Never Ending Security

It starts all here

Derbycon 4 2014 Video’s

Video’s from: https://archive.org/details/derbycon4

Movie Files Animated GIF MPEG4 Ogg Video Thumbnail Flash Video h.264
BartHopper-SurvivingUntilDawn.mp4 199.2 KB 60.3 MB 149.7 MB 4.2 KB
Closing-Ceremony.mp4 333.6 KB 559.1 MB 378.5 MB 7.7 KB
Hacking-The-Media-For-Fame-And-Profit-Jenn-Ellis-Steven-Regan.mp4 296.2 KB 111.3 MB 110.8 MB 5.1 KB
Parenteing-In-Infosec-Rafal-Los.mp4 179.3 KB 54.3 MB 81.2 MB 3.6 KB
Red-Teaming-Back-and-Forth-5ever-Fuzzynop.mp4 332.2 KB 349.1 MB 224.5 MB 6.2 KB
So-You-Want-To-Murder-a-Software-Patent-Jason-Scott.mp4 318.3 KB 232.5 MB 221.7 MB 4.6 KB
Soft-Skills-for-a-Technical-World-Justin-Herman.mp4 182.3 KB 72.7 MB 69.2 MB 4.3 KB
The-Achilles-Heel-Of-The-Banking-System.mp4 283.9 KB 82.1 MB 124.5 MB 4.0 KB
no-audio-t418-A-Bug-or-Malware-Catastrophic-consequences-either-way-Benjamin-Holland-and-Suresh-Kothari.flv 324.7 KB 207.4 MB 4.5 KB 573.6 MB 291.2 MB
t100-Welcome-to-the-Family-Intro.mp4 289.3 KB 130.0 MB 113.9 MB 6.4 KB
t101-Hackers-saving-the-world-from-the-zombie-apocalypse-Johnny-Long.mp4 349.2 KB 285.5 MB 190.0 MB 7.1 KB
t102-How-to-Give-the-Best-Pen-Test-of-Your-Life-Ed-Skoudis.mp4 362.1 KB 292.2 MB 185.8 MB 6.3 KB
t103-Adaptive-Pentesting-Part-Two-Keynote-Kevin-Mitnick-and-Dave-Kennedy.mp4 338.3 KB 247.7 MB 180.9 MB 6.7 KB
t104-If-it-fits-it-sniffs-Adventures-in-WarShipping-Larry-Pesce.mp4 325.5 KB 134.5 MB 210.7 MB 4.6 KB
t105-Abusing-Active-Directory-in-Post-Exploitation-Carlos-Perez.mp4 293.9 KB 122.4 MB 173.2 MB 4.2 KB
t106-Quantifying-the-Adversary-Introducing-GuerillaSearch-and-GuerillaPivot-Dave-Marcus.mp4 332.5 KB 187.5 MB 209.6 MB 5.6 KB
t107-A-Year-in-the-Backdoor-Factory-Joshua-Pitts.mp4 283.5 KB 127.9 MB 193.0 MB 5.5 KB
t108-Ball-and-Chain-A-New-Paradigm-in-Stored-Password-Security-Benjamin-Donnelly-and-Tim-Tomes.mp4 330.0 KB 144.6 MB 210.9 MB 6.7 KB
t109-Et-tu-Kerberos-Christopher-Campbell.mp4 319.9 KB 119.5 MB 144.3 MB 5.0 KB
t110-Advanced-Red-Teaming-All-Your-Badges-Are-Belong-To-Us-Eric-Smith.mp4 332.9 KB 317.0 MB 217.9 MB 4.6 KB
t111-Bypassing-Internet-Explorers-XSS-Filter-Carlos-Munoz.mp4 306.4 KB 138.6 MB 171.3 MB 4.9 KB
t112-Interceptor-A-PowerShell-SSL-MITM-Script-Casey-Smith.mp4 240.5 KB 76.5 MB 128.6 MB 6.4 KB
t113-More-New-Shiny-in-the-Metasploit-Framework-Egypt.mp4 281.8 KB 129.1 MB 163.4 MB 5.7 KB
