Never Ending Security

It starts all here

Tag Archives: Derbycon 4

Derbycon 4 2014 Video’s


Video’s from: https://archive.org/details/derbycon4

Movie Files Animated GIF MPEG4 Ogg Video Thumbnail Flash Video h.264
BartHopper-SurvivingUntilDawn.mp4 199.2 KB 60.3 MB 149.7 MB 4.2 KB
Closing-Ceremony.mp4 333.6 KB 559.1 MB 378.5 MB 7.7 KB
Hacking-The-Media-For-Fame-And-Profit-Jenn-Ellis-Steven-Regan.mp4 296.2 KB 111.3 MB 110.8 MB 5.1 KB
Parenteing-In-Infosec-Rafal-Los.mp4 179.3 KB 54.3 MB 81.2 MB 3.6 KB
Red-Teaming-Back-and-Forth-5ever-Fuzzynop.mp4 332.2 KB 349.1 MB 224.5 MB 6.2 KB
So-You-Want-To-Murder-a-Software-Patent-Jason-Scott.mp4 318.3 KB 232.5 MB 221.7 MB 4.6 KB
Soft-Skills-for-a-Technical-World-Justin-Herman.mp4 182.3 KB 72.7 MB 69.2 MB 4.3 KB
The-Achilles-Heel-Of-The-Banking-System.mp4 283.9 KB 82.1 MB 124.5 MB 4.0 KB
no-audio-t418-A-Bug-or-Malware-Catastrophic-consequences-either-way-Benjamin-Holland-and-Suresh-Kothari.flv 324.7 KB 207.4 MB 4.5 KB 573.6 MB 291.2 MB
t100-Welcome-to-the-Family-Intro.mp4 289.3 KB 130.0 MB 113.9 MB 6.4 KB
t101-Hackers-saving-the-world-from-the-zombie-apocalypse-Johnny-Long.mp4 349.2 KB 285.5 MB 190.0 MB 7.1 KB
t102-How-to-Give-the-Best-Pen-Test-of-Your-Life-Ed-Skoudis.mp4 362.1 KB 292.2 MB 185.8 MB 6.3 KB
t103-Adaptive-Pentesting-Part-Two-Keynote-Kevin-Mitnick-and-Dave-Kennedy.mp4 338.3 KB 247.7 MB 180.9 MB 6.7 KB
t104-If-it-fits-it-sniffs-Adventures-in-WarShipping-Larry-Pesce.mp4 325.5 KB 134.5 MB 210.7 MB 4.6 KB
t105-Abusing-Active-Directory-in-Post-Exploitation-Carlos-Perez.mp4 293.9 KB 122.4 MB 173.2 MB 4.2 KB
t106-Quantifying-the-Adversary-Introducing-GuerillaSearch-and-GuerillaPivot-Dave-Marcus.mp4 332.5 KB 187.5 MB 209.6 MB 5.6 KB
t107-A-Year-in-the-Backdoor-Factory-Joshua-Pitts.mp4 283.5 KB 127.9 MB 193.0 MB 5.5 KB
t108-Ball-and-Chain-A-New-Paradigm-in-Stored-Password-Security-Benjamin-Donnelly-and-Tim-Tomes.mp4 330.0 KB 144.6 MB 210.9 MB 6.7 KB
t109-Et-tu-Kerberos-Christopher-Campbell.mp4 319.9 KB 119.5 MB 144.3 MB 5.0 KB
t110-Advanced-Red-Teaming-All-Your-Badges-Are-Belong-To-Us-Eric-Smith.mp4 332.9 KB 317.0 MB 217.9 MB 4.6 KB
t111-Bypassing-Internet-Explorers-XSS-Filter-Carlos-Munoz.mp4 306.4 KB 138.6 MB 171.3 MB 4.9 KB
t112-Interceptor-A-PowerShell-SSL-MITM-Script-Casey-Smith.mp4 240.5 KB 76.5 MB 128.6 MB 6.4 KB
t113-More-New-Shiny-in-the-Metasploit-Framework-Egypt.mp4 281.8 KB 129.1 MB 163.4 MB 5.7 KB
t115-The-Human-Buffer-Overflow-aka-Amygdala-Hijacking-Christopher-Hadnagy.mp4 322.4 KB 225.7 MB 213.5 MB 5.5 KB
t116-Shellcode-Time-Come-on-Grab-Your-Friends-Wartortell.mp4 295.6 KB 132.4 MB 187.8 MB 6.8 KB
