disk) has been an observer and participant in the world of BBSs since about 1982, cutting his teeth on Boards such as OSUNY, Sherwood Forest II and III, Milliways/Outland, The Dark Side of The Moon AE/BBS, as well as hundreds of others. His experience in BBS culture of the 80's ranges from Compuserve and The Source to Deversi-dials, AE Lines and anything else that gave a carrier when you called it. He is best known as the SysOp of The Works BBS, a textfile-only board that he ran from 1986-1988 before switching to SysOp-At-Large from 1989 to the present. Realizing an entire generation's shared lore was being diluted and lost, he has started the site www.textfiles.com, dedicated to preserving all things ASCII from the 1980's. This web site is slowly killing him.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-43-Jason_Scott-Textfiles_GPhiles_and_log_files_remembering_the_80 s_through_text_files.m4v" length="143912754" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">736856AD-49DC-4345-B0CD-C2689769E936</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:15 -0800</pubDate>
    <itunes:subtitle>Jason Scott - TEXTFILES, G-PHILES, AND LOG FILES: Remembering the 1980's Through ASCII</itunes:subtitle>
    <itunes:summary>In the 1980's, life started to move online, bringing with it all the wonder, terror, and breadth of human nature. Most markedly, an entire generation of teenagers turned their energies and efforts onto this growing culture and turned the world of Bulletin Board Systems into a combination street corner and clubhouse, sharing their knowledge, lying and bragging into infamy, and creating a shared experience that lasts in their hearts and minds to this day as they become the foundation of the Internet Society.

    While the unique forces that combined to make BBSes the experience they were have since shifted and formed other cultures in the years since, a feel for the 1980's can be found in the Textfiles (also known as g-files or 'philes') that nearly every self-respecting BBS traded, offered, or created as a matter of gaining notoriety (and more importantly, callers) in a sea of similar voices. In these textfiles, readers can reminisce or learn anew about what the BBS experience meant to those who lived through it, and easy parallels can be drawn to the 'scenes' that are now thriving online today.

    This talk will attempt to give historical perspective and narrative to the BBS 'scene' of the 1980's, presented by a user who was around for a good portion of it and took notes. Expect shouted refutations from the audience and eerily familiar battles waged across the message boards to live again.

    Jason Scott (Formerly The Slipped Disk) has been an observer and participant in the world of BBSs since about 1982, cutting his teeth on Boards such as OSUNY, Sherwood Forest II and III, Milliways/Outland, The Dark Side of The Moon AE/BBS, as well as hundreds of others. His experience in BBS culture of the 80's ranges from Compuserve and The Source to Deversi-dials, AE Lines and anything else that gave a carrier when you called it. He is best known as the SysOp of The Works BBS, a textfile-only board that he ran from 1986-1988 before switching to SysOp-At-Large from 1989 to the present. Realizing an entire generation's shared lore was being diluted and lost, he has started the site www.textfiles.com, dedicated to preserving all things ASCII from the 1980's. This web site is slowly killing him.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>1:12:44</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Jason Scott</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>John Q. Newman - Personal Privacy and big brother databases.</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-30-John_Q_Newman-Personal_Privacy.m4v" length="117568696" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">E6E4AE9B-B41C-4442-AA60-75F1FD0D4A13</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:05 -0800</pubDate>
    <itunes:subtitle>John Q. Newman - Personal Privacy and big brother databases.</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>59:24</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>John Q. Newman</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Jonathan Wignall - Extra Border Hacking - How a company can be hacked without the hacker ever picking on that companies machine.</title>
    <description>Companies may defend themselves from hacking attacks from the internet by using firewalls and other defences, but what about their&lt;br /&gt;
    defences beyond their site's boundary? Can attacks here cause damage? or enable an intruder to break into their sites? This presentation will outline what tricks can happen on the internet and how you can defend yourself outside your normal area of control, without resorting to illegal measures.&lt;br /&gt;
    &lt;br /&gt;
    An experienced college lecturer despite being under Thirty years of age. Is well used to public speaking and his research interest is in the field of Internet Security. Head of programme for higher education courses in Computer Networking at St Helens college, he is also actively tring to establish simular courses on Information Security.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-41-Wignall-Extra_Border_Hacking.m4v" length="115591539" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">4642C44A-6A98-4A60-9229-2A75D89B6890</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:13 -0800</pubDate>
    <itunes:subtitle>Jonathan Wignall - Extra Border Hacking - How a company can be hacked without the hacker ever picking on that companies machine.</itunes:subtitle>
    <itunes:summary>Companies may defend themselves from hacking attacks from the internet by using firewalls and other defences, but what about their
    defences beyond their site's boundary? Can attacks here cause damage? or enable an intruder to break into their sites? This presentation will outline what tricks can happen on the internet and how you can defend yourself outside your normal area of control, without resorting to illegal measures.