t115-The-Human-Buffer-Overflow-aka-Amygdala-Hijacking-Christopher-Hadnagy.mp4 322.4 KB 225.7 MB 213.5 MB 5.5 KB
t116-Shellcode-Time-Come-on-Grab-Your-Friends-Wartortell.mp4 295.6 KB 132.4 MB 187.8 MB 6.8 KB
t117-The-Internet-Of-Insecure-Things-10-Most-Wanted-List-Paul-Asadoorian.mp4 323.9 KB 256.2 MB 224.9 MB 5.5 KB
t118-DDoS-Botnet-1000-Knives-and-a-Scalpel-Josh-Abraham.mp4 299.5 KB 128.5 MB 192.1 MB 5.8 KB
t119-wifu2-Cameron-Maerz.mp4 275.0 KB 195.1 MB 161.2 MB 4.8 KB
t120-Attacking-Microsoft-Kerberos-Kicking-the-Guard-Dog-of-Hades-Tim-Medin.mp4 300.4 KB 226.6 MB 206.6 MB 6.9 KB
t121-Introducing-Network-Scout-Defending-The-Soft-Center-of-Your-Network-Bill-oncee-Gardner-Aaedan-SomerVille-Shawn-Jordan.mp4 270.0 KB 167.0 MB 144.8 MB 4.7 KB
t122-Getting-Windows-to-Play-with-Itself-A-Pen-Testers-Guide-to-Windows-API-Abuse-Brady-Bloxham.mp4 310.4 KB 164.2 MB 194.4 MB 5.0 KB
t124-Protocol-Me-Maybe-How-to-Date-SCADA-Stephen-Hilt.mp4 303.2 KB 199.5 MB 206.3 MB 5.5 KB
t125-Attacks-and-Countermeasures-Advanced-Network-Traffic-Manipulation-Matt-Kelly-and-Ryan-Reynolds.mp4 328.3 KB 215.4 MB 231.3 MB 5.0 KB
t126-What-to-expect-when-youre-expectinga-pentest-Martin-Bos-and-Eric-Milam.mp4 318.8 KB 176.8 MB 256.6 MB 5.6 KB
t200-Threat-Modeling-for-Realz-Bruce-Potter.mp4 307.0 KB 247.1 MB 230.5 MB 6.1 KB
t201-A-Guided-Tour-of-the-Internet-Ghetto-Introduction-to-Tor-Hidden-Services-Brent-Huston.mp4 379.9 KB 204.3 MB 182.9 MB 6.9 KB
t203-How-not-to-suck-at-pen-testing-John-Strand.mp4 365.2 KB 229.3 MB 219.8 MB 5.9 KB
t204-Mainframes-Mopeds-and-Mischief-A-PenTesters-Year-in-Review-Tyler-Wrightson.mp4 338.3 KB 275.6 MB 232.8 MB 5.5 KB
t205-The-Multibillion-Dollar-Industry-Thats-Ignored-Jason-Montgomery-and-Ryan-Sevey.mp4 347.5 KB 296.9 MB 220.6 MB 5.2 KB
t206-Code-Insecurity-or-Code-in-Security-Mano-dash4rk-Paul.mp4 289.4 KB 223.8 MB 206.1 MB 4.2 KB
t207-C3CM-Defeating-the-Command-Control-and-Communications-of-Digital-Assailants-Russ-McRee.mp4 366.6 KB 146.7 MB 141.5 MB 6.5 KB
t208-Attack-Paths-Breaking-Into-Infosec-From-IT-Or-Other-Totally-Different-Fields-Eve-Adams-and-Johnny-Xmas.mp4 319.2 KB 291.4 MB 235.2 MB 4.1 KB
t209-How-to-Secure-and-Sys-Admin-Windows-like-a-Boss-Jim-Kennedy.mp4 313.6 KB 321.7 MB 202.6 MB 4.7 KB
t210-Red-white-and-blue-Making-sense-of-Red-Teaming-for-good-Ian-Amit.mp4 330.3 KB 354.3 MB 217.8 MB 6.5 KB
t211-Around-the-world-in-80-Cons-Jayson-E-Street.mp4 352.0 KB 420.1 MB 264.7 MB 6.0 KB
