The Fifth HOPE (2004)

Our fifth hacker conference from 2004 has been remastered from the original videos into a DVD format. Each disc is only $5, with even more of a discount if you get a full set. We also have an audio disc of every talk in 128 kbps high fidelity audio.

The Fifth HOPE had even more talks than H2K2, a feat that was accomplished by expanding the hours, starting talks as early as 9 am and running past midnight. There were two full tracks and an unscheduled track, along with all of the activities taking place on the second floor. Once again, the first track was known as "Area A" and the second track "Area B." The third, unscheduled (and unrecorded), track was held in "Area C" down the hall.

We actually had three separate keynotes this year and all three were real attention grabbers: Kevin Mitnick, finally appearing at a HOPE conference after being legally unable to for the first four, was the Friday keynote; Apple cofounder Steve Wozniak, someone we never thought in our wildest dreams we'd be able to get to come speak at a HOPE conference, was our Saturday keynote (and he even stuck around for the retrocomputing panel); and, becoming a regular fixture at HOPE, Jello Biafra delivered the Sunday keynote.

You'll find a huge variety in subject matter reflected here, from the highly technical to the highly controversial, from social issues to telephony.

To order, just click the button(s) near the HOPE megaphone. Click on the titles for descriptions of the talks and panels or to see the video in non-DVD quality.








BUY THEM ALL - FULL SET OF THE FIFTH HOPE DVDS
BUY THEM ALL - FULL SET OF THE FIFTH HOPE DVDS

TFHALNormally: $350.00Discounted Price: $249.00
THE FIFTH HOPE AUDIO DISC
THE FIFTH HOPE AUDIO DISC

TFHAUD$5.00
AS/400: Lifting the Veil of Obscurity
AS/400: Lifting the Veil of Obscurity

TFHB22$5.00
Automotive Networks
Automotive Networks

TFHB11$5.00
Bloggers at the DNC
Bloggers at the DNC

TFHB08$5.00
Building Hacker Spaces
Building Hacker Spaces

TFHA10$5.00
Building the Anti-Big Brother
Building the Anti-Big Brother

TFHB16$5.00
Bypassing Corporate Restrictions from the Inside
Bypassing Corporate Restrictions from the Inside

TFHB25$5.00
Cheshire's Rant Session
Cheshire's Rant Session

TFHA22$5.00
The Cryptophone
The Cryptophone

TFHA08$5.00
Cult of the Dead Cow Hacktivism Panel
Cult of the Dead Cow Hacktivism Panel

TFHA18A-B$5.00
Digital Rights Management
Digital Rights Management

TFHB24$5.00
Distributed Password Cracking API
Distributed Password Cracking API

TFHB29$5.00
Encryption Key Signing
Encryption Key Signing

TFHB37$5.00
Everything You Ever Wanted to Know About Spying, 9-11, and Why We Continue to Screw Up
Everything You Ever Wanted to Know About Spying, 9-11, and Why We Continue to Screw Up

TFHA21A-E$10.00
The Fifth HOPE Closing Ceremonies
The Fifth HOPE Closing Ceremonies

TFHA30$5.00
Frustrating OS Fingerprinting with Morph
Frustrating OS Fingerprinting with Morph

TFHB36$5.00
Hack Nano
Hack Nano

TFHB10$5.00
Hacker Radio
Hacker Radio

TFHB26$5.00
Hackers and the Law
Hackers and the Law

TFHA17$5.00
Hackers in Modern Imperialist America vs. Barbarians in the Holy Roman Empire
Hackers in Modern Imperialist America vs. Barbarians in the Holy Roman Empire

TFHB15$5.00
Hacking CDMA PRLs
Hacking CDMA PRLs

TFHB33$5.00
Hacking More of the Invisible World
Hacking More of the Invisible World

TFHB03$5.00
Hacking National Intelligence: Power to the People
Hacking National Intelligence: Power to the People

TFHA01$5.00
Hacking the Grid
Hacking the Grid

TFHB20$5.00
Hardware Bus Security in Embedded Systems
Hardware Bus Security in Embedded Systems

TFHB23$5.00
Homeland Security And You: Harry Potter Meets Reality
Homeland Security And You: Harry Potter Meets Reality

