BalCCon2k19 - Nikola Luburic - Secure Design Principles
BalCCon2k19 - Sam Lanning - No More Whack a Mole How to Find and Prevent Entire Classes of Sec. Vul.
BalCCon2k19 - Leyrer - Modern Commandline Tools
BalCCon2k19 - Philipp Krenn - Seccomb Your next Layer of defence
BalCCon2k19 - Max Mehl - No IT security without Free software
BalCCon2k19 - Vanja - Legitimate tools or weapons of mass compromise
BalCCon2k19 - Dobrica Pavlinusic - So is Android a Linux
BalCCon2k19 - Bojan Zdrnja - A BEAST and a POODLE celebrating SWEET32
BalCCon2k19 - Chris Kubecka - The Road to Hell is Paved with Bad Passwords
BalCCon2k19 - MacLemon - Emoji how do they even work
BalCCon2k19 - Senad Aruc - Busting Advanced Botnets
BalCCon2k19 - Jaromir Horejsi - Looking through muddy waters insight into TTPs of a middle e. threat
BalCCon2k19 - Rafal Leszko - Where is my cache - Architectural patterns for caching microservices
BalCCon2k19 - Aluc - Possible effects from electromagnetic pollution of micro and millimeter waves
Balkan Computer Congress - BalCCon2k19 - Uncharted Waters
BalCCon2k19 - Cluosh & Hetti - Intro BalCCon Beginner CTF
BalCCon2k19 - Macabeus & Matheus Albuquerque - The day i reverse engineered a gameboy advanced game
BalCCon2k19 - Trammell Hudson - spispy - Open source SPI flash emulation
BalCCon2k19 - Dejan Strbad - Known and less known methods of user tracking
BalCCon2k19 - PCdog - RPKI Validation