t212-Mirage-Next-Gen-Honeyports-Adam-Crompton-and-Mick-Douglas.mp4 273.7 KB 211.5 MB 181.8 MB 4.1 KB
t214-Active-Directory-Real-Defense-for-Domain-Admins-Jason-Lang.mp4 314.6 KB 317.8 MB 204.9 MB 5.6 KB
t215-The-Wireless-World-of-the-Internet-of-Things-JP-Dunning-ronin.mp4 306.4 KB 271.4 MB 224.4 MB 5.5 KB
t216-Open-Source-Threat-Intelligence-Developing-a-Threat-intelligence-program-using-open-source-tools-and-public-sources-Edward-McCabe.mp4 289.4 KB 275.6 MB 214.0 MB 4.6 KB
t218-Hacking-Mainframes-Vulnerabilities-in-applications-exposed-over-TN3270-Dominic-White.mp4 366.3 KB 210.1 MB 206.0 MB 5.5 KB
t219-Single-Chip-Microcontrollers-Beyond-Arduino-Tharon-Hall.mp4 377.6 KB 234.3 MB 211.2 MB 6.0 KB
t220-Building-Better-Botnets-with-IPv6-Code2.mp4 247.5 KB 164.7 MB 174.2 MB 5.3 KB
t221-Bad-Advice-Unintended-Consequences-and-Broken-Paradigms-Think-Act-Different-Steve-Werby.mp4 268.6 KB 195.5 MB 215.2 MB 3.3 KB
t222-Simple-Network-Management-Pwnd-Deral-Heiland-and-Matthew-Kienow.mp4 313.6 KB 266.0 MB 193.3 MB 5.3 KB
t300-Patching-the-Human-Vulns-Leonard-Isham.mp4 307.2 KB 154.0 MB 182.6 MB 4.2 KB
t301-Burp-For-All-Languages-Tom-Steele.mp4 279.1 KB 123.8 MB 116.5 MB 6.9 KB
t302-Passing-the-Torch-Old-School-Red-Teaming-New-School-Tactics-David-McGuire-and-Will-Schroeder.mp4 354.3 KB 199.5 MB 204.7 MB 6.7 KB
t303-I-Am-The-Cavalry-Year-0-Space-Rogue-and-Beau-Woods.mp4 307.9 KB 229.3 MB 232.6 MB 5.1 KB
t304-University-Education-In-Security-Panel-Bill-Gardner-oncee-Ray-Davidson-Adrian-Crenshaw-Sam-Liles-Rob-Jorgensen.mp4 435.7 KB 727.0 MB 229.2 MB 6.9 KB
t305-What-happened-to-the-A-How-to-leverage-BCPDR-for-your-Info-Sec-Program-Moey.mp4 318.1 KB 179.2 MB 187.2 MB 5.2 KB
t306-Securing-Your-Assets-from-Espionage-Stacey-Banks.mp4 313.1 KB 177.2 MB 208.0 MB 6.8 KB
t307-Hackers-Are-People-Too-Amanda-Berlin-Infosystir.mp4 347.9 KB 178.0 MB 143.2 MB 4.7 KB
t308-Ethical-Control-Ethics-and-Privacy-in-a-Target-Rich-Environment-Kevin-Johnson-and-James-Jardine.mp4 327.3 KB 183.5 MB 212.5 MB 5.9 KB
t309-The-Road-to-Compliancy-Success-Plus-Plus-James-Arlen.mp4 254.8 KB 126.8 MB 187.7 MB 5.4 KB
t310-Are-You-a-Janitor-Or-a-Cleaner-John-Stauffacher-and-Matt-Hoy.mp4 271.2 KB 158.2 MB 237.4 MB 4.0 KB
t311-Practical-PowerShell-Programming-for-Professional-People-Ben-Ten-Ben0xA.mp4 328.6 KB 157.1 MB 206.2 MB 5.5 KB
t312-GROK-atlas.mp4 374.6 KB 199.6 MB 198.5 MB 7.4 KB
