![[ICO]](http://conference.hitb.org/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](http://conference.hitb.org/icons/back.gif) | Parent Directory | | - | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 - Ahmad Elkhatib - Securing Your Mobile Data.pdf | 2014-06-19 23:41 | 7.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 - Enno Rey - Digging into SNMP 2007 - An Excercise on Breaking Networks.pdf | 2014-06-19 23:41 | 740K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 - Fabrice Marie - Robbing Banks - Easier Done Than Said.pdf | 2014-06-19 23:41 | 1.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 - Ivor Rankin - Global SOCs - Threat Insight and Findings.pdf | 2014-06-19 23:41 | 2.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 - Marc Weber Tobias - The Insecurity of Mechanical Locks.pdf | 2014-06-19 23:41 | 1.3M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 - The Grugq - Ravage Unleashed.pdf | 2014-06-19 23:41 | 511K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D1 - Vipin Kumar - Nitin Kumar - VBootKit - Compromising Windows Vista Security.pdf.pdf | 2014-06-19 23:41 | 627K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 - David Michaux - Telecom Fraud.pdf | 2014-06-19 23:41 | 1.6M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 - Dino Covotsos - Cryptographic Applications in the 21st Century.pdf | 2014-06-19 23:41 | 422K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 - Emmanuel Gadaix - NGN - Next Generation Nightmare.pdf | 2014-06-19 23:41 | 2.1M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 - Hendrik Scholz - When Spam Goes Voip.pdf | 2014-06-19 23:41 | 292K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 - Raoul Chiesa - X25 networks in the Arab World.pdf | 2014-06-19 23:41 | 1.8M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 - Rodrigo Rubira Branco and Domingo Montanaro - Kernel Hacking - If I really know I can hack.pdf | 2014-06-19 23:41 | 541K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 - Shreeraj Shah - Web 2-0 Hacking - Defending Ajax and Web Services.pdf.pdf | 2014-06-19 23:41 | 611K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | D2 - Tareq Saade - A Perspective of the Middle Eastern Malware Landscape.pdf | 2014-06-19 23:41 | 788K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | Day 1 Keynote - Mikko Hypponen - Online Crime and Crime Online.pdf | 2014-06-19 23:41 | 11M | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | Day 2 Keynote - Lance Spitzner - Honeypots Today and Tomorrow.pdf | 2014-06-19 23:41 | 2.6M | |
![[ ]](../../icons/unknown.gif) | NO SLIDES - D1 - Window Snyder - Open Source Open Security | 2014-06-19 23:41 | 0 | |
![[ ]](../../icons/tar.gif) | TOOL-CODE - The Grugq - Tactical-VoIP-Tool-Kit.tar | 2014-06-19 23:41 | 64K | |
![[ ]](http://conference.hitb.org/icons/layout.gif) | WELCOME ADDRESS - His Excellency Mr Mohamed Nasser Al Ghanim - Director General - Telecommunications Regulatory Authority.pdf | 2014-06-19 23:41 | 37K | |
|