Version 1.0.3
Events
Title | Speakers | |
---|---|---|
50.0 Shades of Multimeters
Need to measure some electrical values? Learn to use multimeters... |
||
An Introduction to Ansible
Ansible is a system orchestration and management tool that allows users and... |
||
Arduinos for Total Newbies
You've probably heard lots about Arduino. But if you don't know what it is,... |
||
Beginnings in 3d printing
Types of 3d printers Personal and Professional 3d printers. Actual... |
||
Beginnings of the Home Computer (R)evolution in Yugoslavia
How one computer kick-started home computer (r)evolution in 1984 in former... |
||
BGP Routing
Learn how the Internet is tethered together by creating your own peerings... |
||
Case Study: interception of torrent traffic and what should we do about it
The study includes analysis of actual conflict of interest when it comes to... |
||
Challenges of freedom of speech online: technical, legal and ethical aspects
Freedom of speech is one of the essential human rights, it is guaranteed by... |
||
Closing ceremony
|
||
Defining an abstract architecture for managing unstructured data using MongoDB - use case of vDrive
Knowledge access and knowledge sharing is essential in contemporary... |
||
Docker for fun and profit
Docker provides an excellent mechanism for creating low-overhead... |
||
Embedded Linux Device Drivers
Purpose-built operating systems based on the Linux kernel are widely used... |
||
Exploring treasures of 77FEh
If vendors need to expose serial interface to “modern” IP world, they often... |
||
File encryption for untrusted remote file systems
Storing files on an untrusted file system doesn't seem to be a properly... |
||
Force multiplier - Guided password cracking
In this talk, I will show how to better target password cracking and... |
||
Fractal Geometry and Programming in Java
Chaos represents the property that certain mathematically deterministic... |
||
Fun with(out) Freedom of Information
Austria, despite its nominal status as a democracy, does not recognize... |
||
Hacking before computers
Before integrated circuits, digital circuits have been made with discrete... |
||
Home Automation for 50 euros
I have maked Home Automation for 50 euros using Raspberry Pi. What problem my... |
||
Lightning talks
|
|
|
Opening Event
Welcome to the BalCCon2k14 - Second Base |
|
|
Open, Sesame! On the Security of Electronic Locks
Electronic locking systems are becoming increasingly prevalent for both... |
||
Open Source Hardware
|
||
Overclocking the Humanity: The Science of Cycles Reveals Future Trends
The ancient science of the Cycles. Development cycles of civilization and... |
||
Parallella - super computer for everyone
We will try to take a look at Linux/arm ecosystem, and Parallella in... |
||
Post-Quantum Crypto
The security of asymmetric crypto algorithms today like RSA and ECC is based... |
||
Project Heapbleed
Heap related bugs (such as buffer overflows, use-after-frees, dangling/stale... |
||
Protecting your car
Marian have built an Arduino based device that includes, Arduino Uno,... |
||
Rakija Workshop
Rakia is one of the most popular alcoholic drink in Serbia. It is usually... |
|
|
Riding the Overflow - Then and Now
Exploiting software vulnerability after finding one one has dramatically... |
||
SCADA deep inside: protocols and security mechanisms
In my topic I'll share my experience in analysis of most popular open and... |
||
Silicon Valley - Fireside chat about Startups, Open Source and Technology Stacks
- Technology stack running in big companies. Open source vs. commercial... |
||
Sleep? Ain't nobody got time for that!
For hackers in general, finding ways to stay awake and alert is an issue of... |
||
The Linux kernel's attack surface
The Linux kernel ships with many features which can be, and are, exploited by... |
||
The Oscilloscope Challenge - No buckets, no ice, just signals in 2D
Info Get a brief intro to the mysterious world of Oscilloscopes. Some... |
||
Tor
Tor provides anonymous communication for everyone by bouncing traffic... |
||
Using RIPE Atlas API for measuring IPv6 Reachability
Cooperation and sharing are the keywords for this talk -- sharing of data,... |
||
Vaccinating Android
Number of mobile applications is rising and Android still holds large market... |
||
Volunteered geographic information and OpenStreetMap
With the advance of technology and a growing number of volunteers the... |
||
Web dev’s common system security mistakes
This talk will examine some common security issues regarding application... |
||
Where is Serbia in Copyright and Patents war?
|
||
Women in Wikipedia
Its about Wikipedia and the involvement of women in wikipedia how they and... |