Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations wi... more
| Publishes | Daily | Episodes | 61 | Founded | 19 years ago |
|---|---|---|---|---|---|
| Categories | Tech NewsTechnologyNews | ||||
Philip R. Zimmermann is the creator of Pretty Good Privacy. For that, he was the target of a three-year criminal investigation, because the government held that US export restrictions for cryptographic software were violated when PGP spread all aroun... more
AV software is becoming extremely popular because of the its percieved protection. Even the average person is aware they want AV on their computer (see AOL, Netscape, Netzero, Earthlink, and other ISP television ads). What if: Instead of protecting p... more
This talk will present recent advances in the design of robust cryptographic backdoors in secret symmetric ciphers (i.e., classified or proprietary ciphers). The problem directly affects end-users since corporations and governments have in the past p... more
Paul Vixie has been contributing to Internet protocols and UNIX systems as a protocol designer and software architect since 1980. Early in his career, he developed and introduced sends, proxynet, rtty, cron and other lesser-known tools. Today, Paul i... more
Windows is the number one target on the Internet today. It takes less than 5 minutes for an unpatched Windows machine, connected to the Internet, to get owned. Yet the most prevalent security practices still consist of running anti-viruses and consta... more
After three years of community development, the Open Web Application Security Project (OWASP) is proud to introduce the next generation of web application security standards at BlackHat USA 2005. The Guide to Securing Web Applications and Services 2.... more
In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself was nothing new, the fact that a vulnerability could be caus... more
When we built Metasploit, our focus was on the exploit development process. We tried to design a system that helped create reliable and robust exploits. While this is obviously very important, it's only the first step in the process. What do you do o... more
People also subscribe to these shows.















Listeners, social reach, demographics and more for this podcast.
| Gender Skew | Location | Interests | |||
|---|---|---|---|---|---|
| Professions | Age Range | Household Income | |||
| Social Media Reach | |||||
Rephonic provides a wide range of podcast stats for this podcast. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to this podcast and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.
Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for this podcast, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.
Rephonic provides comprehensive predictive audience data for this podcast, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.
To see how many followers or subscribers this podcast has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.
These podcasts share a similar audience with this podcast:
1. 7 Minute Security
2. Exploring Information Security - Exploring Information Security
3. Security Weekly Podcast Network (Audio)
4. Down the Security Rabbithole Podcast (DtSR)
5. Smashing Security
this podcast launched 19 years ago and published 61 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.
Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.
Rephonic pulls ratings and reviews for this podcast from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.
View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.
Rephonic provides full transcripts for episodes of this podcast. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.