Home
Unix/Linux
▼
Index
Quotes
Bourne Shell
POSIX Shell
C Shell
File Permissions
Regular Expressions
grep
awk
sed
find
tar
make
inodes
Security
▼
Index
IPv6
Wireless
Hardware
Misc
▼
Index
spam
Deception
PostScript Halftones
Bill of Rights
References
▼
Index
Top 10 reasons to avoid CSH
sed Chart
awk Reference
Magic
Search
About
Donate
☰
This page contains the presentation of my DEFCON talk - given August 7th, 2011.
Deceptive Hacking White Paper
Deceptive Hacking Presentation
Also see
Grymoire Blog - Security topics
More notes
Psychological Similarities Between Shoplifting and Malicious Hacking
Slow (long term) Denial of Service attacks
James Randi on why Magicians are a Scientist's Best Friend
Symantec: Data-stealing hackers use DDoS to distract from attacks