Version v.1.0.0
Events
Title | Speakers | |
---|---|---|
A deeper journey into MikroTik routers
<p>This talk covers the interesting intersection of Applesque, cheap, and... |
||
Advanced Threat Hunting
Many threat intelligence teams are small and must make limited resources work... |
||
After Party
|
|
|
Amateur Radio Licence Exam
In cooperation with amateur radio association of Serbia, we are organizing... |
||
Armbian
Historical project overview |
||
Art of Dumping Databases
What is the best way to dump the data from the database? By that question, I... |
||
Bridging the air-gap
Most of us are using decent encryption, firewalls, sandboxing and all other... |
||
Build an "Easy Ten" morse code transmitter
Using only 5-6 common electronic components build yourself a morse code... |
||
Claim control of your Docker images
We'll talk about Docker and the challenges of running a local repository.... |
||
Closing event
|
|
|
Data Demolition
Organizations know the importance of destroying retired physical... |
||
Ethics in Technology
When designing technologies, networked systems, and measurements on the... |
||
Fedora in education
We have been running Fedora Workstation in our computer lab for over a year... |
||
Flying sniffer
Talk on air quality monitoring using drones, something related to my current... |
||
FPGA for Software Developers (on U-boat)
FPGAs are on market for long time, they have been improved rapidly but still... |
||
Hacking for Journalism
Journalists have always waged war against "fake news", misinformation and... |
||
How to drink Rakija
Drinking a lot of hard liqueur can be one of the worst life experiences if... |
||
IoT, SDR, and Car Security
With the growth of IoT devices, the security of IoT became more and... |
||
IoT security: Care for some sniff ?
Srdjan will present you with the overview of the IoT security sniffing... |
||
IOT Workshop
Workshop on IOT, where I use the Wemos D1 + battery shield + temperature... |
||
Is the hack goodenough?
<!DOCTYPE html> <html> <body> <p><b>“Is the hack good enough?”</b> is... |
||
Lightning Talks
Everyone can speak at Balccon! Tell us about your project, idea, plans or... |
||
Maker workshop
Programming micro controllers with Python. Using Zerynth Studio (Python) for... |
||
Methodology for Vulnerability Research and Exploit Development
Driven by the need for more security researchers, we responsibly contribute... |
||
Mobile phone surveillance with BladeRF
I will talk about making popularly named Stingray and known as "cell site... |
||
Moving towards Cyber Resilience
The terms of cybersecurity and cyber defence, are simply two pieces of a... |
||
Ninux
Short description of the Ninux network in italy, the ideas and the... |
||
One tool to rule them all
This talk is going to be about an innovative attack scenario researched to... |
||
Opening ceremony
|
||
Peculiar SSH
We all use SSH on a more or less daily basis. More advanced users even have... |
||
Pentesting automated voice responders using smart cloud services
During the large project for the client we discovered that need for such... |
||
Plotting data as music and video in R
I have been plotting tabular data as music and videos. I will... |
||
p≡p ≡ pretty Easy privacy
p≡p motivates a new standard to securely encrypt and verify written... |
||
Protecting bare-metal smart devices with EPOXY
|
||
Rakija workshop
Rakija connecting people! |
|
|
Ransomware
Ransomware is in present everywhere. There are continuous news about... |
||
Scapy in 45 minutes
Scapy is a packet manipulation program written in Python. It simplifies... |
||
Shader Frenzy
Introductional workshop into the world of generative art using OpenGL... |
||
SSH - Form Zero to Hero (Workshop)
So you have used SSH from the command line? Even used scp to transfer files.... |
||
Storytelling in Infosec
Why should anyone care about information security? The answer to this... |
||
Surface Mount Electronics Assembly for Terrified Beginners
Surface mount electronics for terrified beginners. Learn to assemble tiny... |
||
Travel Security
Increasingly, people are anxious about crossing international borders with... |
||
V!4GR4
A look at the illegal campaigns attempting to abuse web vulnerabilities in... |
||
VPNs - How to confuse your routing tables
Virtual Private Networks are everywhere. Whether to tunnel you through from... |