t117-The-Internet-Of-Insecure-Things-10-Most-Wanted-List-Paul-Asadoorian.mp4 323.9 KB 256.2 MB 224.9 MB 5.5 KB
t118-DDoS-Botnet-1000-Knives-and-a-Scalpel-Josh-Abraham.mp4 299.5 KB 128.5 MB 192.1 MB 5.8 KB
t119-wifu2-Cameron-Maerz.mp4 275.0 KB 195.1 MB 161.2 MB 4.8 KB
t120-Attacking-Microsoft-Kerberos-Kicking-the-Guard-Dog-of-Hades-Tim-Medin.mp4 300.4 KB 226.6 MB 206.6 MB 6.9 KB
t121-Introducing-Network-Scout-Defending-The-Soft-Center-of-Your-Network-Bill-oncee-Gardner-Aaedan-SomerVille-Shawn-Jordan.mp4 270.0 KB 167.0 MB 144.8 MB 4.7 KB
t122-Getting-Windows-to-Play-with-Itself-A-Pen-Testers-Guide-to-Windows-API-Abuse-Brady-Bloxham.mp4 310.4 KB 164.2 MB 194.4 MB 5.0 KB
t124-Protocol-Me-Maybe-How-to-Date-SCADA-Stephen-Hilt.mp4 303.2 KB 199.5 MB 206.3 MB 5.5 KB
t125-Attacks-and-Countermeasures-Advanced-Network-Traffic-Manipulation-Matt-Kelly-and-Ryan-Reynolds.mp4 328.3 KB 215.4 MB 231.3 MB 5.0 KB
t126-What-to-expect-when-youre-expectinga-pentest-Martin-Bos-and-Eric-Milam.mp4 318.8 KB 176.8 MB 256.6 MB 5.6 KB
t200-Threat-Modeling-for-Realz-Bruce-Potter.mp4 307.0 KB 247.1 MB 230.5 MB 6.1 KB
t201-A-Guided-Tour-of-the-Internet-Ghetto-Introduction-to-Tor-Hidden-Services-Brent-Huston.mp4 379.9 KB 204.3 MB 182.9 MB 6.9 KB
t203-How-not-to-suck-at-pen-testing-John-Strand.mp4 365.2 KB 229.3 MB 219.8 MB 5.9 KB
t204-Mainframes-Mopeds-and-Mischief-A-PenTesters-Year-in-Review-Tyler-Wrightson.mp4 338.3 KB 275.6 MB 232.8 MB 5.5 KB
t205-The-Multibillion-Dollar-Industry-Thats-Ignored-Jason-Montgomery-and-Ryan-Sevey.mp4 347.5 KB 296.9 MB 220.6 MB 5.2 KB
t206-Code-Insecurity-or-Code-in-Security-Mano-dash4rk-Paul.mp4 289.4 KB 223.8 MB 206.1 MB 4.2 KB
t207-C3CM-Defeating-the-Command-Control-and-Communications-of-Digital-Assailants-Russ-McRee.mp4 366.6 KB 146.7 MB 141.5 MB 6.5 KB
t208-Attack-Paths-Breaking-Into-Infosec-From-IT-Or-Other-Totally-Different-Fields-Eve-Adams-and-Johnny-Xmas.mp4 319.2 KB 291.4 MB 235.2 MB 4.1 KB
t209-How-to-Secure-and-Sys-Admin-Windows-like-a-Boss-Jim-Kennedy.mp4 313.6 KB 321.7 MB 202.6 MB 4.7 KB
t210-Red-white-and-blue-Making-sense-of-Red-Teaming-for-good-Ian-Amit.mp4 330.3 KB 354.3 MB 217.8 MB 6.5 KB
t211-Around-the-world-in-80-Cons-Jayson-E-Street.mp4 352.0 KB 420.1 MB 264.7 MB 6.0 KB
t212-Mirage-Next-Gen-Honeyports-Adam-Crompton-and-Mick-Douglas.mp4 273.7 KB 211.5 MB 181.8 MB 4.1 KB
t214-Active-Directory-Real-Defense-for-Domain-Admins-Jason-Lang.mp4 314.6 KB 317.8 MB 204.9 MB 5.6 KB
t215-The-Wireless-World-of-the-Internet-of-Things-JP-Dunning-ronin.mp4 306.4 KB 271.4 MB 224.4 MB 5.5 KB
