File Manipulation
|
CLI |
15 |
|
File content
|
CLI |
15 |
|
Explicit Data Conversion
|
Secure Coding |
55 |
|
Implicit Data Conversion
|
Secure Coding |
50 |
|
Where is all of this traffic coming from?
|
Networking |
50 |
|
There are so many databases...which one are we using?
|
Long live data |
63 |
|
Linux is funny
|
CLI |
59 |
|
Disk usage
|
CLI |
15 |
|
Attendees like math
|
Networking |
51 |
|
People really like me
|
Networking |
12 |
|
Pins are Critical in Lock Picking
|
Lock Picking |
10 |
|
OCRI vs OCR
|
I stand for something! |
6 |
|
Ohio's Cyber Militia
|
I stand for something! |
5 |
|
Bad Snakes on a Plane
|
Secure Coding |
100 |
|
There is so much data
|
Attack Vectors |
12 |
|
Who's the Boss?
|
Acronyms & Initialisms |
11 |
|
Cincinnati ISSA
|
Acronyms & Initialisms |
10 |
|