Version V.0.0.2
Events
Title | Track | Speakers | |
---|---|---|---|
After Party
|
|
||
Amateur radio activity days
During Balccon2k18 we will be active making amateur radio QSOs (contacts)... |
|||
Application Container Security
Application Containers like LXD, Docker and rkt are popular way of... |
|||
automated number plate readers
I played around with automated number plate recognition systems in the... |
|||
A WinDbg full of tricks
WinDbg is a powerful debugging environment allowing an analyst to dig into... |
|||
Backups (occasionally…)
You do have backups, do you? Are you sure? I thought so as well… until… and... |
|||
Blockchain: the top 10 security disasters
Many blockchain platforms support tokens holding a total value of hundred... |
|||
Bringing Mixed Reality to the Web
Introduction to virtual and augmented reality in the web browser using WebXR |
|||
Closing Ceremony
|
Tesla |
|
|
Comparing Malicious Files
One critical step one must take during the malware analysis process is to... |
|||
Cryptoparty
Cryptoparty is global decentralized initiative bringing together privacy... |
|||
Dancing in the Dark
MEMS technology is in almost every smart device around us ranging from smart... |
|||
Dicussion on sustainability and hackers
Follow up discussion, exploring topic discussed in the lecture and any other... |
|||
Email, how does it even work?
Email is one of the oldest federated social networks in IT history. Its roots... |
|||
Emulating AVR from Scratch
An overview of the AVR architecture and the challenges/opportunities for... |
|||
Exploiting esoteric SQL injection vulnerabilities
Although SQL injection vulnerabilities are the most common web application... |
|||
Free Your Android
While Android is a mostly free operation system, many Devices contain... |
|||
Hacking Driverless Vehicles
Autonomous and unmanned systems are already patrolling our skies and oceans... |
|||
How I survived ICO!
ICOs are a common way now to collect some funding and issuing tokens at the... |
|||
How to achieve both economic and personal freedom using globality and flexibility.
Crypto liberation story of one perpetual traveler: How to achieve both... |
|||
Hybrid Cloud Seeding
During a red team exercise, one of the prime crown jewel that the attacker... |
|||
Impact of domain name dropcatching on business security
Domain names are the real estate of the internet. With every decade it... |
|||
Lightning Talks
LIGHTNING TALKS with Nick Farr On BalCCon2k18, we want everyone to have an... |
Tesla |
|
|
Lock picking Workshop
Lock picking for beginners |
|||
Masked reflected DDoS attacks, and how to protect against them
Some attacks go unchanged for years, and a great example for this is... |
|||
Modern Commandline Tools V1.4 (English Edition)
ls, grep, find, ifconfig. We all know these tools and use them on a daily... |
|||
Opening Event
|
|
||
Phishing Phishers
KPN is the largest telecom & internet services provider in the Netherlands.... |
|||
Preventing CPU side-channel attacks with kernel tracking
Marian will present a protection from Meltdown/Spectre types of attacks. He... |
|||
Public Code with Free Software
The "Public Money? Public Code!" initiative has been created to make all code... |
|||
Rakija Leaks
Rakija connecting people! Rakia is one of the most popular alcoholic drink... |
|
||
Riding the wave
SDR - demystifying magic. What is SDR and how it can be used to compromise... |
|||
RISC-V - an open CPU instruction set
|
|||
Secrets and Time - how much torture can you endure until your key expires.
Journalists and researchers find themselves in an environment where their... |
|||
Security Safari in b0rkenLand
2018 started really well for the internet respectively computer... |
|||
Spectre & Co. For Mere Mortals
A new language is needed to explain tough bits of computer science and... |
|||
Sustainability challange and the role of hackers
A lecture exploring the global sustainability transition from the technical,... |
|||
Tales from the hunt
Everyone is talking about common classes of bugs, sql injection, XSS, CSRF,... |
|||
The Things Network Novi Sad
How The Things Network - LoRaWAN infrastructure in Novi Sad can help makers... |
Hackerspace Area | ||
Toll of personal privacy in 2018
In this 50 minute long talk author talks about their personal privacy choices... |
|||
Towards the perfect cryptocurrency wallet
Last year we witnessed a huge leap in value for many cryptocurrencies, which... |
|||
Vintage amateur radio equipment exibition
Radio klub "Zrenjanin" is celebrating 85h anniversary this year and to honour... |
Hackerspace Area |