t216-Open-Source-Threat-Intelligence-Developing-a-Threat-intelligence-program-using-open-source-tools-and-public-sources-Edward-McCabe.mp4 289.4 KB 275.6 MB 214.0 MB 4.6 KB
t218-Hacking-Mainframes-Vulnerabilities-in-applications-exposed-over-TN3270-Dominic-White.mp4 366.3 KB 210.1 MB 206.0 MB 5.5 KB
t219-Single-Chip-Microcontrollers-Beyond-Arduino-Tharon-Hall.mp4 377.6 KB 234.3 MB 211.2 MB 6.0 KB
t220-Building-Better-Botnets-with-IPv6-Code2.mp4 247.5 KB 164.7 MB 174.2 MB 5.3 KB
t221-Bad-Advice-Unintended-Consequences-and-Broken-Paradigms-Think-Act-Different-Steve-Werby.mp4 268.6 KB 195.5 MB 215.2 MB 3.3 KB
t222-Simple-Network-Management-Pwnd-Deral-Heiland-and-Matthew-Kienow.mp4 313.6 KB 266.0 MB 193.3 MB 5.3 KB
t300-Patching-the-Human-Vulns-Leonard-Isham.mp4 307.2 KB 154.0 MB 182.6 MB 4.2 KB
t301-Burp-For-All-Languages-Tom-Steele.mp4 279.1 KB 123.8 MB 116.5 MB 6.9 KB
t302-Passing-the-Torch-Old-School-Red-Teaming-New-School-Tactics-David-McGuire-and-Will-Schroeder.mp4 354.3 KB 199.5 MB 204.7 MB 6.7 KB
t303-I-Am-The-Cavalry-Year-0-Space-Rogue-and-Beau-Woods.mp4 307.9 KB 229.3 MB 232.6 MB 5.1 KB
t304-University-Education-In-Security-Panel-Bill-Gardner-oncee-Ray-Davidson-Adrian-Crenshaw-Sam-Liles-Rob-Jorgensen.mp4 435.7 KB 727.0 MB 229.2 MB 6.9 KB
t305-What-happened-to-the-A-How-to-leverage-BCPDR-for-your-Info-Sec-Program-Moey.mp4 318.1 KB 179.2 MB 187.2 MB 5.2 KB
t306-Securing-Your-Assets-from-Espionage-Stacey-Banks.mp4 313.1 KB 177.2 MB 208.0 MB 6.8 KB
t307-Hackers-Are-People-Too-Amanda-Berlin-Infosystir.mp4 347.9 KB 178.0 MB 143.2 MB 4.7 KB
t308-Ethical-Control-Ethics-and-Privacy-in-a-Target-Rich-Environment-Kevin-Johnson-and-James-Jardine.mp4 327.3 KB 183.5 MB 212.5 MB 5.9 KB
t309-The-Road-to-Compliancy-Success-Plus-Plus-James-Arlen.mp4 254.8 KB 126.8 MB 187.7 MB 5.4 KB
t310-Are-You-a-Janitor-Or-a-Cleaner-John-Stauffacher-and-Matt-Hoy.mp4 271.2 KB 158.2 MB 237.4 MB 4.0 KB
t311-Practical-PowerShell-Programming-for-Professional-People-Ben-Ten-Ben0xA.mp4 328.6 KB 157.1 MB 206.2 MB 5.5 KB
t312-GROK-atlas.mp4 374.6 KB 199.6 MB 198.5 MB 7.4 KB
t313-How-building-a-better-hacker-accidentally-built-a-better-defender-Casey-Ellis.mp4 279.0 KB 182.8 MB 182.0 MB 5.0 KB
t314-Exploring-Layer-2-Network-Security-in-Virtualized-Environments-Ronny-L-Bull-Dr-Jeanna-N-Matthews.mp4 320.0 KB 153.6 MB 144.6 MB 5.4 KB
t315-Hardware-Tamper-Resistance-Why-and-How-Ryan-Lackey.mp4 285.3 KB 103.4 MB 155.0 MB 4.3 KB
t316-Analyzing-Weak-Areas-of-the-Federal-Cloud-Security-Program-Vinny-Troia.mp4 319.1 KB 227.4 MB 226.0 MB 6.2 KB