t313-How-building-a-better-hacker-accidentally-built-a-better-defender-Casey-Ellis.mp4 279.0 KB 182.8 MB 182.0 MB 5.0 KB
t314-Exploring-Layer-2-Network-Security-in-Virtualized-Environments-Ronny-L-Bull-Dr-Jeanna-N-Matthews.mp4 320.0 KB 153.6 MB 144.6 MB 5.4 KB
t315-Hardware-Tamper-Resistance-Why-and-How-Ryan-Lackey.mp4 285.3 KB 103.4 MB 155.0 MB 4.3 KB
t316-Analyzing-Weak-Areas-of-the-Federal-Cloud-Security-Program-Vinny-Troia.mp4 319.1 KB 227.4 MB 226.0 MB 6.2 KB
t317-Proactive-Application-Security-Karthik-Rangarajan.mp4 336.9 KB 174.5 MB 160.2 MB 5.0 KB
t318-Chicken-of-the-APT-Understanding-Targeted-Attackers-with-Incubation-Kyle-Wilhoit.mp4 378.8 KB 205.3 MB 206.2 MB 6.7 KB
t319-Bending-and-Twisting-Networks-Paul-Coggins.mp4 355.9 KB 166.8 MB 189.9 MB 8.6 KB
t320-Bridging-the-gap-between-red-and-blue-Dave-Kennedy-and-Jamie-Murdock.mp4 347.6 KB 260.4 MB 239.3 MB 5.1 KB
t321-CMS-Hacking-Tricks-Greg-Foss.mp4 314.0 KB 202.1 MB 217.5 MB 5.5 KB
t322-Advanced-Incident-Response-with-Bro-Liam-Randall-hectaman.mp4 305.0 KB 220.4 MB 221.4 MB 3.6 KB
t400-Subverting-ML-Detections-for-Fun-and-Profit-Ram-Shankar-Siva-Kumar-John-Walton.mp4 277.2 KB 141.3 MB 172.3 MB 5.0 KB
t401-Secrets-of-DNS-Ron-Bowes.mp4 344.5 KB 191.3 MB 203.6 MB 5.4 KB
t402-Snort-OpenAppID-How-to-Build-an-Open-Source-Next-Generation-Firewall-Adam-Hogan.mp4 362.5 KB 262.0 MB 229.0 MB 7.1 KB
t403-GET-A-Grip-on-Your-Hustle-Glassdoor-Exfil-Toolkit-Parker-Schmitt-Kyle-Stone-essobi-Chris-Hodges-g11tch.mp4 315.8 KB 200.3 MB 182.7 MB 8.9 KB
t404-DNS-Based-Authentication-of-Named-Entities-DANE-Can-we-fix-our-broken-CA-model-Tony-Cargile.mp4 336.4 KB 218.6 MB 216.2 MB 5.8 KB
t405-Exploiting-Browsers-Like-A-Boss-w-WhiteLightning-Bryce-Kunz.mp4 336.0 KB 152.4 MB 149.1 MB 5.0 KB
t406-Real-World-Intrusion-Response-Lessons-from-the-Trenches-Katherine-Trame-and-David-Sharpe.mp4 319.0 KB 281.3 MB 233.3 MB 5.5 KB
t407-Application-Whitelisting-Be-Careful-Where-The-Silver-Bullet-Is-Aimed-David-McCartney.mp4 271.3 KB 268.2 MB 200.7 MB 4.0 KB
t408-Making-Mongo-Cry-Attacking-NoSQL-for-Pen-Testers-Russell-Butturini.mp4 313.3 KB 394.0 MB 197.8 MB 4.6 KB
t409-Step-On-In-The-Waters-Fine-An-Introduction-To-Security-Testing-Within-A-Virtualized-Environment-Tom-Moore.mp4 389.1 KB 264.6 MB 208.5 MB 4.5 KB
t410-Give-me-your-data-Obtaining-sensitive-data-without-breaking-in-Dave-Chronister.mp4 310.5 KB 190.8 MB 224.4 MB 4.1 KB
