Version v.002
Events
Title | Speakers | |
---|---|---|
99 Problems
This talk will center around the pitfalls of writing and maintaining multi... |
||
A close look on cyborgs: basics of cell-chip coupling
Cell-based bioelectronics target the convergence of electronics with biology... |
||
Advanced SSH
Tips and tricks for a more efficient and more secure usage of ssh(d). We will... |
||
Automated Web Attacks Using Headless Browsers
Headless Browsers were originally used by website QA testers, but these... |
||
Autonomous vehicles - Present or the future
A short presentation about the state of the autonomous vehicle industry... |
||
Black market value of patient data
Involuntary data leaks and malicious attacks on data privacy and security are... |
||
Brace Yo'Self: DDoS Is Coming
A workshop about DDoS attacks - from theoretical & high-level analysis of... |
||
Build a Geiger Counter
This is an Open Source Digital Radiation Dosimeter, that can be used both as... |
||
Closing Ceremony
|
||
Contemporary Webserver Configuration - A Serving Suggestion
Fast and secure web applications demand a sensible, modular and contemporary... |
||
Data integration made easy with Talend Open Studio for Data Integration
A brief introduction on different aspects and typical challenges of data... |
||
DDoS Attack Landscapes
Analysing half a dozen tcpdump outputs trying to see the malicious traffic... |
||
Digging within .git
For developers who use it, Git is an indispensable part of our daily... |
||
Does not compute: why doctors hate IT
tba |
||
Exploring the IoT attack surface
This talk will try and give a crash course how to analyze IoT things and... |
||
FLOSS way of funding a hackerspace
Slightly more than a year ago Novi Sad got it's first hackerspace. Today our... |
||
From Ruby to Elixir
Do you want to extend your Ruby applications to handle millions of requests... |
||
Hacking Attacks
Over the last year we had significant increase on IPv6 internet use where... |
||
Hacking hardware to talk with Android
How to develop hardware which will talk with Android? What is the easiest way... |
||
Hardware production and outsourcing
This speech presents the roadmap from prototyping to scaling up and... |
||
How to NOT run a Hackspace
Creating a Hackspace is a big thing. But running a Hackspace leads,... |
||
Introduction to BalCCon2k16 badge
|
||
Introduction to cyber-attacks on vehicles
In this paper, I will talk and give an introduction to security research and... |
||
Introduction to Talend Open Studio for Data Integration
An easy to follow how-to guide about building a simple data mart, combining... |
||
Kernel exploitation and hardening: why we could have nice things!
Many proposed kernel hardening features come at the expense of performance or... |
||
Lets create a game with Godot
Creating a game with Godot Engine |
||
Memory Corruption: Why We Can't Have Nice Things
Memory corruption plagues systems since the dawn of computing. With the rise... |
||
Nature, Darwin and Bug Bounty Hunting
Is bug bounty hunting different from a security audit or pentest? Yes and NO!... |
||
Nifty Tricks for ARM Firmware Reverse Engineering
This fast-paced lecture will share with you some nifty tricks for reverse... |
||
NodeJS and electronic world development for N00bs
This lecture aims to provide attendees with an introduction to node-js... |
||
Numbering Stations
Short lecture about mysterious numbering stations followed by a workshop in... |
||
Opening Ceremony
|
||
Predictive CVE Hunting
Small teams of researchers don’t always have the resources to find, tag, and... |
||
Rakija Workshop
Rakija connecting people! |
|
|
[Real] Private browsing
Learn about technologies websites use to track track their users and serve... |
||
SIPSA — One step closer to real anonymity on the internet
Author has devised a technology that allows to hide both source and... |
||
Story about "Makers" Novi Sad
After one year work, what we did? Our first public presentation was on... |
||
The IT of another Europe
12 year before Snowden the EU already knew they should not trust US tech but... |
||
when the digital hair stands up in your neck
a talk how sigint works who does it and what could possible go wrong with... |
||
Windows in windows in.........
A beginners guide to the Terminal Multiplexer "tmux". We will show you, why... |