More information can be found here: http://champlainTechConf.blogspot.com
Who can attend? Anyone! (feel free to forward)
Location: Champlain College – Hauke 005
Date: This Saturday (April 21, 2012)
When: 9:30am-3:30pm (followed by ITS Capstone presentations from3:30pm-5:00pm in the Hauke Conference Room)
Anyone may attend, but please register at http://cut.eventbrite.com so we have enough snacks and seats.
It looks like it’s going to be a great event! Hope to see you there!
Worm Propagation XML Database Tools
Social Media APIs LINQ
MBR Malware Analysis Visualizers
Gathering Player Game Data Windows Defense
C++ Event System with Delegates NodeJS
Ecommerce Raspberry Pi
Windows 8 Forensics Rebuilding for Mobile
OpenAL
Followed by ITS Capstone Poster Sessions!!
Computer Information Technology (CIT) | |
Web Site for Champlain Valley Down Syndrome Group | Jason DaSilva |
Comparison Project on Three Content Management Systems | Derek Izor |
Web Site for Parenting Resource Directo ry |
Bonnie Bohan |
Current Cybercrime Legislation | Stephen Pinkham |
What are the challenges associated with bringing high speed Internet access to rural areas? | Andrew Ventre |
How are we motivating/using Internet hedonists to solve real world problems currently, and is there anything more that can be done? | Erik Warnick |
Depression and Pathological Internet Use (PIU) | Michael Berry |
Technology and Education | Nicholas Weible |
Enterprise Architecture | Jason Eastman |
Solar powered computing | Jordon Hamilton |
Web Site for Radiant Floor Heating | Nick Edwards |
Web Site for Winooski Natural Resources Conservation District | Erik Wallace |
Computer and Digital Forensics (CDF) | |
P2P Computer Forensics: Examiners Guide | Timothy Fernalld |
Google Chromebook Forensics | Stephen Jablonski |
Android Memory Forensics | Ryan Dixe |
Kindle Forensics: A Look at the Amazon Kindle Fire | Megan Percy |
The Investigation Handbook for System Restore Applications. A look into a forensic analysis o f Deep Freeze, Returnil, and Toolwiz TimeFreeze |
Louis Donalds |
An Investigator’s Guide to Basic Malware Analysis | Kyle Heath |
Quick Response Code Malware. The study of a population’s use of quick response codes for the potential of a distributed malware attack on cellular telephones | Jason Hall |
Xbox 360 Slim: Network Traffic Analysis. “Jump In” to Network Traffic Analysis | Giovanna DiSipio |
MBR Malware Analysis: TDL4 & Alworo. They Hide, You Seek | Corrie Erk |
Biometric Authentication Forensics | Conor Shaughnessy |
Android OS v. 4.0 Forensics. A forensic look into the new version of the popular mobile OS |
Alexander Caron |
Volatile Memory Malware Analysis. Investigation Techniques Focusing on Artifacts in RAM | Ben Rogers |
Computer Networking and Information Security (CNIS) | |
ESXi QoS | Geoff Altermann |
FreeBSD implementation | Brennan Connors |
Network Design and Enterprise Architecture | Ian Davis |
Wireless Mapping and Security | Daniel Espinoza |
XBees | Silver Evans |
Virtualization of Network | Brian Fabiano |
Computer Worm Propagation Analysis | Jon Ferretti |
Small Business IT Infrastructure | Taylor Howe |
The Onion Router: Performance | Patrick Moore |
Data Exfiltration | Kevin Reilly |
Physical Security and Electronic Locking Systems | Andrew Smith |