t317-Proactive-Application-Security-Karthik-Rangarajan.mp4 336.9 KB 174.5 MB 160.2 MB 5.0 KB
t318-Chicken-of-the-APT-Understanding-Targeted-Attackers-with-Incubation-Kyle-Wilhoit.mp4 378.8 KB 205.3 MB 206.2 MB 6.7 KB
t319-Bending-and-Twisting-Networks-Paul-Coggins.mp4 355.9 KB 166.8 MB 189.9 MB 8.6 KB
t320-Bridging-the-gap-between-red-and-blue-Dave-Kennedy-and-Jamie-Murdock.mp4 347.6 KB 260.4 MB 239.3 MB 5.1 KB
t321-CMS-Hacking-Tricks-Greg-Foss.mp4 314.0 KB 202.1 MB 217.5 MB 5.5 KB
t322-Advanced-Incident-Response-with-Bro-Liam-Randall-hectaman.mp4 305.0 KB 220.4 MB 221.4 MB 3.6 KB
t400-Subverting-ML-Detections-for-Fun-and-Profit-Ram-Shankar-Siva-Kumar-John-Walton.mp4 277.2 KB 141.3 MB 172.3 MB 5.0 KB
t401-Secrets-of-DNS-Ron-Bowes.mp4 344.5 KB 191.3 MB 203.6 MB 5.4 KB
t402-Snort-OpenAppID-How-to-Build-an-Open-Source-Next-Generation-Firewall-Adam-Hogan.mp4 362.5 KB 262.0 MB 229.0 MB 7.1 KB
t403-GET-A-Grip-on-Your-Hustle-Glassdoor-Exfil-Toolkit-Parker-Schmitt-Kyle-Stone-essobi-Chris-Hodges-g11tch.mp4 315.8 KB 200.3 MB 182.7 MB 8.9 KB
t404-DNS-Based-Authentication-of-Named-Entities-DANE-Can-we-fix-our-broken-CA-model-Tony-Cargile.mp4 336.4 KB 218.6 MB 216.2 MB 5.8 KB
t405-Exploiting-Browsers-Like-A-Boss-w-WhiteLightning-Bryce-Kunz.mp4 336.0 KB 152.4 MB 149.1 MB 5.0 KB
t406-Real-World-Intrusion-Response-Lessons-from-the-Trenches-Katherine-Trame-and-David-Sharpe.mp4 319.0 KB 281.3 MB 233.3 MB 5.5 KB
t407-Application-Whitelisting-Be-Careful-Where-The-Silver-Bullet-Is-Aimed-David-McCartney.mp4 271.3 KB 268.2 MB 200.7 MB 4.0 KB
t408-Making-Mongo-Cry-Attacking-NoSQL-for-Pen-Testers-Russell-Butturini.mp4 313.3 KB 394.0 MB 197.8 MB 4.6 KB
t409-Step-On-In-The-Waters-Fine-An-Introduction-To-Security-Testing-Within-A-Virtualized-Environment-Tom-Moore.mp4 389.1 KB 264.6 MB 208.5 MB 4.5 KB
t410-Give-me-your-data-Obtaining-sensitive-data-without-breaking-in-Dave-Chronister.mp4 310.5 KB 190.8 MB 224.4 MB 4.1 KB
t411-Third-Party-Code-FIX-ALL-THE-THINGS-Kymberlee-Price-Jake-Kouns.mp4 295.3 KB 183.9 MB 218.8 MB 5.6 KB
t412-Just-What-The-Doctor-Ordered-Scott-Erven.mp4 354.5 KB 159.2 MB 199.6 MB 7.3 KB
t413-Powershell-Drink-the-Kool-Aid-Wayne-Pruitt-Zack-Wojton.mp4 351.2 KB 211.3 MB 178.0 MB 6.2 KB
t414-powercat-Mick-Douglas.mp4 316.0 KB 218.3 MB 217.6 MB 6.6 KB
t415-Macro-Malware-Lives-Putting-the-sexy-back-into-MS-Office-document-macros-Joff-Thyer.mp4 336.2 KB 217.1 MB 145.7 MB 4.5 KB
t416-Girl-Fault-Interrupted-Maggie-Jauregui.mp4 340.3 KB 163.7 MB 164.1 MB 7.4 KB
