ID | Interpret | Skladba | Album | |
1. | J. Salvatore Testa II | Proactively Secure Programming | HOPE Number Six, 21-23 July 2006 | |
2. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
3. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
4. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
5. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
6. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
7. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
8. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
9. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
10. | Raven Alder, 3ric Johanson, Brandon Uttech | Wireless Security Flaws | HOPE Number Six, 21-23 July 2006 | |
11. | Mark Abene, bernieS, Darci Wood | Hackers in Prison | HOPE Number Six, 21-23 July 2006 | |
12. | Mark Abene, bernieS, Darci Wood | Hackers in Prison | HOPE Number Six, 21-23 July 2006 | |
13. | Mark Abene, bernieS, Darci Wood | Hackers in Prison | HOPE Number Six, 21-23 July 2006 | |
14. | Brad Johnson | Ghosts in the Machine | HOPE Number Six, 21-23 July 2006 | |
15. | Brad Johnson | Ghosts in the Machine | HOPE Number Six, 21-23 July 2006 | |
16. | Brad Johnson | Ghosts in the Machine | HOPE Number Six, 21-23 July 2006 | |
17. | J. Salvatore Testa II | Constructing Cryptographic Pro | HOPE Number Six, 21-23 July 2006 | |
18. | Barry The Key Wels, Marc Weber Tobias | Lockpicking: Exploits for Mechanical Locks | HOPE Number Six, 21-23 July 2006 | |
19. | J. Salvatore Testa II | Constructing Cryptographic Protocols | HOPE Number Six, 21-23 July 2006 | |
20. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
21. | Barry The Key Wels, Marc Weber Tobias | Lockpicking: Exploits for Mechanical Locks | HOPE Number Six, 21-23 July 2006 | |
22. | Barry The Key Wels, Marc Weber Tobias | Lockpicking: Exploits for Mechanical Locks | HOPE Number Six, 21-23 July 2006 | |
23. | J. Salvatore Testa II | Proactively Secure Programming Techniques | HOPE Number Six, 21-23 July 2006 | |
24. | J. Salvatore Testa II | Constructing Cryptographic Protocols | HOPE Number Six, 21-23 July 2006 | |
25. | Barry The Key Wels, Marc Weber Tobias | Lockpicking: Exploits for Mechanical Locks | HOPE Number Six, 21-23 July 2006 | |
26. | Barry The Key Wels, Marc Weber Tobias | Lockpicking: Exploits for Mechanical Locks | HOPE Number Six, 21-23 July 2006 | |
27. | Barry The Key Wels, Marc Web | Lockpicking: Exploits for Mech | HOPE Number Six, 21-23 July 2006 | |
28. | Brad Johnson | Ghosts (and Zombies) in the Ma | HOPE Number Six, 21-23 July 2006 | |
29. | Mark Abene, bernieS, Darci Wood | Hackers in Prison | HOPE Number Six, 21-23 July 2006 | |
30. | Mark Abene, bernieS, Darci Woo | Hackers in Prison | HOPE Number Six, 21-23 July 2006 | |