    An experienced college lecturer despite being under Thirty years of age. Is well used to public speaking and his research interest is in the field of Internet Security. Head of programme for higher education courses in Computer Networking at St Helens college, he is also actively tring to establish simular courses on Information Security.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>58:24</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Jonathan Wignall</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Kevin Poulsen &amp; Jennifer Grannick - The Legalities and Practicalities of Searches and Interrogations.</title>
    <description>You all know who Kevin Poulsen is. If you don't, please go learn.&lt;br /&gt;
    &lt;br /&gt;
    Jennifer Stisa Granick is a criminal defense attorney in San Francisco, California. She defends people charged with computer-related crimes, as well as other offenses. Jennifer has been published in Wired and the magazine for the National Association of Criminal Defense Lawyers.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-04-Granick_and_Poulson-Issues_in_interrogations.m4v" length="82892878" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">32121EB6-D576-483C-9080-9E8511A34CA9</guid>
    <pubDate>Fri, 4 Dec 2009 14:59:06 -0800</pubDate>
    <itunes:subtitle>Kevin Poulsen &amp; Jennifer Grannick - The Legalities and Practicalities of Searches and Interrogations.</itunes:subtitle>
    <itunes:summary>You all know who Kevin Poulsen is. If you don't, please go learn.

    Jennifer Stisa Granick is a criminal defense attorney in San Francisco, California. She defends people charged with computer-related crimes, as well as other offenses. Jennifer has been published in Wired and the magazine for the National Association of Criminal Defense Lawyers.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>41:52</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Kevin Poulsen &amp; Jennifer Grannick</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>M0dify - Introduction to Scanning</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-24-Modify-Introduction_to_Scanning.m4v" length="72774153" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">F5186971-E9FD-4EC2-965A-A3BF44F22475</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:01 -0800</pubDate>
    <itunes:subtitle>M0dify - Introduction to Scanning</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>36:45</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>M0dify</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Michael J. Martinez - Hackers and the Media: A Love-Hate Thing.</title>
    <description>For hackers, contact with the media is both exciting and frustrating. Everybody loves to grab that 15 minutes of fame and set the record straight, but the media has this annoying habit of getting things wrong, at least from a hacker's point of view. Mainstream reporters feel the same way -- hacking is cool, sexy, and guarantees readership. But hackers are so evasive, way too full of themselves, and then there's this godawful technology to try to understand. How can reporters and hackers work together, or at least understand each other?&lt;br /&gt;
    &lt;br /&gt;
    Michael J. Martinez reports on technology for ABCNEWS.com. In addition to covering more mainstream issues, Martinez has written about hacker culture, the VX community, the Pentagon's &quot;cyberwar&quot; problems, and the Melissa virus. His articles have been featured on Slashdot and the Hacker News Network.&lt;br /&gt;

    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-20-Martinez-Hackers%20and%20the%20Media%20a%20Love-Hate%20Thing.m4v" length="84425890" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">4B33725D-DDC6-40AD-ACC4-EE499371D8F8</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:57 -0800</pubDate>
    <itunes:subtitle>Michael J. Martinez - Hackers and the Media: A Love-Hate Thing.</itunes:subtitle>
    <itunes:summary>For hackers, contact with the media is both exciting and frustrating. Everybody loves to grab that 15 minutes of fame and set the record straight, but the media has this annoying habit of getting things wrong, at least from a hacker's point of view. Mainstream reporters feel the same way -- hacking is cool, sexy, and guarantees readership. But hackers are so evasive, way too full of themselves, and then there's this godawful technology to try to understand. How can reporters and hackers work together, or at least understand each other?

    Michael J. Martinez reports on technology for ABCNEWS.com. In addition to covering more mainstream issues, Martinez has written about hacker culture, the VX community, the Pentagon's &quot;cyberwar&quot; problems, and the Melissa virus. His articles have been featured on Slashdot and the Hacker News Network.