t411-Third-Party-Code-FIX-ALL-THE-THINGS-Kymberlee-Price-Jake-Kouns.mp4 295.3 KB 183.9 MB 218.8 MB 5.6 KB
t412-Just-What-The-Doctor-Ordered-Scott-Erven.mp4 354.5 KB 159.2 MB 199.6 MB 7.3 KB
t413-Powershell-Drink-the-Kool-Aid-Wayne-Pruitt-Zack-Wojton.mp4 351.2 KB 211.3 MB 178.0 MB 6.2 KB
t414-powercat-Mick-Douglas.mp4 316.0 KB 218.3 MB 217.6 MB 6.6 KB
t415-Macro-Malware-Lives-Putting-the-sexy-back-into-MS-Office-document-macros-Joff-Thyer.mp4 336.2 KB 217.1 MB 145.7 MB 4.5 KB
t416-Girl-Fault-Interrupted-Maggie-Jauregui.mp4 340.3 KB 163.7 MB 164.1 MB 7.4 KB
t419-Its-Not-Easy-Being-Purple-Bill-Gardner-Valerie-Thomas-Amanda-Berlin-Eric-Milam-Brandon-McCann-Royce-Davis.mp4 407.6 KB 591.8 MB 236.4 MB 5.5 KB
t420-Control-Flow-Graph-Based-Virus-Scanning-Douglas-Goddard.mp4 293.4 KB 129.4 MB 133.8 MB 4.5 KB
t421-Ok-so-youve-been-pwned-now-what-Jim-Wojno.mp4 363.3 KB 214.3 MB 226.0 MB 6.8 KB
t422-Everybody-gets-clickjacked-Hard-knock-lessons-on-bug-bounties-Jonathan-Cran.mp4 267.0 KB 198.4 MB 204.7 MB 3.6 KB
t423-Are-you-a-Beefeater-focused-on-protecting-your-crown-jewels-Jack-Nichelson.mp4 377.4 KB 277.3 MB 218.4 MB 8.9 KB
t500-NeXpose-For-Automated-Compromise-Detection-Luis-connection-Santana.mp4 341.6 KB 118.2 MB 116.7 MB 5.3 KB
t501-A-girl-some-passion-and-some-tech-stuff-Branden-Miller-and-Emily-Miller.mp4 331.9 KB 138.2 MB 123.1 MB 8.5 KB
t502-InfoSec-from-the-mouth-of-babes-or-an-8-year-old-Reuben-A-Paul-RAPstar-and-Mano-Paul.mp4 263.9 KB 73.5 MB 98.6 MB 8.4 KB
t503-Why-Aim-for-the-Ground-Teaching-Our-School-Kids-All-of-the-Right-Computer-Skills-Phillip-Fitzpatrick.mp4 322.8 KB 114.7 MB 107.1 MB 6.2 KB
t504-NoSQL-Injections-Moving-Beyond-or-11-Matt-Bromiley.mp4 289.9 KB 98.0 MB 102.3 MB 5.2 KB
t505-SWF-Seeking-Lazy-Admin-for-Cross-Domain-Action-Seth-Art.mp4 242.6 KB 68.5 MB 102.8 MB 6.9 KB
t506-Planning-for-Failure-Noah-Beddome.mp4 185.1 KB 81.6 MB 72.4 MB 4.2 KB
t507-The-Social-Engineering-Savants-The-Psychopathic-Profile-Kevin-Miller.mp4 231.4 KB 70.9 MB 113.0 MB 5.0 KB
t508-Hiding-the-breadcrumbs-Forensics-and-anti-forensics-on-SAP-systems-Juan-Perez-Etchegoyen.mp4 293.5 KB 121.4 MB 120.3 MB 5.4 KB
t509-Youre-in-the-butter-zone-now-baby-Chris-Scott.mp4 249.9 KB 83.9 MB 111.2 MB 3.4 KB
t510-Making-BadUSB-Work-For-You-Adam-Caudill-Brandon-Wilson.mp4 256.8 KB 88.0 MB 100.5 MB 5.7 KB
t511-PassCrackNet-When-everything-else-fails-just-crack-hashes-Adam-Ringwood.mp4 160.7 KB 74.6 MB 70.3 MB 3.6 KB