t419-Its-Not-Easy-Being-Purple-Bill-Gardner-Valerie-Thomas-Amanda-Berlin-Eric-Milam-Brandon-McCann-Royce-Davis.mp4 407.6 KB 591.8 MB 236.4 MB 5.5 KB
t420-Control-Flow-Graph-Based-Virus-Scanning-Douglas-Goddard.mp4 293.4 KB 129.4 MB 133.8 MB 4.5 KB
t421-Ok-so-youve-been-pwned-now-what-Jim-Wojno.mp4 363.3 KB 214.3 MB 226.0 MB 6.8 KB
t422-Everybody-gets-clickjacked-Hard-knock-lessons-on-bug-bounties-Jonathan-Cran.mp4 267.0 KB 198.4 MB 204.7 MB 3.6 KB
t423-Are-you-a-Beefeater-focused-on-protecting-your-crown-jewels-Jack-Nichelson.mp4 377.4 KB 277.3 MB 218.4 MB 8.9 KB
t500-NeXpose-For-Automated-Compromise-Detection-Luis-connection-Santana.mp4 341.6 KB 118.2 MB 116.7 MB 5.3 KB
t501-A-girl-some-passion-and-some-tech-stuff-Branden-Miller-and-Emily-Miller.mp4 331.9 KB 138.2 MB 123.1 MB 8.5 KB
t502-InfoSec-from-the-mouth-of-babes-or-an-8-year-old-Reuben-A-Paul-RAPstar-and-Mano-Paul.mp4 263.9 KB 73.5 MB 98.6 MB 8.4 KB
t503-Why-Aim-for-the-Ground-Teaching-Our-School-Kids-All-of-the-Right-Computer-Skills-Phillip-Fitzpatrick.mp4 322.8 KB 114.7 MB 107.1 MB 6.2 KB
t504-NoSQL-Injections-Moving-Beyond-or-11-Matt-Bromiley.mp4 289.9 KB 98.0 MB 102.3 MB 5.2 KB
t505-SWF-Seeking-Lazy-Admin-for-Cross-Domain-Action-Seth-Art.mp4 242.6 KB 68.5 MB 102.8 MB 6.9 KB
t506-Planning-for-Failure-Noah-Beddome.mp4 185.1 KB 81.6 MB 72.4 MB 4.2 KB
t507-The-Social-Engineering-Savants-The-Psychopathic-Profile-Kevin-Miller.mp4 231.4 KB 70.9 MB 113.0 MB 5.0 KB
t508-Hiding-the-breadcrumbs-Forensics-and-anti-forensics-on-SAP-systems-Juan-Perez-Etchegoyen.mp4 293.5 KB 121.4 MB 120.3 MB 5.4 KB
t509-Youre-in-the-butter-zone-now-baby-Chris-Scott.mp4 249.9 KB 83.9 MB 111.2 MB 3.4 KB
t510-Making-BadUSB-Work-For-You-Adam-Caudill-Brandon-Wilson.mp4 256.8 KB 88.0 MB 100.5 MB 5.7 KB
t511-PassCrackNet-When-everything-else-fails-just-crack-hashes-Adam-Ringwood.mp4 160.7 KB 74.6 MB 70.3 MB 3.6 KB
t512-Vulnerability-Assessment-20-John-Askew.mp4 211.2 KB 77.4 MB 111.2 MB 4.5 KB
t513-Social-Engineering-your-progeny-to-be-hackers-Sydney-Liles.mp4 243.7 KB 94.4 MB 108.2 MB 6.4 KB
t514-A-Brief-History-of-Exploitation-Devin-Cook.mp4 257.2 KB 86.5 MB 105.3 MB 5.0 KB
t515-Hunting-Malware-on-Linux-Production-Servers-The-Windigo-Backstory-Olivier-Bilodeau.mp4 243.7 KB 229.4 MB 200.1 MB 4.1 KB
t516-Human-Trafficking-in-the-Digital-Age.mp4 238.5 KB 52.1 MB 112.4 MB 5.4 KB
t517-Cat-Herding-in-the-Wild-Wild-West-What-I-Learned-Running-A-Hackercon-CFP-Nathaniel-Husted.mp4 293.1 KB 78.5 MB 108.8 MB 7.4 KB
t518-How-to-Stop-a-Hack-Jason-Samide.mp4 207.2 KB 58.2 MB 84.3 MB 6.8 KB
t519-We-dont-need-no-stinking-Internet-Greg-Simo.mp4 201.6 KB 56.4 MB 77.7 MB 6.2 KB