    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>42:38</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Michael J. Martinez</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Mr Phillip J. Loranger - The United States Army. The ethics/morality/practicality/patriotism of hacking.</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-22-Loranger-Ethikcs_Morality_Practicality_and_Patriotism_of_Ha cking.m4v" length="49591211" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">6B0DFD77-E492-455B-B4C7-8C2D507E4B89</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:59 -0800</pubDate>
    <itunes:subtitle>Mr Phillip J. Loranger - The United States Army. The ethics/morality/practicality/patriotism of hacking.</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>25:01</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Mr Phillip J. Loranger</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Panel - Meet the Feds</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-13-Panel-Meet_the_Fed.m4v" length="111175810" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">58F2AA0A-D35E-46C6-A23A-8E2A22FCFB69</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:51 -0800</pubDate>
    <itunes:subtitle>Panel - Meet the Feds</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>56:10</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Panel</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Parekh - Crypto Tales</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-47-Parekh-Crypto_Tales.m4v" length="59426239" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">088213CB-7292-4DD8-A3D7-3AC8E283DF1B</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:19 -0800</pubDate>
    <itunes:subtitle>Parekh - Crypto Tales</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>30:00</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Parekh</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Peter Shipley - Intro to TCP/IP exploits.</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-21-Peter_Shipley-Intro_to_TCPIP.m4v" length="104403611" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">AC15D4B9-7BE6-4923-A5D3-35F1BB30034F</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:58 -0800</pubDate>
    <itunes:subtitle>Peter Shipley - Intro to TCP/IP exploits.</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>52:45</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Peter Shipley</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Peter Stephenson - Introduction to Cyber Forensic Analysis</title>
    <description>This session will address the techniques used to investigate network-based intrusions, especially those originating from the public Internet. Emphasis will be on techniques that provide an acceptable chain of evidence for use by law enforcement or in anticipation of civil litigation. We will cover back-tracing, forensic tools, end-to-end tracing and evidence collection and preservation as well as the forensic use of RMON2-based tools for documenting the path of an attack.&lt;br /&gt;
    &lt;br /&gt;
    Peter Stephenson is a well-known writer, consultant and lecturer with an international reputation in large scale computer networks and information protection. He has lectured extensively on network planning, implementation, technology and security. He has written or co-authored 14 books (including foreign language translations) and several hundred articles in major national and international trade publications. He is the principle consultant for InfoSEC Technologies division of Sanda International Corp.&lt;br /&gt;
    &lt;br /&gt;
    Mr. Stephenson has participated in investigations of computer system intrusions, Internet misuse and abuse and has performed forensic analysis of computer disk drives as well as backtracing analysis of intrusions coming from the Internet. He has used forensic techniques to recover lost data from computer disk drives. &lt;br /&gt;
    &lt;br /&gt;
    Stephenson is a member of the Information Systems Audit and Control Association (ISACA), the Information Systems Security Association (ISSA) and the High Technology Crime Investigation Association (HTCIA). He provides volunteer assistance on request to the Michigan State Police and other law enforcement agencies.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-14-Stephenson-Cyber_Forensics.m4v" length="126351584" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">FBA59046-FDBE-4892-89E8-68EACBEA8882</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:52 -0800</pubDate>
    <itunes:subtitle>Peter Stephenson - Introduction to Cyber Forensic Analysis</itunes:subtitle>
    <itunes:summary>This session will address the techniques used to investigate network-based intrusions, especially those originating from the public Internet. Emphasis will be on techniques that provide an acceptable chain of evidence for use by law enforcement or in anticipation of civil litigation. We will cover back-tracing, forensic tools, end-to-end tracing and evidence collection and preservation as well as the forensic use of RMON2-based tools for documenting the path of an attack.

    Peter Stephenson is a well-known writer, consultant and lecturer with an international reputation in large scale computer networks and information protection. He has lectured extensively on network planning, implementation, technology and security. He has written or co-authored 14 books (including foreign language translations) and several hundred articles in major national and international trade publications. He is the principle consultant for InfoSEC Technologies division of Sanda International Corp.

    Mr. Stephenson has participated in investigations of computer system intrusions, Internet misuse and abuse and has performed forensic analysis of computer disk drives as well as backtracing analysis of intrusions coming from the Internet. He has used forensic techniques to recover lost data from computer disk drives.

    Stephenson is a member of the Information Systems Audit and Control Association (ISACA), the Information Systems Security Association (ISSA) and the High Technology Crime Investigation Association (HTCIA). He provides volunteer assistance on request to the Michigan State Police and other law enforcement agencies.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>1:03:51</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Peter Stephenson</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Prof. Feedlebom- Followup on Micropower Radio.</title>
    <description>Prof. Feedlebom- Followup on Micropower Radio.&lt;br /&gt;
    &lt;br /&gt;
    Last DefCon, Prof. Feedlebom led a discussion on Micropower Radio that kinda glossed over a lot of the technical details. This year, he returns to discuss in more detail some of the things required to place a micropower station on the air. Will also include a short synopsis on the current state of Micropower Radio, including the effort to legalize it in the United States. Handouts from last year's session will be available for those who did not recieve them in the mail (sorry).&lt;br /&gt;
    &lt;br /&gt;
    Prof. Feedlebom has operated The Voice of Mercury and the Desert Crossing Radio broadcasts for the last five years. While he's taking the year off this year from the Big Broadcast, he has been responsible for strange radio emissions that have been heard in Los Angeles and Kern Counties on a variety of frequencies. He also acts as the chief engineer for Radio Invasion, a former micropower station now broadcasting through Real Audio.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-45-Prof_Feedlebom-Followup_on_Micropower_Radio.m4v" length="77886118" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">973C0444-B994-4D70-8E94-C19E72EB04D5</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:18 -0800</pubDate>
    <itunes:subtitle>Prof. Feedlebom- Followup on Micropower Radio.</itunes:subtitle>
    <itunes:summary>Prof. Feedlebom- Followup on Micropower Radio.