t512-Vulnerability-Assessment-20-John-Askew.mp4 211.2 KB 77.4 MB 111.2 MB 4.5 KB
t513-Social-Engineering-your-progeny-to-be-hackers-Sydney-Liles.mp4 243.7 KB 94.4 MB 108.2 MB 6.4 KB
t514-A-Brief-History-of-Exploitation-Devin-Cook.mp4 257.2 KB 86.5 MB 105.3 MB 5.0 KB
t515-Hunting-Malware-on-Linux-Production-Servers-The-Windigo-Backstory-Olivier-Bilodeau.mp4 243.7 KB 229.4 MB 200.1 MB 4.1 KB
t516-Human-Trafficking-in-the-Digital-Age.mp4 238.5 KB 52.1 MB 112.4 MB 5.4 KB
t517-Cat-Herding-in-the-Wild-Wild-West-What-I-Learned-Running-A-Hackercon-CFP-Nathaniel-Husted.mp4 293.1 KB 78.5 MB 108.8 MB 7.4 KB
t518-How-to-Stop-a-Hack-Jason-Samide.mp4 207.2 KB 58.2 MB 84.3 MB 6.8 KB
t519-We-dont-need-no-stinking-Internet-Greg-Simo.mp4 201.6 KB 56.4 MB 77.7 MB 6.2 KB
t520-ZitMo-NoM-David-Schwartzberg.mp4 357.7 KB 124.8 MB 139.6 MB 6.6 KB
t521-Penetrate-your-OWA-Nate-Power.mp4 237.0 KB 58.3 MB 93.9 MB 6.5 KB
t522-RavenHID-Remote-Badge-Gathering-or-Why-we-sit-in-client-bathrooms.mp4 180.0 KB 47.6 MB 72.3 MB 6.8 KB
t523-Interns-Down-for-What-Tony-Turner.mp4 238.4 KB 59.1 MB 94.1 MB 5.8 KB
t524-i-r-web-app-hacking-and-so-can-you-Brandon-Perry.mp4 252.5 KB 67.7 MB 94.6 MB 4.5 KB
t525-Building-a-Modern-Security-Engineering-Organization-Zane-Lackey.mp4 215.7 KB 59.0 MB 97.4 MB 4.8 KB
t526-Information-Security-Team-Management-How-to-keep-your-edge-while-embracing-the-dark-side-Stephen-C-Gay.mp4 276.1 KB 78.3 MB 100.3 MB 7.2 KB
t527-5min-web-audit-Security-in-the-startup-world-Evan-Johnson.mp4 186.6 KB 50.0 MB 81.2 MB 5.1 KB
t528-Project-SCEVRON-SCan-EVrything-with-ruby.mp4 195.2 KB 67.1 MB 78.6 MB 4.9 KB
t530-Gone-in-60-minutes-a-Practical-Approach-to-Hacking-an-Enterprise-with-Yasuo-Saurabh-Harit-and-Stephen-Hall.mp4 319.9 KB 96.3 MB 109.2 MB 6.9 KB
t531-Snarf-Capitalizing-on-Man-in-the-Middle-Victor-Mata-Josh-Stone.mp4 270.2 KB 83.0 MB 100.4 MB 6.3 KB
t532-Electronic-locks-in-firearms-Oh-My-Travis-Hartman.mp4 314.2 KB 89.1 MB 121.3 MB 6.8 KB
t533-Dolla-Dolla-Bump-Key-Chris-Sistrunk.mp4 335.3 KB 101.8 MB 110.4 MB 5.9 KB
t534-What-Dungeons-Dragons-Taught-Me-About-INFOSEC-Joey-Maresca-l0stkn0wledge.mp4 336.2 KB 96.1 MB 112.6 MB 7.6 KB
t535-Gender-Differences-in-Social-Engineering-Does-Sex-Matter-Shannon-Sistrunk.mp4 279.2 KB 87.7 MB 102.0 MB 5.3 KB
t536-Introduction-to-System-Hardening-Eddie-David.mp4 318.6 KB 105.6 MB 120.3 MB 4.4 KB
