Version v.1.0.0

Events

  Title Speakers
Mikrotik
A deeper journey into MikroTik routers
<p>This talk covers the interesting intersection of Applesque, cheap, and...
Event_small
Advanced Threat Hunting
Many threat intelligence teams are small and must make limited resources work...
Event_small
After Party
    Event_small
    Amateur Radio Licence Exam
    In cooperation with amateur radio association of Serbia, we are organizing...
    Logo_armbian_big
    Armbian
    Historical project overview
    Event_small
    Art of Dumping Databases
    What is the best way to dump the data from the database? By that question, I...
    Event_small
    Bridging the air-gap
    Most of us are using decent encryption, firewalls, sandboxing and all other...
    Event_small
    Build an "Easy Ten" morse code transmitter
    Using only 5-6 common electronic components build yourself a morse code...
    Event_small
    Claim control of your Docker images
    We'll talk about Docker and the challenges of running a local repository....
    Event_small
    Closing event
      Event_small
      Data Demolition
      Organizations know the importance of destroying retired physical...
      Event_small
      Ethics in Technology
      When designing technologies, networked systems, and measurements on the...
      Event_small
      Fedora in education
      We have been running Fedora Workstation in our computer lab for over a year...
      Event_small
      Flying sniffer
      Talk on air quality monitoring using drones, something related to my current...
      Event_small
      FPGA for Software Developers (on U-boat)
      FPGAs are on market for long time, they have been improved rapidly but still...
      Event_small
      Hacking for Journalism
      Journalists have always waged war against "fake news", misinformation and...
      Event_small
      How to drink Rakija
      Drinking a lot of hard liqueur can be one of the worst life experiences if...
      Event_small
      IoT, SDR, and Car Security
      With the growth of IoT devices, the security of IoT became more and...
      Event_small
      IoT security: Care for some sniff ?
      Srdjan will present you with the overview of the IoT security sniffing...
      Event_small
      IOT Workshop
      Workshop on IOT, where I use the Wemos D1 + battery shield + temperature...
      Irnas-krog
      Is the hack goodenough?
      <!DOCTYPE html> <html> <body> <p><b>“Is the hack good enough?”</b> is...
      Event_small
      Lightning Talks
      Everyone can speak at Balccon! Tell us about your project, idea, plans or...
      Event_small
      Maker workshop
      Programming micro controllers with Python. Using Zerynth Studio (Python) for...
      Logo_transparent_whitebackg
      Methodology for Vulnerability Research and Exploit Development
      Driven by the need for more security researchers, we responsibly contribute...
      Event_small
      Mobile phone surveillance with BladeRF
      I will talk about making popularly named Stingray and known as "cell site...
      Event_small
      Moving towards Cyber Resilience
      The terms of cybersecurity and cyber defence, are simply two pieces of a...
      Logo_ninux_2011_cropped
      Ninux
      Short description of the Ninux network in italy, the ideas and the...
      Event_small
      One tool to rule them all
      This talk is going to be about an innovative attack scenario researched to...
      Event_small
      Opening ceremony
      Event_small
      Peculiar SSH
      We all use SSH on a more or less daily basis. More advanced users even have...
      Xf-red_shield
      Pentesting automated voice responders using smart cloud services
      During the large project for the client we discovered that need for such...
      Event_small
      Plotting data as music and video in R
      I have been plotting tabular data as music and videos. I will...
      Illustration_element_8
      p≡p ≡ pretty Easy privacy
      p≡p motivates a new standard to securely encrypt and verify written...
      Event_small
      Protecting bare-metal smart devices with EPOXY
      6ab0f800090cec43340d07aca10330ce3e11cd9d_full
      Rakija workshop
      Rakija connecting people!
        Event_small
        Ransomware
        Ransomware is in present everywhere. There are continuous news about...
        Dbawgvcxyai2luy
        Scapy in 45 minutes
        Scapy is a packet manipulation program written in Python. It simplifies...
        Out
        Shader Frenzy
        Introductional workshop into the world of generative art using OpenGL...
        Terminal
        SSH - Form Zero to Hero (Workshop)
        So you have used SSH from the command line? Even used scp to transfer files....
        Geist_stift2
        Storytelling in Infosec
        Why should anyone care about information security? The answer to this...
        Smdftb
        Surface Mount Electronics Assembly for Terrified Beginners
        Surface mount electronics for terrified beginners. Learn to assemble tiny...
        Event_small
        Travel Security
        Increasingly, people are anxious about crossing international borders with...
        Event_small
        V!4GR4
        A look at the illegal campaigns attempting to abuse web vulnerabilities in...
        Event_small
        VPNs - How to confuse your routing tables
        Virtual Private Networks are everywhere. Whether to tunnel you through from...