    Last DefCon, Prof. Feedlebom led a discussion on Micropower Radio that kinda glossed over a lot of the technical details. This year, he returns to discuss in more detail some of the things required to place a micropower station on the air. Will also include a short synopsis on the current state of Micropower Radio, including the effort to legalize it in the United States. Handouts from last year's session will be available for those who did not recieve them in the mail (sorry).

    Prof. Feedlebom has operated The Voice of Mercury and the Desert Crossing Radio broadcasts for the last five years. While he's taking the year off this year from the Big Broadcast, he has been responsible for strange radio emissions that have been heard in Los Angeles and Kern Counties on a variety of frequencies. He also acts as the chief engineer for Radio Invasion, a former micropower station now broadcasting through Real Audio.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>39:20</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Prof. Feedlebom</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Punkis - Introduction to TCPIP</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-18-Punkis-Introduction_to_TCPIP.m4v" length="97469924" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">90A161B5-7333-45E3-A24F-91882F7FBFBD</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:55 -0800</pubDate>
    <itunes:subtitle>Punkis - Introduction to TCPIP</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>49:14</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Punkis</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Robert Lupo - Introduction to Computer Viruses.</title>
    <description>This class covers how different virus work and how to defend agent them, including: Boot Sector Virus, File infecters, Multi parti, Macro, and Fakes in the world.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-28-Lupo-Introduction_to_Viruses.m4v" length="111081860" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">FBEAB80B-BD1E-4915-B994-5AC52BC9B050</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:04 -0800</pubDate>
    <itunes:subtitle>Robert Lupo - Introduction to Computer Viruses.</itunes:subtitle>
    <itunes:summary>This class covers how different virus work and how to defend agent them, including: Boot Sector Virus, File infecters, Multi parti, Macro, and Fakes in the world.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>56:07</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Robert Lupo</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Robert Windmann- The Defcon Proxy Server</title>
    <description>R will give an overview of the Defcon Proxy Server - what it is, how it came to be, and how to access and use it. Don't want your boss to know where you're surfing to on his dime? Would you like to anonymously view your artwork after the fact? If this is you, don't miss this informational talk. It will cover new features and access policies.&lt;br /&gt;
    &lt;br /&gt;
    R started out in life as a BBS operator in 1989. After setting up Unix boxes to provide Usenet and Email via UUCP for his customers, he gave out shell accounts on the same machines - and after cleaning up that mess, he was a Security Expert! He also authored the first Windows based email application and roaming code for American Mobile Satellite Corporation and the Trimble C/GPS transceiver, and was head of Network Security for Telegroup, Inc.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-38-Windmann-Defcon_Proxy_Server.m4v" length="46222482" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">6EB2BF9A-2CE9-45B3-B261-49B22535A03C</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:10 -0800</pubDate>
    <itunes:subtitle>Robert Windmann- The Defcon Proxy Server</itunes:subtitle>
    <itunes:summary>R will give an overview of the Defcon Proxy Server - what it is, how it came to be, and how to access and use it. Don't want your boss to know where you're surfing to on his dime? Would you like to anonymously view your artwork after the fact? If this is you, don't miss this informational talk. It will cover new features and access policies.

    R started out in life as a BBS operator in 1989. After setting up Unix boxes to provide Usenet and Email via UUCP for his customers, he gave out shell accounts on the same machines - and after cleaning up that mess, he was a Security Expert! He also authored the first Windows based email application and roaming code for American Mobile Satellite Corporation and the Trimble C/GPS transceiver, and was head of Network Security for Telegroup, Inc.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>23:19</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Robert Windmann</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Rooster - Insecurities in Networking Devices</title>
    <description>Routers and switches. These devices make up the core of what is networking. Devastatingly important, this infrastructure is key to a properly working environment. Amazingly, many administrators don't know the weaknesses and holes that are being exposed to the Internet. This talk will discuss the most common security issues in routers and switches, how they can be exploited, what a person gains from this, and how to prevent people from gaining access to your network equipment.&lt;br /&gt;
    &lt;br /&gt;
    Rooster has extensive knowledge of systems and networking. his experience includes all manner of networking and systems including; ATM, BGP, GigabitEthernet, FDDI, etc. Rooster is currently a network engineer at a fortune 500 company where he maintains the Internet connectivity.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-19-Rooster-Insecurities_in_networking_devices.m4v" length="69910060" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">BDA96273-8FFF-45EB-96B6-A5B46078B1E1</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:56 -0800</pubDate>
    <itunes:subtitle>Rooster - Insecurities in Networking Devices</itunes:subtitle>
    <itunes:summary>Routers and switches. These devices make up the core of what is networking. Devastatingly important, this infrastructure is key to a properly working environment. Amazingly, many administrators don't know the weaknesses and holes that are being exposed to the Internet. This talk will discuss the most common security issues in routers and switches, how they can be exploited, what a person gains from this, and how to prevent people from gaining access to your network equipment.

