Version V.0.0.2

Events

  Title Track Speakers
Event_small
After Party
    Logo-retro
    Amateur radio activity days
    During Balccon2k18 we will be active making amateur radio QSOs (contacts)...
    Event_small
    Application Container Security
    Application Containers like LXD, Docker and rkt are popular way of...
    Event_small
    automated number plate readers
    I played around with automated number plate recognition systems in the...
    Event_small
    A WinDbg full of tricks
    WinDbg is a powerful debugging environment allowing an analyst to dig into...
    Img_6951
    Backups (occasionally…)
    You do have backups, do you? Are you sure? I thought so as well… until… and...
    Event_small
    Blockchain: the top 10 security disasters
    Many blockchain platforms support tokens holding a total value of hundred...
    Event_small
    Bringing Mixed Reality to the Web
    Introduction to virtual and augmented reality in the web browser using WebXR
    Event_small
    Closing Ceremony
    Tesla
      Event_small
      Comparing Malicious Files
      One critical step one must take during the malware analysis process is to...
      9
      Cryptoparty
      Cryptoparty is global decentralized initiative bringing together privacy...
      Event_small
      Dancing in the Dark
      MEMS technology is in almost every smart device around us ranging from smart...
      Event_small
      Dicussion on sustainability and hackers
      Follow up discussion, exploring topic discussed in the lecture and any other...
      _
      Email, how does it even work?
      Email is one of the oldest federated social networks in IT history. Its roots...
      Event_small
      Emulating AVR from Scratch
      An overview of the AVR architecture and the challenges/opportunities for...
      Event_small
      Exploiting esoteric SQL injection vulnerabilities
      Although SQL injection vulnerabilities are the most common web application...
      Event_small
      Free Your Android
      While Android is a mostly free operation system, many Devices contain...
      Event_small
      Hacking Driverless Vehicles
      Autonomous and unmanned systems are already patrolling our skies and oceans...
      Event_small
      How I survived ICO!
      ICOs are a common way now to collect some funding and issuing tokens at the...
      Event_small
      How to achieve both economic and personal freedom using globality and flexibility.
      Crypto liberation story of one perpetual traveler: How to achieve both...
      Event_small
      Hybrid Cloud Seeding
      During a red team exercise, one of the prime crown jewel that the attacker...
      Event_small
      Impact of domain name dropcatching on business security
      Domain names are the real estate of the internet. With every decade it...
      Event_small
      Lightning Talks
      LIGHTNING TALKS with Nick Farr On BalCCon2k18, we want everyone to have an...
      Tesla
        Event_small
        Lock picking Workshop
        Lock picking for beginners
        Logo
        Masked reflected DDoS attacks, and how to protect against them
        Some attacks go unchanged for years, and a great example for this is...
        Cli_linuxtage
        Modern Commandline Tools V1.4 (English Edition)
        ls, grep, find, ifconfig. We all know these tools and use them on a daily...
        Event_small
        Opening Event
          Event_small
          Phishing Phishers
          KPN is the largest telecom & internet services provider in the Netherlands....
          Event_small
          Preventing CPU side-channel attacks with kernel tracking
          Marian will present a protection from Meltdown/Spectre types of attacks. He...
          Pmpc-logo-web
          Public Code with Free Software
          The "Public Money? Public Code!" initiative has been created to make all code...
          Event_small
          Rakija Leaks
          Rakija connecting people! Rakia is one of the most popular alcoholic drink...
            Event_small
            Riding the wave
            SDR - demystifying magic. What is SDR and how it can be used to compromise...
            Event_small
            RISC-V - an open CPU instruction set
            Event_small
            Secrets and Time - how much torture can you endure until your key expires.
            Journalists and researchers find themselves in an environment where their...
            Event_small
            Security Safari in b0rkenLand
            2018 started really well for the internet respectively computer...
            Event_small
            Spectre & Co. For Mere Mortals
            A new language is needed to explain tough bits of computer science and...
            Event_small
            Sustainability challange and the role of hackers
            A lecture exploring the global sustainability transition from the technical,...
            Event_small
            Tales from the hunt
            Everyone is talking about common classes of bugs, sql injection, XSS, CSRF,...
            Novi-sad_(1)
            The Things Network Novi Sad
            How The Things Network - LoRaWAN infrastructure in Novi Sad can help makers...
            Hackerspace Area
            Event_small
            Toll of personal privacy in 2018
            In this 50 minute long talk author talks about their personal privacy choices...
            Event_small
            Towards the perfect cryptocurrency wallet
            Last year we witnessed a huge leap in value for many cryptocurrencies, which...
            Logo-retro
            Vintage amateur radio equipment exibition
            Radio klub "Zrenjanin" is celebrating 85h anniversary this year and to honour...
            Hackerspace Area