Exposing Red Star

KimtheIll will continue his presentation on the Red Star OS exposing many of its back doors and vulnerabilities with the operating system. Red Star is the North Korean operating system commissioned by Kim Jong Il. Open ports and vulnerabilities including backdoors that may or may not have been placed by the Democratic People’s Republic of […]

Hacking Terrorist Networks – 2/27/2010 – HackMiami Hack-A-Thon * VENUE CHANGED

Join us for an afternoon of espionage and intrigue. HackMiami is proud to present “Hacking Terrorist Networks.” The presentation will touch on multiple aspects of forensics, encryption, hacking methodology, and discuss how they relate to the tracking of extremists. The presenter has several years of experience in this very unique field, and has put together […]