    Rooster has extensive knowledge of systems and networking. his experience includes all manner of networking and systems including; ATM, BGP, GigabitEthernet, FDDI, etc. Rooster is currently a network engineer at a fortune 500 company where he maintains the Internet connectivity.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>35:18</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Rooster</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Sarah Gordon - Viruses on (and off) the Internet. Panel Session.</title>
    <description>&lt;br /&gt;
    Computer viruses are currently freely available on the Internet, as well as via various mailing lists. The recent Melissa virus incident has focused attention on some issues surrounding the public availability of viruses. The panel (representing virus writers, antivirus product developers, open source advocates and academics) will represent a wide range of views on topics such as: &quot;Is it cool to make viruses available via the Internet? Is posting of viral source code to mailing lists as a 'necessary evil' which can force developers to improve products. Should virus writing itself be illegal?&quot;. We want to hear *your* views, too, so the session will end with Q&amp;A Interactive.&lt;br /&gt;
    &lt;br /&gt;
    Sarah Gordon graduated from Indiana University with special projects in both UNIX system security and ethical issues in technology. She currently works with the anti-virus science and technology R&amp;D team at IBM Thomas J. Watson Research Center. Her current research projects include development of antivirus product certification standards, test criteria, and testing models. She has been featured in publications such as Forbes, IEEE Monitor, The Wall Street Journal, and WIRED, and is published regularly in publications such as Computers &amp; Security, Network Security Advisor and Virus Bulletin. She has won several awards for her work in various aspects of computing technology, and volunteers in an advisory capacity to Virus Bulletin, The WildList Organization, and The European Institute for Computer Antivirus Research.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-26-Sarah_Gordon_with_Panel-Viruses_On_and_offf_the_internet.m4v" length="64305499" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">E405132E-9D1E-4764-84C0-AE86C9891AB0</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:03 -0800</pubDate>
    <itunes:subtitle>Sarah Gordon - Viruses on (and off) the Internet. Panel Session.</itunes:subtitle>
    <itunes:summary>Computer viruses are currently freely available on the Internet, as well as via various mailing lists. The recent Melissa virus incident has focused attention on some issues surrounding the public availability of viruses. The panel (representing virus writers, antivirus product developers, open source advocates and academics) will represent a wide range of views on topics such as: &quot;Is it cool to make viruses available via the Internet? Is posting of viral source code to mailing lists as a 'necessary evil' which can force developers to improve products. Should virus writing itself be illegal?&quot;. We want to hear *your* views, too, so the session will end with Q&amp;A Interactive. Sarah Gordon graduated from Indiana University with special projects in both UNIX system security and ethical issues in technology. She currently works with the anti-virus science and technology R&amp;D team at IBM Thomas J. Watson Research Center. Her current research projects include development of antivirus product certification standards, test criteria, and testing models. She has been featured in publications such as Forbes, IEEE Monitor, The Wall Street Journal, and WIRED, and is published regularly in publications such as Computers &amp; Security, Network Security Advisor and Virus Bulletin. She has won several awards for her work in various aspects of computing technology, and volunteers in an advisory capacity to Virus Bulletin, The WildList Organization, and The European Institute for Computer Antivirus Research. DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>32:28</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Sarah Gordon</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Steve Mann: The Inventor of the So Called Wearable Computer, Wearable Systems &amp; Computing.</title>
    <description><![CDATA[Steve Mann - Inventor of the so-called "wearable computer"<br />
    <br />
    Steve Mann, inventor of the so-called "wearable computer" (WearComp) and of the EyeTap video camera and reality mediator (WearCam), is currently a faculty member at University of Toronto, Department of Electrical and Computer Engineering.<br />
    <br />
    Dr. Mann has been working on his WearComp invention for more than 20 years, dating back to his high school days in the 1970s. He brought his inventions and ideas to the Massachusetts Institute of Technology in 1991, founding, what was to later become the MIT Wearable Computing Project. He also built the world's first covert fully functional WearComp with display and camera concealed in ordinary eyeglasses in 1995, for the creation of his award winning documentary ShootingBack. He received his PhD degree from MIT in 1997 in the new field he had initiated. He is also the inventor of the chirplet transform, a new mathematical framework for signal processing. Mann was both the founder and the Publications Chair of the first IEEE International Symposium on Wearable Computing (ISWC97).<br />
    <br />
    Mann has chaired the first Special Issue on Wearable Computing in Personal Technologies Journal, and has given numerous Keynote Addresses on the subject, including the Keynote at the first International Conference on Wearable Computing, the Keynote at the Virtual Reality conference, and the Keynote at the McLuhan Conference on Culture and Technology, on the subject of Privacy issues and Wearable Computers. He can be reached via e-mail at mann@eecg.toronto.edu
    <br />
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA<br />
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.<br />]]></description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-53-Mann-Wearable_Systems.m4v" length="110286244" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">578E91F7-804F-451F-B20D-2838414485DD</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:17 -0800</pubDate>
    <itunes:subtitle>Steve Mann: The Inventor of the So Called Wearable Computer, Wearable Systems &amp; Computing.</itunes:subtitle>
    <itunes:summary>Steve Mann - Inventor of the so-called &quot;wearable computer&quot;