TFHA20$5.00
How the Great Firewall Works
How the Great Firewall Works

TFHB04$5.00
How The Net Worked
How The Net Worked

TFHA29$5.00
How To Break Anonymity Networks
How To Break Anonymity Networks

TFHB28$5.00
How To Send Encrypted Email
How To Send Encrypted Email

TFHB14$5.00
How to Talk to the Press
How to Talk to the Press

TFHB21$5.00
Incentive Structures: Mechanisms of Control
Incentive Structures: Mechanisms of Control

TFHB19$5.00
Indymedia 2004
Indymedia 2004

TFHB32$5.00
Introduction to Dissembler
Introduction to Dissembler

TFHB18$5.00
Keynote: Jello Biafra
Keynote: Jello Biafra

TFHA26A-B$5.00
Keynote: Kevin Mitnick
Keynote: Kevin Mitnick

TFHA07A-B$5.00
Keynote: Steve Wozniak
Keynote: Steve Wozniak

TFHA14A-B$5.00
The Kismet Story
The Kismet Story

TFHA16$5.00
Lockpicking
Lockpicking

TFHA13A-B$5.00
Making Use of the Subliminal Channel in DSA
Making Use of the Subliminal Channel in DSA

TFHA19$5.00
Media Intervention via Social and Technical Hacking
Media Intervention via Social and Technical Hacking

TFHA28$5.00
Mischief and Mayhem at the RNC
Mischief and Mayhem at the RNC

TFHB09$5.00
Non-Lethal Technology
Non-Lethal Technology

TFHB35$5.00
"Off The Hook" Special Broadcast
"Off The Hook" Special Broadcast

TFHA09A-B$5.00
Packet Purgatory - Twist Your Packets Before You Set Them Free
Packet Purgatory - Twist Your Packets Before You Set Them Free

TFHB34$5.00
Phone Losers of America
Phone Losers of America

TFHB13$5.00
Phreaking In The Early Days
Phreaking In The Early Days

TFHA12$5.00
Pirate Radio: Running a Station and Staying on the Air
Pirate Radio: Running a Station and Staying on the Air

TFHA11$5.00
Preserving Digital History - A Quick and Dirty Guide
Preserving Digital History - A Quick and Dirty Guide

TFHB31$5.00
Privacy - Not What It Used To Be
Privacy - Not What It Used To Be

TFHA15$5.00
Prometheus Radio Project
Prometheus Radio Project

TFHA06$5.00
Propaganda in Art and Media
Propaganda in Art and Media

TFHB17$5.00
Retaliation With Honeypots
Retaliation With Honeypots

TFHB30$5.00
Retrocomputing
Retrocomputing

TFHA24$5.00
Secure Instant Messaging
Secure Instant Messaging

TFHB38$5.00
Security, Liberties, and Trade-offs in the War on Terrorism
Security, Liberties, and Trade-offs in the War on Terrorism

TFHA03$5.00
Security Through Automated Binary Analysis
Security Through Automated Binary Analysis

TFHA02$5.00
Security Through Diversity
Security Through Diversity

TFHB05$5.00
Slaying the Corporate Litigation Dragon: Emerging the Victor in an Intellectual Property Cybersuit
Slaying the Corporate Litigation Dragon: Emerging the Victor in an Intellectual Property Cybersuit

TFHB06$5.00
Social Engineering
Social Engineering

TFHA27$5.00
Tactical Media and the New Paranoia
Tactical Media and the New Paranoia

TFHA23$5.00
Technology in Romania
Technology in Romania

TFHB07$5.00
Ten Years of Practical Anonymity
Ten Years of Practical Anonymity

TFHB27$5.00
Terrorism and Hackers
Terrorism and Hackers

TFHB12$5.00
Today's Modern Network Killing Robot
Today's Modern Network Killing Robot

TFHB01$5.00
Urban Exploring: Hacking the Physical World
Urban Exploring: Hacking the Physical World

TFHA25$5.00
When Corporations Attack
When Corporations Attack

TFHA05$5.00
Where'd All That Spam Come From?
Where'd All That Spam Come From?

TFHB02$5.00
Wireless and WiFi: The Good, the Bad, and the Ugly
Wireless and WiFi: The Good, the Bad, and the Ugly

TFHA04$5.00