Confirmed users
58
edits
Jstevensen (talk | contribs) |
Jstevensen (talk | contribs) |
||
| Line 10: | Line 10: | ||
=== Black Hat sessions === | === Black Hat sessions === | ||
''July 25'' | '''''[https://www.blackhat.com/html/bh-us-12/schedule/briefings-25.html July 25]''''' | ||
10:15 | 10:15 | ||
| Line 42: | Line 42: | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Stamos The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet] (Augustus III + IV) - ''joes, kang'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Stamos The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet] (Augustus III + IV) - ''joes, kang'' | ||
''July 26'' | '''''[https://www.blackhat.com/html/bh-us-12/schedule/briefings-26.html July 26]''''' | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shekyan Hacking with WebSockets] -''Who is attending, if anyone? Name here'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shekyan Hacking with WebSockets] -''Who is attending, if anyone? Name here'' | ||
* [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shah HTML5 Top 10 Threats – Stealth Attacks and Silent Exploits] -''Who is attending, if anyone? Name here'' | * [https://www.blackhat.com/html/bh-us-12/bh-us-12-briefings.html#Shah HTML5 Top 10 Threats – Stealth Attacks and Silent Exploits] -''Who is attending, if anyone? Name here'' | ||