Personal Information
Industry
Technology / Software / Internet
Website
About
London Information Security Conference sign up to the 44CON mailing list for advance notice of the 2016 event.
Contact Details
Tags
44con
44con london 2015
44con 2014
44con 2018
44con 2013
android
jerry gamblin
burp
nccgroup
malware
philip polstra
luke jennings
lotus domino
darren fuller
mwrlabs 44con ctf
"three headed monkeys"
software security austerity
ollie whitehouse
andy davis
hec
hdmi ethernet channel
hdmi
.net smartcard os
gibson
john fitzpatrick
44con 44con 2013
tamagotchi
natalie silvanovich
xml
forging
james forshaw
signatures
atte kettunen
char sample
andreas lindh
44con 2103
shay chen
pcie
nils
java
marc wickenden
plugin
censorship
torproject
runa a. sandvik
tor
bob weiss
engima
benjamin gatti
michael boman
siavosh zarrasvand
malware analysis
kyrus
post-exploitation
behrang fouladi
.net
smartcard
beagleboard
usb
hacking
forensics
big game hunting
aix
tim brown
security
4g (lte)
mwr infosecurity
security testing
mwrlabs
martyn ruks
rich smith
moshe zioni
epic fail
james kettle
burpsuite
opentype
font
mateusz jurczyk
reverse engineering
jtagsploitation
root
jtag
reverse reverse engineering
richo healey
windows 10
fail
fireeye mps
fireeye
44con 2108
nerf tank
nerf
pen test partners
browser exploits
saumil shah
stegosploit
pedro vilaça
apple
efi
compromise
linux forensics
rails
ruby on rails
ruby
software defined networking (sdn) security
qualcomm
oj reeves
meterpreter
metasploit
risk
thom langford
phil huggins
security analytics
switches
excel
didier stevens
excel hacking
bts
hacker fantastic
gsm
tr-069
nosql pentesting
ddos
powershell
smart meters
terracotta vpn
vxworks
protocol analysis
canape
hardware
joe fitzpatrick
flir e4
dan tentler
flir
conan dooley
blackhat
infrastructure
tweets
josh thomas
See more
- Presentations
- Documents
- Infographics