t520-ZitMo-NoM-David-Schwartzberg.mp4 357.7 KB 124.8 MB 139.6 MB 6.6 KB
t521-Penetrate-your-OWA-Nate-Power.mp4 237.0 KB 58.3 MB 93.9 MB 6.5 KB
t522-RavenHID-Remote-Badge-Gathering-or-Why-we-sit-in-client-bathrooms.mp4 180.0 KB 47.6 MB 72.3 MB 6.8 KB
t523-Interns-Down-for-What-Tony-Turner.mp4 238.4 KB 59.1 MB 94.1 MB 5.8 KB
t524-i-r-web-app-hacking-and-so-can-you-Brandon-Perry.mp4 252.5 KB 67.7 MB 94.6 MB 4.5 KB
t525-Building-a-Modern-Security-Engineering-Organization-Zane-Lackey.mp4 215.7 KB 59.0 MB 97.4 MB 4.8 KB
t526-Information-Security-Team-Management-How-to-keep-your-edge-while-embracing-the-dark-side-Stephen-C-Gay.mp4 276.1 KB 78.3 MB 100.3 MB 7.2 KB
t527-5min-web-audit-Security-in-the-startup-world-Evan-Johnson.mp4 186.6 KB 50.0 MB 81.2 MB 5.1 KB
t528-Project-SCEVRON-SCan-EVrything-with-ruby.mp4 195.2 KB 67.1 MB 78.6 MB 4.9 KB
t530-Gone-in-60-minutes-a-Practical-Approach-to-Hacking-an-Enterprise-with-Yasuo-Saurabh-Harit-and-Stephen-Hall.mp4 319.9 KB 96.3 MB 109.2 MB 6.9 KB
t531-Snarf-Capitalizing-on-Man-in-the-Middle-Victor-Mata-Josh-Stone.mp4 270.2 KB 83.0 MB 100.4 MB 6.3 KB
t532-Electronic-locks-in-firearms-Oh-My-Travis-Hartman.mp4 314.2 KB 89.1 MB 121.3 MB 6.8 KB
t533-Dolla-Dolla-Bump-Key-Chris-Sistrunk.mp4 335.3 KB 101.8 MB 110.4 MB 5.9 KB
t534-What-Dungeons-Dragons-Taught-Me-About-INFOSEC-Joey-Maresca-l0stkn0wledge.mp4 336.2 KB 96.1 MB 112.6 MB 7.6 KB
t535-Gender-Differences-in-Social-Engineering-Does-Sex-Matter-Shannon-Sistrunk.mp4 279.2 KB 87.7 MB 102.0 MB 5.3 KB
t536-Introduction-to-System-Hardening-Eddie-David.mp4 318.6 KB 105.6 MB 120.3 MB 4.4 KB
t537-Hacking-your-way-into-the-APRS-Network-on-the-Cheap-Mark-Lenigan.mp4 249.2 KB 87.9 MB 93.0 MB 7.1 KB
t538-Building-a-Web-Application-Vulnerability-Management-Program-Jason-Pubal.mp4 265.0 KB 74.6 MB 113.7 MB 6.3 KB
t539-Fighting-Back-Against-SSL-Inspection-or-How-SSL-Should-Work-Jacob-Thompson.mp4 225.6 KB 62.4 MB 79.6 MB 5.7 KB
t540-Physical-Security-From-Locks-to-Dox-Jess-Hires.mp4 271.5 KB 77.1 MB 100.9 MB 5.2 KB
t541-Am-I-an-Imposter-Warren-Kopp.mp4 197.3 KB 54.4 MB 76.5 MB 7.0 KB
t542-Call-of-Community-Modern-Warfare-Ben-Ten-and-Matt-Johnson.mp4 294.4 KB 76.5 MB 106.3 MB 7.1 KB
t543-The-Canary-in-the-Cloud-Scot-Bernerv.mp4 267.2 KB 99.2 MB 98.7 MB 4.5 KB
Information Format Size
derbycon4_files.xml Metadata [file]
derbycon4_meta.sqlite Metadata 238.0 KB
derbycon4_meta.xml Metadata 720.0 B
Other Files Unknown Archive BitTorrent
__ia_spool/.t543-The-Canary-in-the-Cloud-Scot-Bernerv.mp4.kIdQhd 99.2 MB
derbycon4_archive.torrent 291.1 KB