Hackers of India
Home
Timeline
Tools
About
RoadMap
2009th
---- 2009 ----
2009/12/05
Talk
:
Clubhack
:
Risk Based Penetration Testing
-
Nikhil Wagholikar
K K Mookhey
2009/12/05
Talk
:
Clubhack
:
Revealing the Secrets: Source Code Disclosure, Techniques and Impacts
-
Anant Kochhar
2009/12/05
Talk
:
Clubhack
:
Open source for securing data with advanced Crypto-Steganography technology
-
Suhas Desai
2009/12/05
Talk
:
Clubhack
:
Mobile Application Security Testing
-
Gursev Singh Kalra
2009/12/05
Talk
:
Clubhack
:
Lust 2.0 – Desire for free WiFi and the threat of the Imposter
-
Lavakumar Kuppan
2009/12/05
Talk
:
Clubhack
:
Indian IT Act 2000 vs 2009
-
Rohas Nagpal
2009/12/05
Talk
:
Clubhack
:
Incident Handling and Log Analysis for Web Based Incidents
-
Manindra Kishore
2009/12/05
Talk
:
Clubhack
:
Advance Computer Forensic concepts (windows)
-
Kush Wadhwa
2009/12/05
Talk
:
Clubhack
:
India Cyber Crime Scene - Caught in the Crossfire
-
Vinoo Thomas
Rahul Mohandas
2009/12/04
Talk
:
Clubhack
:
Facilitate Collaboration with Information Rights Management
-
Abhijit Tannu
2009/11/19
Talk
:
Deepsec
:
Top 10 Security Issues Developers Don’t Know About
-
Neelay S Shah
2009/11/19
Talk
:
Deepsec
:
Ownage 2.0
-
Saumil Shah
2009/11/18
Talk
:
Securitybyte
:
Rumbling Infections – Web Malware Ontology
-
Aditya K Sood
2009/11/18
Talk
:
Securitybyte
:
Risk based Penetration Testing
-
K K Mookhey
2009/11/18
Talk
:
Securitybyte
:
Introduction to Web Protection Library
-
Anil Chintala
2009/11/18
Talk
:
Securitybyte
:
Hacking Oracle From Web
-
Sumit Siddharth
2009/11/18
Talk
:
Securitybyte
:
Cloud Hacking – Distributed Attack & Exploit Platform
-
Shreeraj Shah
2009/11/17
Talk
:
Securitybyte
:
Vbootkit 2.0: Attacking Windows 7 Via Boot Sectors
-
Nitin Kumar
Vipin Kumar
2009/11/17
Talk
:
Securitybyte
:
Usability and Privacy in Security
-
Ponnurangam Kumaraguru
2009/11/17
Talk
:
Securitybyte
:
Threat Modeling
-
Varun Sharma
2009/11/17
Talk
:
Securitybyte
:
Lust 2.0 – Desire for free WiFi and the threat of the Imposter
-
Lavakumar Kuppan
2009/11/17
Talk
:
Securitybyte
:
Business Continuity Case Study
-
Venkataram Arabolu
2009/11/17
Talk
:
Securitybyte
:
Business Case-Risk Management/Compliance at AMITY
-
Dr Js Sodhi
2009/11/17
Talk
:
Securitybyte
:
Behind the scenes at the MSRC
-
Suresh Venkateswaran
Dave Midturi
2009/11/17
Talk
:
Securitybyte
:
Applications - The new cyber security frontier
-
Mano Paul
2009/10/28
Talk
:
Hacklu
:
Ownage 2.0
-
Saumil Shah
2009/10/07
Talk
:
Hitb Sec Conf
:
How to Own the World – One Desktop at a Time
-
Saumil Shah
2009/08/06
Talk
:
C0c0n
:
Network Intrusions and Hacking
-
Manu Zacharia
2009/08/06
Talk
:
C0c0n
:
Microsoft Security Strategies
-
Binoy VC
2009/08/06
Talk
:
C0c0n
:
Management & Security of Large Scale Storage Devices
-
Prashant Dinde
2009/08/06
Talk
:
C0c0n
:
Know Your Enemy, and Yourself: Demystifying Threat Modelin
-
Meera Subbarao
2009/08/06
Talk
:
C0c0n
:
Information Warfare
-
A a Gafoor
Vinayak Mishra
2009/08/06
Talk
:
C0c0n
:
Information security management practices - Technical issues and the impact of risk management.
-
Kp Paulson
2009/08/06
Talk
:
C0c0n
:
Information Security Audit
-
Venkatapathy Subramaniam
2009/08/06
Talk
:
C0c0n
:
Cyber Victimisation
-
K Jaishankar
2009/08/06
Talk
:
C0c0n
:
Cyber Forensics
-
Krishna Sastry Pendyal
2009/08/02
Talk
:
Defcon
:
Wi-Fish Finder: Who Will Bite the Bait
-
Md Sohail Ahmad
Prabhash Dhyani
2009/08/01
Talk
:
Defcon
:
The Making of the second SQL injection Worm
-
Sumit Siddharth
2009/07/31
Talk
:
Defcon
:
Advancing Video Application Attacks with Video Interception, Recording, and Replay
-
Arjun Sambamoorthy
Jason Ostrom
2009/05/19
Talk
:
Syscan
:
Securing Enterprise Applications
-
Shreeraj Shah
2009/05/19
Talk
:
Syscan
:
Securing Applications at Gateway with Web Application Firewalls
-
Shreeraj Shah
2009/04/22
Talk
:
Hitb Sec Conf
:
Vbootkit 2.0: Attacking Windows 7 via Boot Sectors
-
Nitin Kumar
Vipin Kumar
2009/04/22
Talk
:
Troopers
:
SQL Injections: More Fun and Profit
-
Sumit Siddharth
2009/04/22
Talk
:
Hitb Sec Conf
:
Pwnage 2.0
-
Saumil Shah
2009/04/22
Talk
:
Troopers
:
Browser Design Flaws – Hacking by Breaking in Architectures
-
Aditya K Sood
2009/04/22
Talk
:
Hitb Sec Conf
:
Application Defense Tactics & Strategies - WAF at the Gateway
-
Shreeraj Shah
2009/03/16
Talk
:
Can Sec West
:
On Approaches and Tools for Automated Vulnerability Analysis
-
Tanmay Ganacharya
Abhishek Singh
Swapnil Bhalode
Nikola Livic
Scott Lambert
2009/02/19
Talk
:
Blackhat
:
Blinded by Flash: Widespread Security Risks Flash Developers Don’t See
-
Prajakta Jagdale