    Steve Mann, inventor of the so-called &quot;wearable computer&quot; (WearComp) and of the EyeTap video camera and reality mediator (WearCam), is currently a faculty member at University of Toronto, Department of Electrical and Computer Engineering.

    Dr. Mann has been working on his WearComp invention for more than 20 years, dating back to his high school days in the 1970s. He brought his inventions and ideas to the Massachusetts Institute of Technology in 1991, founding, what was to later become the MIT Wearable Computing Project. He also built the world's first covert fully functional WearComp with display and camera concealed in ordinary eyeglasses in 1995, for the creation of his award winning documentary ShootingBack. He received his PhD degree from MIT in 1997 in the new field he had initiated. He is also the inventor of the chirplet transform, a new mathematical framework for signal processing. Mann was both the founder and the Publications Chair of the first IEEE International Symposium on Wearable Computing (ISWC97).

    Mann has chaired the first Special Issue on Wearable Computing in Personal Technologies Journal, and has given numerous Keynote Addresses on the subject, including the Keynote at the first International Conference on Wearable Computing, the Keynote at the Virtual Reality conference, and the Keynote at the McLuhan Conference on Culture and Technology, on the subject of Privacy issues and Wearable Computers. He can be reached via e-mail at mann@eecg.toronto.edu

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>55:43</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Steve Mann</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Steven Alexander- Firewalls: Trends and Problems.</title>
    <description>&lt;br /&gt;
    This talk will cover some of the new firewalling trends and how many of them are detrimental to security. The focus of this talk will be on how the discussed trends work and how they can be used by an attacker to defeat security, and how security problems can be avoided. The discussion will not cover specific products in order to allow anyone to apply the subject matter&lt;br /&gt;
    to their current configuration.&lt;br /&gt;
    &lt;br /&gt;
    Steven works for a small ISP, attends his local college as a math major and spends his free time studying cryptography.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-49-Alexnder-Firewalls_Trends_and_Problems.m4v" length="112148401" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">EECA28CD-6B19-44F7-9A4E-74C9D214C3B6</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:20 -0800</pubDate>
    <itunes:subtitle>Steven Alexander- Firewalls: Trends and Problems.</itunes:subtitle>
    <itunes:summary>This talk will cover some of the new firewalling trends and how many of them are detrimental to security. The focus of this talk will be on how the discussed trends work and how they can be used by an attacker to defeat security, and how security problems can be avoided. The discussion will not cover specific products in order to allow anyone to apply the subject matter
    to their current configuration.

    Steven works for a small ISP, attends his local college as a math major and spends his free time studying cryptography.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>56:40</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Steven Alexander</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Swift - IP V.6 Overview</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-03-Swift-IP6.m4v" length="69576255" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">E01CFE3D-7FF5-4C9C-A96E-B05040022D72</guid>
    <pubDate>Fri, 4 Dec 2009 14:59:07 -0800</pubDate>
    <itunes:subtitle>Swift - IP V.6 Overview</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>35:08</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Swift</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Techno Pagan - Radio and Computers</title>
    <description>&lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-11-Techno_Pagan-Radio_and_Computers.m4v" length="105645974" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">923C66EC-24B0-41FE-A3A6-E8EF6F1D3EEF</guid>
    <pubDate>Fri, 4 Dec 2009 14:12:47 -0800</pubDate>
    <itunes:subtitle>Techno Pagan - Radio and Computers</itunes:subtitle>
    <itunes:summary>DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>53:22</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Techno Pagan</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Tom - Security problems associated with client-side scripting in popular web-based services</title>
    <description>Security problems associated with client-side scripting in popular web-based services.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-40-Tom-Security_Problems_associated_with_client-side_scripting.m4v" length="86459416" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">63E04477-4840-46A1-8C5F-702E8F65A2CE</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:12 -0800</pubDate>
    <itunes:subtitle>Tom - Security problems associated with client-side scripting in popular web-based services</itunes:subtitle>
    <itunes:summary>Security problems associated with client-side scripting in popular web-based services.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>43:40</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Tom</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>V1RU5 , Stephen Wadlow, Gurney Halleck, and *Hobbit*- Lock Picking explored.</title>
    <description>&lt;br /&gt;
    14 years as a professional magician, V1rus will assist on the Lock picking class and will talk about Hand cuffs, and how to improv picks. Video explores a cut away pin tumbling lock made by *Hobbit*, the door cut away with a bunch of locks in it, and a lenghtly discussion. Good stuff!
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-42-V1RU5-Lock_Picking_Demo.m4v" length="160327958" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">858D135B-D8ED-49D5-84AD-4EFCD257A0ED</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:14 -0800</pubDate>
    <itunes:subtitle>V1RU5 , Stephen Wadlow, Gurney Halleck, and *Hobbit*- Lock Picking explored.</itunes:subtitle>
    <itunes:summary>14 years as a professional magician, V1rus will assist on the Lock picking class and will talk about Hand cuffs, and how to improv picks. Video explores a cut away pin tumbling lock made by *Hobbit*, the door cut away with a bunch of locks in it, and a lenghtly discussion. Good stuff!

