The following is a list of sessions for this Audio Disc from DEFCON 7.0. The Table of Contents is also included in your packing materials. You will notice that the sessions are not listed in numberical order. This is due to schedule changes and cancellations. Should you have any questions please contact us at tsok3@cts.com Thanks Michael W. Doane President The Sound of Knowledge, Inc. Session # Session Title 02 Cryptography by Schneier 03 IP6 by Swift 04 Issues in Interrogations by Poulson and Grannick 05 Phreaking & PBX Tricks by Gh0st 06 The Firewall Appliance: Friend or Foe? by Darenroe 07 Legal Q & A by Thackeray and Higgins 08 Hacking Windows Window Registers & Shares by Mojo 09 Hacking Oracle 101 by Vandel 10 Hacking Las Vegas by Jorasch 11 Radio Guy 13 Met the Fed Panel 14 Cyber Forensics by Stephenson 16 Fear and Loathing in Cyberspace: The Art and Science of Enemy Profiling by Angus Bitter 18 Introduction to TCP/IP by Punkis 19 Insecurities in Networking Devices by Rooster 20 Hackers and the Media: A Love-hate Thing by Martinez 21 Introduction to TCP/IP Exploits by Shipley 22 The Ethics/Morality/Practicality/Patriotism of Hacking by Loranger 23 The Myths of Hiring Hackers by Winkler 24 Introduction to Scanning by M0dify 25 SET Technology by Dead Addict 26 Viruses On (and Off) the Internet by Gordon and Panel 27 BO2K is Announced and Released by Cult of the Dead Cow 28 Introduction to Virus by Lupo 30 #1 by Newman 31 Macintosh Security by Freaky 33 IPv6: Who/What/Where/How/Why by Dr. Byte 34 How to Use BSD to Set up a Firewall/Gateway by Cyber 35 How to Be Aware of Security Problems on Your Network by Rowland 36 HERF Guns, EMP Boms and Weapons of Mass Destruction by Schwartau 38 The Defcon Proxy Server by Windmann 39 Zero-Knowledge Networks Update by Goldberg 40 Security Problems Associated with Client-Side Scripting by Tom 41 Extra Border Hacking 42 Lock Picking Demonstration by V1RU5 43 TEXTFILES, G-PHILES AND LOG FILES: Remembering the 1980's through ASCII by Scott 44 How to Use BO2K by Reznor 45 Follow Up on Micropower Radio by Professor Feedlebom 47 "Crypto Tales" by Parekh 49 Firewalls: Trends and Problems by Alexander 52 Embedded Systems Hacking by Peugeot 53 Wearable Systems by Mann 54 Internet Anonymity Under Assault: The "John Doe" Lawsuits by Sobel