#edsec: Hacking for Education
So, you want to be a pentester?
Securing Sensitive Data: A Strange Game
Brick in the Wall vs Hole in the Wall
Cut the sh**: How to reign in your IDS.
Geek Welfare -- Confessions of a Convention Swag Hoarder
No InfoSec Staff? No Problem.
Can I Code Against an API to Learn a Product?
Bridging the Air Gap: Cross Domain Solutions
Back Dooring the Digital Home
iOS URL Schemes: omg://
Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter
What I've Learned As A Con-Man
Training with Raspberry Pi
Black Magic and Secrets: How Certificates Influence You!
Attacking Drupal
Hackers vs Auditors
Third-Party Service Provider Diligence: Why are we doing it all wrong?
Pwning the hapless or How to Make Your Security Program Not Suck
Teach a man to Phish...
The Lore shows the Way