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>1:21:02</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>V1RU5</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Vic Vandal - Hacking Oracle 101</title>
    <description>So you've hacked your way into your &quot;test&quot; O/S. What are you going to do now? All the really fun data is stored in a database, probably an Oracle database. This talk will discuss some of the gory details of Oracle security and insecurity.&lt;br /&gt;
    &lt;br /&gt;
    Vic Vandal is a certified information security professional. He has been providing enterprise-level security design and implementation for U.S. government and military entities for the past 10 years. He currently works for a major consulting firm as a Senior Information Security Engineer. His areas of expertise are; O/S security, database security, network security, application security, firewalls, encryption, VPN's, and digital signatures.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-09-Vic_Vandle-Hacking_Oracle_101.m4v" length="102690764" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">0EF6E4DB-6C0B-4AD3-9F4A-20ECF5681C1E</guid>
    <pubDate>Wed, 14 Oct 2009 17:49:21 -0700</pubDate>
    <itunes:subtitle>Vic Vandal - Hacking Oracle 101</itunes:subtitle>
    <itunes:summary>So you've hacked your way into your &quot;test&quot; O/S. What are you going to do now? All the really fun data is stored in a database, probably an Oracle database. This talk will discuss some of the gory details of Oracle security and insecurity.

    Vic Vandal is a certified information security professional. He has been providing enterprise-level security design and implementation for U.S. government and military entities for the past 10 years. He currently works for a major consulting firm as a Senior Information Security Engineer. His areas of expertise are; O/S security, database security, network security, application security, firewalls, encryption, VPN's, and digital signatures.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>51:53</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Vic Vandal</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    <item>
    <title>Winn Schwartau - HERF Guns, EMP Bombs and Weapons of Mass Disruption (UnClassified)</title>
    <description>At DefCon III, Winn Schwartau talked about High Energy Radio Frequency Guns, Electromagnetic Pulse Bombs and assorted nefarious weapons. Trouble is, the government doesn’t admit to a thing. However, through constant research, he has found more than the government would like.&lt;br /&gt;
    &lt;br /&gt;
    The August issue of Popular Science, due out on or about July 15 will feature Schwartau’s article on these emerging devices – but you will get an early peek at DefCon 7 on Saturday afternoon. Russian HERF and EMP devices for sale world wide. Some are even on the Internet! Terrorist level weapons made in a garage for less than $500 and put out an E field in excess of 1MV/meter. A video of real HERF at work. Be ready with your questions and Schwartau, as usual, will have answers.
    &lt;br /&gt;
    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA&lt;br /&gt;
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.&lt;br /&gt;</description>
    <link>http://defcon.org/html/links/defcon-media-archives.html#DEF%20CON%207</link>
    <author>feedback@defcon.org (DEF CON Announcements)</author>
    <category domain="http://www.dmoz.com">Computers/Hacking/</category>
    <comments>https://forum.defcon.org/forumdisplay.php?f=132</comments>
    <enclosure url="https://media.defcon.org/dc-7/video/1999-Defcon_7-36-Schwartau-Herf_Guns_EMP_Bombs_and_Weapons_of_Mass_Disruption .m4v" length="76400823" type="video/x-m4v" ></enclosure>
    <guid isPermaLink="false">8CCB8CB5-8E9E-4750-AB15-EEB06F8C4B78</guid>
    <pubDate>Fri, 4 Dec 2009 14:13:10 -0800</pubDate>
    <itunes:subtitle>Winn Schwartau - HERF Guns, EMP Bombs and Weapons of Mass Disruption (UnClassified)</itunes:subtitle>
    <itunes:summary>At DefCon III, Winn Schwartau talked about High Energy Radio Frequency Guns, Electromagnetic Pulse Bombs and assorted nefarious weapons. Trouble is, the government doesn’t admit to a thing. However, through constant research, he has found more than the government would like.

