Version v.002

Events

  Title Speakers
Event_small
99 Problems
This talk will center around the pitfalls of writing and maintaining multi...
Event_small
A close look on cyborgs: basics of cell-chip coupling
Cell-based bioelectronics target the convergence of electronics with biology...
Openssh_1
Advanced SSH
Tips and tricks for a more efficient and more secure usage of ssh(d). We will...
Event_small
Automated Web Attacks Using Headless Browsers
Headless Browsers were originally used by website QA testers, but these...
Event_small
Autonomous vehicles - Present or the future
A short presentation about the state of the autonomous vehicle industry...
Event_small
Black market value of patient data
Involuntary data leaks and malicious attacks on data privacy and security are...
Event_small
Brace Yo'Self: DDoS Is Coming
A workshop about DDoS attacks - from theoretical & high-level analysis of...
Logo_black_1
Build a Geiger Counter
This is an Open Source Digital Radiation Dosimeter, that can be used both as...
Event_small
Closing Ceremony
Nextcube
Contemporary Webserver Configuration - A Serving Suggestion
Fast and secure web applications demand a sensible, modular and contemporary...
Event_small
Data integration made easy with Talend Open Studio for Data Integration
A brief introduction on different aspects and typical challenges of data...
Screen_shot_2016-06-30_at_19.53.55
DDoS Attack Landscapes
Analysing half a dozen tcpdump outputs trying to see the malicious traffic...
Event_small
Digging within .git
For developers who use it, Git is an indispensable part of our daily...
Event_small
Does not compute: why doctors hate IT
tba
Event_small
Exploring the IoT attack surface
This talk will try and give a crash course how to analyze IoT things and...
Event_small
FLOSS way of funding a hackerspace
Slightly more than a year ago Novi Sad got it's first hackerspace. Today our...
Event_small
From Ruby to Elixir
Do you want to extend your Ruby applications to handle millions of requests...
Logo_transparent_whitebackg
Hacking Attacks
Over the last year we had significant increase on IPv6 internet use where...
Event_small
Hacking hardware to talk with Android
How to develop hardware which will talk with Android? What is the easiest way...
Event_small
Hardware production and outsourcing
This speech presents the roadmap from prototyping to scaling up and...
Event_small
How to NOT run a Hackspace
Creating a Hackspace is a big thing. But running a Hackspace leads,...
Event_small
Introduction to BalCCon2k16 badge
Event_small
Introduction to cyber-attacks on vehicles
In this paper, I will talk and give an introduction to security research and...
Event_small
Introduction to Talend Open Studio for Data Integration
An easy to follow how-to guide about building a simple data mart, combining...
Event_small
Kernel exploitation and hardening: why we could have nice things!
Many proposed kernel hardening features come at the expense of performance or...
Event_small
Lets create a game with Godot
Creating a game with Godot Engine
Event_small
Memory Corruption: Why We Can't Have Nice Things
Memory corruption plagues systems since the dawn of computing. With the rise...
Event_small
Nature, Darwin and Bug Bounty Hunting
Is bug bounty hunting different from a security audit or pentest? Yes and NO!...
Event_small
Nifty Tricks for ARM Firmware Reverse Engineering
This fast-paced lecture will share with you some nifty tricks for reverse...
Nodejs-logo
NodeJS and electronic world development for N00bs
This lecture aims to provide attendees with an introduction to node-js...
Logo_yu7aop
Numbering Stations
Short lecture about mysterious numbering stations followed by a workshop in...
Event_small
Opening Ceremony
Screen_shot_2016-07-01_at_10.44.13_pm
Predictive CVE Hunting
Small teams of researchers don’t always have the resources to find, tag, and...
Rakia_connecting_people
Rakija Workshop
Rakija connecting people!
    Event_small
    [Real] Private browsing
    Learn about technologies websites use to track track their users and serve...
    Event_small
    SIPSA — One step closer to real anonymity on the internet
    Author has devised a technology that allows to hide both source and...
    Event_small
    Story about "Makers" Novi Sad
    After one year work, what we did? Our first public presentation was on...
    Bebrbmncyaarawr
    The IT of another Europe
    12 year before Snowden the EU already knew they should not trust US tech but...
    Event_small
    when the digital hair stands up in your neck
    a talk how sigint works who does it and what could possible go wrong with...
    Tmux
    Windows in windows in.........
    A beginners guide to the Terminal Multiplexer "tmux". We will show you, why...