by
Thomas Lopatic &
John McDonald
TÜV data protect GmbH
Dug Song
CITI at the University of Michigan
Note: This is a mirror of http://www.dataprotect.com/bh2000/ and is being provided on phoneboy.com with the consent of the authors.
On this page you will find technical information about the vulnerabilities that we discussed at the Black Hat Briefings, as well as source code for the tools that we used, and copies of our Power Point presentation.
There are two versions of the presentation: one for A4 paper and one for Letter format paper.
Last updated August 9th, 2000