    The August issue of Popular Science, due out on or about July 15 will feature Schwartau’s article on these emerging devices – but you will get an early peek at DefCon 7 on Saturday afternoon. Russian HERF and EMP devices for sale world wide. Some are even on the Internet! Terrorist level weapons made in a garage for less than $500 and put out an E field in excess of 1MV/meter. A video of real HERF at work. Be ready with your questions and Schwartau, as usual, will have answers.

    DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA
    Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.</itunes:summary>
    <itunes:duration>38:35</itunes:duration>
    <itunes:keywords>defcon, def con, hacking, hackers, information security, hacking, convention, computer security,Defcon 7, dc 7, dc-7</itunes:keywords>
    <itunes:author>Winn Schwartau</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    </item>

    </channel>
    </rss>

    Comment


    • #3
      Re: DEF CON 7 Video .rss now on-line

      Originally posted by lrd dfcn View Post
      This is not a video: mpg, mp4, avi, etc
      [CHOP!]
      The content you posted is, indeed, not a video. It is XML of an RSS feed which is for an RSS reader, OR modern web browser that can support XML and RSS feed OR a modern browser with a plugin/extension to permit reading of XML RSS feeds. It also may work with applications like Apple's iTunes, though a specific verion may be required.

      Load the URL provided by DT in an RSS reader, or read it as XML using a text editor. If you examine it as text, you will see HTTP or HTTPS links for direct download of many videos from the defcon media server. If you examine it with an XML parser/display tool, then you should see links to download video, too, but easier to read without understanding XML.

      From:
      URL1=https://www.defcon.org/podcast/defcon-7-video.rss

      using an XML-reader, I don't see XML. I only see the interpreted XML, which is formatted but looks kind of like this (converting to pseudo-html using VB markup.)

      Originally posted by URL1-top-first-entry
      DEFCON 7 [Video] Speeches from the Hacker Convention.
      .DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA<br />

      Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.


      Angus Blitter - Fear and Loathing in Cyberspace: The art and science of enemy profiling12/04/2009 02:12 PMQuickly identifying your opponent, in any conflict, can mean the difference between success and failure. Knowing their capabilities, resources and limitations can provide the tactical advantage. The lack of this type of decision support is a serious deficiency in most information warrior's arsenals. Relying on single source intelligence is pure folly. Charlatans and carpetbaggers are salivating at the millions in government and corporate dollars earmarked for such a competitive advantage. Our discussion will provide a working definition for "profiling", how it is used and why it effects everyone!



      Angus Blitter is the founder and Grand Poopa of HSK.


      DEF CON 7.0 was held July 9-11th, 1999, in Las Vegas Nevada USA

      Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4v format. The DEFCON series of hacking conferences were started in 1993 to focus on both the technical and social trends in hacking, and has grown to be world known event. If you did not make it, or missed the speaker you wanted to see here is you chance to download and watch the presentations when you want.

      Media files 1999-Defcon_7-16-Angus_Bitter-The_Art_and_Science_of_Enemy_Profiling.m4v (117 MB)

      (Many more presentations follow this one in the XML file, and most have links to download more video files for playback.)
      The video file in this first (of many) examples in the XML is for a video file as an "m4v".

      Wikipedia can give you links to help you understand what an mv4 video file is.

      You might also want to google about "XML" and "RSS" to understand more.

      After downloading the m4v file mentioned above:
      Originally posted by checksums
      File: 1999-Defcon_7-16-Angus_Bitter-The_Art_and_Science_of_Enemy_Profiling.m4v
      Size: 122803103 bytes

      Checksums:
      md5: 115bfc622fb03e3a0f30be7fc50ff3c8
      sha1: bd96f66322a6d5b2ea3301f06b9dbdf5f93976ea
      sha256: 50defeb9f480a1837d9a3c50d41fd5bcc0bd29840d72282696 d361071f0fc3ea
      sha512: 84f7b4711ed329d64d37535b7e4462069b7992049168241f02 ccbb766cf3ff11ba21e72a7ef7fefcdcdde23bb3149556fbdd fb1fab8f6d5fe549fd8f34e8910f

      Video File Information according to video players when watching video after download:
      MP4(H.264/AVC), AAC MPEG-2/MPEG-4 Audio, 320x240
      Here is you warning from me:

      Posting a bug report is good, and welcome. However, posting a complaint and asking such a basic question without investigating this on your own suggests you did not google any part of this or inspect the contents you pasted to try to answer this on your own. Looking at the XML you pasted shows you several links for downloading many videos. A *NIX shell, one-liner using xmlstarlet, or even grep/sed/tr and other tools or perl could pull out links to download videos, if you don't have support for XML in your browser. This post has enough hints for you to use google to find a solution to getting a list of all video links for downloading DC7 videos.

      Hint: if you do decide to download all videos, it is best to serialize your download and NOT try to download them in parallel. Serialized downloads, one at a time decreases risk of angering the firewall.

      Learn or don't; it is your choice.
      Last edited by TheCotMan; January 29, 2012, 23:32.

      Comment

      Working...
      X