Jaime Restrepo
Channel:
Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=XPT1zCF2MBc
Ekoparty 7 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security The Ekoparty is an annual computer security conference that brings together a variety of people interested in information security. The Briefings take place regularly in Buenos Aires, Argentina.
Ekoparty was founded in 2001 by Juan Pablo Daniel Borgna, Leonardo Pigner, Federico Kirschbaum, Jerónimo Basaldúa and Francisco Müller Amato. In addition to the talks, Ekoparty has different activities like workshops, wargames, Wardriving, Lockpicking challenges, and forensics challenges
https://www.ekoparty.org/en_US/?lang=en_US
Other Videos By All Hacking Cons
2022-05-13 | Juan Perez Etchegoyen Inception of the SAP platform |
2022-05-13 | Esteban Guillardoy Panico y Locura en Java |
2022-05-13 | Esteban Fayo Defectos criptograficos en el protocolo de autenticacion de bases de datos Oracle |
2022-05-13 | Cesar Cerrudo Cyberwar para todos |
2022-05-13 | Ruben Santamarta |
2022-05-13 | Rhuss Varangott |
2022-05-13 | Mariano nunez |
2022-05-13 | Marcos Nieto |
2022-05-13 | Manuel Aristaran |
2022-05-13 | Luis Miras |
2022-05-13 | Jaime Restrepo |
2022-05-13 | Cesar Cerrudo |
2022-05-13 | Ariel Futoransky |
2022-05-13 | Alex Kirk |
2022-05-13 | Thai Duong |
2022-05-13 | Agustin Gianni Seab Heelan Attacking the WebKit Heap |
2022-05-13 | Tom Ritter |
2022-05-13 | Aaron Portnoy |
2022-05-13 | Tobias Muller |
2022-05-13 | Ryan Mc Arthur |
2022-05-13 | Understanding The Low Fragmentation Heap From Allocation To Exploitation |
Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering