Rob Weiss & John Eberhardt Machine Learning and Augmented Reality in Networking

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=4Hqy0YMDmr8



Duration: 36:45
1 views
0


CarolinaCon - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #CarolinaCon
https://carolinacon.org/
CarolinaCon is a regional, technology hacking and InfoSec conference, held annually in North Carolina.

The conference was founded in 2004 by members of the Raleigh 2600 group. CarolinaCon has focused on presenting educational materials from a variety of guest speakers on various aspects of computing, technology, and information security.

The event is currently sponsored by the 501(c)3 non-profit organization "The Carolinacon Group". The goal of hosting the event is to provide an intimate, informal, and inexpensive venue for knowledge sharing.

A variety of side events has been an annual part of the conference, such as Wardriving, Lockpick Village, Capture The Flag, an "unofficial" Shooting event, Crypto Challenges, LAN gaming, Guitar Hero battle, Ham Radio, Crypto Key Signing, Vintage Tech Museum, etc. The Con generally closes with a game of Hacker Trivia.




Other Videos By All Hacking Cons


2022-01-30Introducing PS Attack, a portable PowerShell attack toolkit Jared Haight
2022-01-30Reverse Engineer iOS apps because reasons twinlol
2022-01-30I Am The Liquor Jim Lahey
2022-01-30Buffer Overflows for x86, x86 64 and ARM John F Davis Math for 400
2022-01-30smrk3r Have you ever drunk Bailey s from a shoe aka Pen Testing & Social Engineering Convergence
2022-01-30Howard Payne & Deviant Ollam Elevator Obscura Industry Hacks
2022-01-30Joshua Schroeder JoshInGeneral SPAM, Phish and Other Things Good to Eat
2022-01-30Schuyler Towne Rethinking the Origins of the Lock
2022-01-30chill Art of Post infection Response and Mitigation
2022-01-30Andrew Shumate Cyber War Stories
2022-01-30Rob Weiss & John Eberhardt Machine Learning and Augmented Reality in Networking
2022-01-30@th3mojo RedneckSec
2022-01-30myddrn Cryptocurrency Laundering Theory for Fun and Retirement
2022-01-30digital shokunin How to design your You got hacked page
2022-01-30Unregistered & Snide Phony Business What Goes Around Comes Back Around
2022-01-30Lokesh Pidawekar Hacker s Practice Ground
2022-01-30surpherdave Social engineering is bullsh t, call it what it is
2022-01-30Justin Warner @sixdub & Will Schroeder @harmj0y Drilling Deeper with Veils PowerTools
2022-01-30Demystifying The Cloud, a look at Hyperscale Computing From a Hacker Perspective Nick Fury
2022-01-30Real World Social Engineering for the Geek Introvert Luke MindNinja Stephens
2022-01-30Simple Network Management Pwnd Deral Heiland Percent x and Matthew Kienow



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering