dojocon, hacking, security http://Dojocon.org http://hackerspaces.org/wiki/Reverse_Space Tiffany Strauchs Rad, @tiffanyrad International Cyber Jurisdiction: “Kill Switching” Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping John Strauchs, @strauchs Security and IT Convergence Richard Goldberg, @GoldbergLawDC Rules of Engagment: Mitigating Risk in Information Security Work Jon McCoy Ninja Patching .NET Marco Figueroa, @marcofigueroa & Kevin Figueroa Detecting & Defending You Network using Nepenthes/Shaolin Tools Dave Marcus, @davemarcus Using Social Networks To Profile, Find and 0wn Your Victims Brian Baskin, @bbaskin P2P Forensics Jonathan Abolins, @jabolins When Domain Names Look Like Spaghetti (or Whatever) Internationalized Domain Names & Investigations in the Networked World Deviant Ollam, @deviantollam Don't Touch My Junk Michael Shearer, @theprez98 How to 0wn an ISP in 10 Minutes Christopher Witter, @mr_cwitter Enterprise Packet Capture on Da'Cheap Ben Smith Printer Exploitation Adrian Crenshaw, @irongeek_adc Malicious USB Devices: Is that an attack vector in your pocket or are you just happy to see me? Shyaam Sundhar, @EvilFingers and John Fulmer, @DaKahuna2007 Is the IDS Dead? Chris Nickerson, @indi303 The State of (In)Security Gal Shpantzer, @shpantzer Security Outliers: Cultural Cues from High-Risk Professions Michael Smith, @rybolov DDoS