- DEF CON 11 - Adam Bresson - Manyonymity: PHP Distributed Encryption
- DEF CON 11 - Beetle & Bruce Potter -Airsnarf - Why 802.11b Hotspots Ain't So Hot
- DEF CON 11 - Bill Scannell - Punishing Collaborators Redux
- DEF CON 11 - Brett Neilson - Malicious Code & Wireless Networks
- DEF CON 11 - Brian Hurley & Ann Gabriel - Internet Radio Politics: A Tale Of Betrayal And Hope
- DEF CON 11 - Bruce Potter - Bluetooth - The Future of Wardriving
- DEF CON 11 - Cat Okita - Aura: A Peer To Peer Reputation System
- DEF CON 11 - Chris Hurley - The WorldWide WarDrive: The Myths, The Misconceptions
- DEF CON 11 - Cindy Cohn - What Hackers Need to Know about Post 9/11 Legal Changes
- DEF CON 11 - Daniel C. Silverstein & Damon McCormick - Increasing The Security Of Your Election
- DEF CON 11 - Daniel Roelker - HTTP IDS Evasions Revisited
- DEF CON 11 - Dan Kaminsky - Stack Black Ops: New Concepts for Network Manipulation
- DEF CON 11 - David Maynor - Why Anomaly Based Intrusion Detection Systems Are A Hackers Best Friend
- DEF CON 11 - David Rhoades - Hacking Web Apps
- DEF CON 11 - Eric Goldman - Criminal Copyright Infringement and Warez Trading
- DEF CON 11 - FX - More Embedded Systems
- DEF CON 11 - Fyodor - Advanced Network Reconnaissance Techniques
- DEF CON 11 - Greg Conti - Interface Design of Hacking Tools
- DEF CON 11 - Gregoire Gentil - Hack Any Website
- DEF CON 11 - Grifter - Dumpster Diving: One man's trash...
- DEF CON 11 - Inertia - Introducing nmrcOS
- DEF CON 11 - J0hnny Long - Watching the Watchers: Target Exploitation via Public Search
- DEF CON 11 - Jaya Baloo - Government IP_TAPPING: Vendors & Techniques
- DEF CON 11 - Jay Beale - Locking Down Mac OS X
- DEF CON 11 - Jeffrey Prusan - Technical Security Countermeasures
- DEF CON 11 - Joe Klein - Information Leakage - You posted what?!
- DEF CON 11 - Jonathan Wignall - Network Worms, What Is Possible
- DEF CON 11 - Leia Amidon & Panel - After Napster: The Inevitable Ascent of Peer-to-Peer Networks
- DEF CON 11 - Lenard Kleinrock & Sally Richards - At Risk! Privacy
- DEF CON 11 - Len Sassaman & Panel - Behind the Remailers
- DEF CON 11 - Matt Shannon - _vti_fpxploitation
- DEF CON 11 - Michael Glasser & Jeffrey Prusan - OSI Layer 1 Security
- DEF CON 11 - Michael Schrenk - Online Corporate Intelligence
- DEF CON 11 - Michael Sutton and Pedram Amini - Hacking the Invisible Network
- DEF CON 11 - Mick Bauer - Self-Abuse For Smarter Log Monitoring
- DEF CON 11 - Mikko Valimaki & Ville Oksanen- The Story of EFFI
- DEF CON 11 - Mystic - Mimicry
- DEF CON 11 - NMRC Panel - Free Your Mind: The NMRC Info/Warez
- DEF CON 11 - Ofir Arkin - Revolutionizing Operating System Fingerprinting
- DEF CON 11 - Oldskools - Satellite TV Technology
- DEF CON 11 - Panel - Abusing 802.11
- DEF CON 11 - Panel - Adversary Characterization and Scoring Systems
- DEF CON 11 - Panel - Defcon Extra: Meet the Fed Panel ( Not the Fed )
- DEF CON 11 - Panel - Social Engineering Fundamentals
- DEF CON 11 - Panel - The Luna Correspondence Protocol
- DEF CON 11 - Panel - The UPS (Undetectable Packet Sniffer)
- DEF CON 11 - ParanoidAndroid - Beat the Casinos At Their Own Game
- DEF CON 11 - Paul Clip - Hacking from the Palm of your Hand
- DEF CON 11 - Paul Wouters - Deploying DNSSEC
- DEF CON 11 - Phil Zimmerman - A Conversation with Phil Zimmermann
- DEF CON 11 - Richard Thieme - Hacker Generations
- DEF CON 11 - Rich Murphey - Intrusion Prevention Techniques on Windows and Unix
- DEF CON 11 - Robert Imhoff-Dousharm - Credit Card Networks 101
- DEF CON 11 - Roberto Preatoni - The Future Frontiers of Hacking - UMTS Mobile Phone
- DEF CON 11 - Robert Sheehy - Theft of Service Attacks
- DEF CON 11 - Ryan Lackey - HavenCo: What Really Happened
- DEF CON 11 - Sean O Toole - Metamorphic Viruses
- DEF CON 11 - SensePost - Putting The Tea Back Into CyberTerrorism
- DEF CON 11 - Seth Fogie - Embedded Reverse Engineering: Cracking Mobile Binaries
- DEF CON 11 - Silvio Cesare - Opensource Kernel Auditing and Exploitation
- DEF CON 11 - Susan Brenner - Toward a Criminal Law for Cyberspace
- DEF CON 11 - TommEE Pickles - Streaming Media Theft and Protection
- DEF CON 11- Tony Kapela - Fashonably Late - What Your Networks RTT Says About Itself
- DEF CON 11 - Viki Navratilova - Today's Modern Network Killing Robot
- DEF CON 11 - Wendy Seltzer - The Internet's Private Cops: Defending Your Rights