RUXCON 2005 Timetable
| 08:30 | Doors open |
| 09:30 | Presentation: To be announced |
| 10:30 | Presentation: Attack Automation |
| 11:30 | Presentation: Beyond NX: An attackers guide to anti-exploitation technology for Windows |
| 12:30 | Presentation: Long Filename, Long Parameter, Malformed Data. Another Day, Another Vulnerability. Same Bug, Different App. |
| 13:30 | Activity: Capture The Flag Launch |
| 13:30 | Activity: Chilli Eating Competition |
| 14:30 | Presentation: Binary protection schemes Presentation: Securing Modern Web Applications |
| 15:30 | Presentation: Using OWASP Guide 2.0 for Deep Penetration Testing Presentation: Moving towards the Artificial Hacker |
| 16:30 | Activity: Street Fighter II Competition |
| 17:30 | Presentation: Computer Forensics: Practise and Procedure Presentation: Black Box Web Application Penetration Testing |
| 18:30 | Presentation: Trust Transience: Post Intrustion SSH Hijacking Presentation: Crypto Rodeo |
| 20:00 | Activity: Pool Competition |
top ^
| 10:30 | Doors open |
| 11:30 | Presentation: Deaf, Dumb and Mute: Defeating Network Intrusion Detection Systems |
| 12:30 | Presentation: Attacking WiFi with traffic injection |
| 13:30 | Activity: Lunch time Quiz |
| 14:30 | Presentation: Malware Analysis |
| 15:30 | Presentation: Breaking Mac OSX |
| 16:30 | Break |
| 17:30 | Presentation: Electronic Evidence - a Law Enforcement Perspective |
| 18:30 | Presentation: Poker Paranoia |
| 19:30 | Activity: Panel |
| 20:30 | Closing speech |