Version 1.0.3

Events

  Title Speakers
Event_small
50.0 Shades of Multimeters
Need to measure some electrical values? Learn to use multimeters...
Event_small
An Introduction to Ansible
Ansible is a system orchestration and management tool that allows users and...
Event_small
Arduinos for Total Newbies
You've probably heard lots about Arduino. But if you don't know what it is,...
Event_small
Beginnings in 3d printing
Types of 3d printers Personal and Professional 3d printers. Actual...
Event_small
Beginnings of the Home Computer (R)evolution in Yugoslavia
How one computer kick-started home computer (r)evolution in 1984 in former...
Event_small
BGP Routing
Learn how the Internet is tethered together by creating your own peerings...
Event_small
Case Study: interception of torrent traffic and what should we do about it
The study includes analysis of actual conflict of interest when it comes to...
Event_small
Challenges of freedom of speech online: technical, legal and ethical aspects
Freedom of speech is one of the essential human rights, it is guaranteed by...
Event_small
Closing ceremony
Event_small
Defining an abstract architecture for managing unstructured data using MongoDB - use case of vDrive
Knowledge access and knowledge sharing is essential in contemporary...
Event_small
Docker for fun and profit
Docker provides an excellent mechanism for creating low-overhead...
Event_small
Embedded Linux Device Drivers
Purpose-built operating systems based on the Linux kernel are widely used...
Event_small
Exploring treasures of 77FEh
If vendors need to expose serial interface to “modern” IP world, they often...
Event_small
File encryption for untrusted remote file systems
Storing files on an untrusted file system doesn't seem to be a properly...
Event_small
Force multiplier - Guided password cracking
In this talk, I will show how to better target password cracking and...
Event_small
Fractal Geometry and Programming in Java
Chaos represents the property that certain mathematically deterministic...
Event_small
Fun with(out) Freedom of Information
Austria, despite its nominal status as a democracy, does not recognize...
Event_small
Hacking before computers
Before integrated circuits, digital circuits have been made with discrete...
Event_small
Home Automation for 50 euros
I have maked Home Automation for 50 euros using Raspberry Pi. What problem my...
Event_small
Lightning talks
    Logo
    Opening Event
    Welcome to the BalCCon2k14 - Second Base
      Event_small
      Open, Sesame! On the Security of Electronic Locks
      Electronic locking systems are becoming increasingly prevalent for both...
      Event_small
      Open Source Hardware
      Event_small
      Overclocking the Humanity: The Science of Cycles Reveals Future Trends
      The ancient science of the Cycles. Development cycles of civilization and...
      Event_small
      Parallella - super computer for everyone
      We will try to take a look at Linux/arm ecosystem, and Parallella in...
      Event_small
      Post-Quantum Crypto
      The security of asymmetric crypto algorithms today like RSA and ECC is based...
      Event_small
      Project Heapbleed
      Heap related bugs (such as buffer overflows, use-after-frees, dangling/stale...
      Event_small
      Protecting your car
      Marian have built an Arduino based device that includes, Arduino Uno,...
      Event_small
      Rakija Workshop
      Rakia is one of the most popular alcoholic drink in Serbia. It is usually...
        Event_small
        Riding the Overflow - Then and Now
        Exploiting software vulnerability after finding one one has dramatically...
        Event_small
        SCADA deep inside: protocols and security mechanisms
        In my topic I'll share my experience in analysis of most popular open and...
        Event_small
        Silicon Valley - Fireside chat about Startups, Open Source and Technology Stacks
        - Technology stack running in big companies. Open source vs. commercial...
        Event_small
        Sleep? Ain't nobody got time for that!
        For hackers in general, finding ways to stay awake and alert is an issue of...
        Event_small
        The Linux kernel's attack surface
        The Linux kernel ships with many features which can be, and are, exploited by...
        Event_small
        The Oscilloscope Challenge - No buckets, no ice, just signals in 2D
        Info Get a brief intro to the mysterious world of Oscilloscopes. Some...
        Event_small
        Tor
        Tor provides anonymous communication for everyone by bouncing traffic...
        Event_small
        Using RIPE Atlas API for measuring IPv6 Reachability
        Cooperation and sharing are the keywords for this talk -- sharing of data,...
        Event_small
        Vaccinating Android
        Number of mobile applications is rising and Android still holds large market...
        Event_small
        Volunteered geographic information and OpenStreetMap
        With the advance of technology and a growing number of volunteers the...
        Event_small
        Web dev’s common system security mistakes
        This talk will examine some common security issues regarding application...
        Event_small
        Where is Serbia in Copyright and Patents war?
        Event_small
        Women in Wikipedia
        Its about Wikipedia and the involvement of women in wikipedia how they and...