t537-Hacking-your-way-into-the-APRS-Network-on-the-Cheap-Mark-Lenigan.mp4 249.2 KB 87.9 MB 93.0 MB 7.1 KB
t538-Building-a-Web-Application-Vulnerability-Management-Program-Jason-Pubal.mp4 265.0 KB 74.6 MB 113.7 MB 6.3 KB
t539-Fighting-Back-Against-SSL-Inspection-or-How-SSL-Should-Work-Jacob-Thompson.mp4 225.6 KB 62.4 MB 79.6 MB 5.7 KB
t540-Physical-Security-From-Locks-to-Dox-Jess-Hires.mp4 271.5 KB 77.1 MB 100.9 MB 5.2 KB
t541-Am-I-an-Imposter-Warren-Kopp.mp4 197.3 KB 54.4 MB 76.5 MB 7.0 KB
t542-Call-of-Community-Modern-Warfare-Ben-Ten-and-Matt-Johnson.mp4 294.4 KB 76.5 MB 106.3 MB 7.1 KB
t543-The-Canary-in-the-Cloud-Scot-Bernerv.mp4 267.2 KB 99.2 MB 98.7 MB 4.5 KB
Information Format Size
derbycon4_files.xml Metadata [file]
derbycon4_meta.sqlite Metadata 238.0 KB
derbycon4_meta.xml Metadata 720.0 B
Other Files Unknown Archive BitTorrent
__ia_spool/.t543-The-Canary-in-the-Cloud-Scot-Bernerv.mp4.kIdQhd 99.2 MB
derbycon4_archive.torrent 291.1 KB
Advertisements

One response to “Derbycon 4 2014 Video’s

  1. jqcrvboabod@gmail.com 3 May 2015 at 10:50

    Hello Web Admin, I noticed that your On-Page SEO is is missing a few factors, for one you do not use all three H tags in your post, also I notice that you are not using bold or italics properly in your SEO optimization. On-Page SEO means more now than ever since the new Google update: Panda. No longer are backlinks and simply pinging or sending out a RSS feed the key to getting Google PageRank or Alexa Rankings, You now NEED On-Page SEO. So what is good On-Page SEO?First your keyword must appear in the title.Then it must appear in the URL.You have to optimize your keyword and make sure that it has a nice keyword density of 3-5% in your article with relevant LSI (Latent Semantic Indexing). Then you should spread all H1,H2,H3 tags in your article.Your Keyword should appear in your first paragraph and in the last sentence of the page. You should have relevant usage of Bold and italics of your keyword.There should be one internal link to a page on your blog and you should have one image with an alt tag that has your keyword….wait there’s even more Now what if i told you there was a simple WordPress plugin that does all the On-Page SEO, and automatically for you? That’s right AUTOMATICALLY, just watch this 4minute video for more information at. Seo Plugin

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s