Click to enlargeH2K2 (2002)

Our fourth hacker conference from 2002 has been remastered from the original videos into a DVD format. Each disc is only $5, with even more of a discount if you get a full set. We also have an audio disc of every talk in 128 kbps high fidelity audio.

H2K2 expanded even more than H2K, with all talks from the two main tracks being recorded, resulting in nearly as many DVDs as our first three conferences combined. This was also the first year that we took over the downstairs area in order to have a huge hacker space on the first and second floors of the hotel.

The first track was known as "Area A" and the second track "Area B." The third, unscheduled, track was held in a smaller room on the 18th floor and referred to as "Area C" while "Area D" was basically "Area A" flipped around in order to take advantage of a better AV setup. This was used for the Negativland presentation, the last minute Jello Biafra talk, and a showing of "Freedom Downtime." Areas were designated with the corresponding New York City subway colors, with letters upstairs and numbers downstairs.

H2K2 was our first post-9/11 conference, and this is reflected quite often in the talks. You'll see some really early questioning of new policies and laws that took effect, and witness for yourself the fact that the hacker spirit was still alive and strong.

To order, just click the button(s) near the H2K2 smart card badge. Click on the titles for descriptions of the talks and panels or to see the video in non-DVD quality.








BUY THEM ALL - FULL SET OF H2K2 DVDS
BUY THEM ALL - FULL SET OF H2K2 DVDS

H2K2ALNormally: $315.00Discounted Price: $199.00
H2K2 AUDIO DISC
H2K2 AUDIO DISC

H2K2AUD$5.00
Abuse of Authority
Abuse of Authority

H2K2A21$5.00
Access Control Devices
Access Control Devices

H2K2B13$5.00
The Argument Against Security Through Obscurity
The Argument Against Security Through Obscurity

H2K2B12$5.00
Black Hat Bloc or How I Stopped Worrying About Corporations and Learned to Love the Hacker Class War
Black Hat Bloc or How I Stopped Worrying About Corporations and Learned to Love the Hacker Class War

H2K2A24$5.00
Bullies on the Net - The Ford and Nissan Cases
Bullies on the Net - The Ford and Nissan Cases

H2K2A19$5.00
Caller ID Spoofing
Caller ID Spoofing

H2K2B05$5.00
"The Conscience of a Hacker"
"The Conscience of a Hacker"

H2K2A17$5.00
Conspiracies
Conspiracies

H2K2B24$5.00
Crypto for the Masses
Crypto for the Masses

H2K2B03$5.00
Databases and Privacy
Databases and Privacy

H2K2A16$5.00
A Day in the Life of a Directory Assistance Operator
A Day in the Life of a Directory Assistance Operator

H2K2A01$5.00
The DeCSS Story
The DeCSS Story

H2K2A07$5.00
Digital Demonstrations: Criminal DDoS Attack or Cyber Sit-in?
Digital Demonstrations: Criminal DDoS Attack or Cyber Sit-in?

H2K2B23$5.00
DMCA Legal Update
DMCA Legal Update

H2K2A13$5.00
Domain Stalking
Domain Stalking

H2K2A28$5.00
Educating Lawmakers - Is It Possible?
Educating Lawmakers - Is It Possible?

H2K2A14$5.00
Face Scanning Systems at Airports: Ready for Prime Time?
Face Scanning Systems at Airports: Ready for Prime Time?

H2K2B19$5.00
"Freedom Downtime" Question & Answer Session
"Freedom Downtime" Question & Answer Session

H2K2D03$5.00
Freedom: File Not Found
Freedom: File Not Found

H2K2B11$5.00
Fucking Up the Internet at ICANN: Global Control Through the Domain Name System and How to Escape
Fucking Up the Internet at ICANN: Global Control Through the Domain Name System and How to Escape

H2K2A06$5.00
Fun With 802.11b
Fun With 802.11b

H2K2A08$5.00
Fun With Pirate Radio and Shortwave
Fun With Pirate Radio and Shortwave

H2K2B22$5.00
GNU Radio: Free Software Radio Collides with Hollywood's Lawyers
GNU Radio: Free Software Radio Collides with Hollywood's Lawyers

H2K2B26$5.00
H2K2 Closing Ceremonies
H2K2 Closing Ceremonies

H2K2A29$5.00
Hacking for Community Radio
Hacking for Community Radio

H2K2B17$5.00
Hacking Nanotech
Hacking Nanotech

H2K2B28$5.00
Hacking National Intelligence: Possibilities for a Public Intelligence Revolution
Hacking National Intelligence: Possibilities for a Public Intelligence Revolution

H2K2B21$5.00
Hacking the Invisible World
Hacking the Invisible World

H2K2A27$5.00
Hardware Q&A
Hardware Q&A

H2K2B14$5.00
How to Start an IMC in Your Town
How to Start an IMC in Your Town

H2K2A20$5.00
Human Autonomous Zones: The Real Role of Hackers
Human Autonomous Zones: The Real Role of Hackers

H2K2A23$5.00
"I Am Against Intellectual Property"
"I Am Against Intellectual Property"

H2K2B08$5.00
The Ins and Outs of Webcasting
The Ins and Outs of Webcasting

H2K2A12$5.00
Introduction to Computer Viruses
Introduction to Computer Viruses

H2K2B15$5.00
Jello Biafra's State of the World Address
Jello Biafra's State of the World Address

H2K2D02$5.00
Keynote: Aaron McGruder
Keynote: Aaron McGruder

H2K2A15$5.00
Keynote: Siva Vaidhyanathan
Keynote: Siva Vaidhyanathan

H2K2A04$5.00
Lockpicking
Lockpicking

H2K2A22$5.00
LPFM Basics
LPFM Basics

H2K2A09$5.00
Magical Gadgets: The Profound Impact of Yesterday's Not-So-Trivial Electronics on Our Digital World
Magical Gadgets: The Profound Impact of Yesterday's Not-So-Trivial Electronics on Our Digital World

H2K2B10$5.00
Magic Lantern and Other Evil Things
Magic Lantern and Other Evil Things

H2K2B07$5.00
Making Money on the Internet While Still Saying "Fuck"
Making Money on the Internet While Still Saying "Fuck"

H2K2A18$5.00
Negativland - Past, Present, Future
Negativland - Past, Present, Future

H2K2D01$5.00
The New FBI and How It Can Hurt You
The New FBI and How It Can Hurt You

H2K2A11$5.00
Open Source Security Testing Methodology Manual
Open Source Security Testing Methodology Manual

H2K2B25$5.00
The Password Probability Matrix
The Password Probability Matrix

H2K2B16$5.00
The Patriot Act
The Patriot Act

H2K2B27$5.00
Protection for the Masses
Protection for the Masses

H2K2B20$5.00
Proximity Cards: How Secure Are They?
Proximity Cards: How Secure Are They?

H2K2B30$5.00
Report From Ruckus
Report From Ruckus

H2K2B29$5.00
RetroComputing
RetroComputing

H2K2A03$5.00
Secure Telephony: Where ARE the Secure Phones?
Secure Telephony: Where ARE the Secure Phones?

H2K2B18$5.00
The Shape of the Internet: Influence and Consequence
The Shape of the Internet: Influence and Consequence

H2K2B01$5.00
Social Engineering
Social Engineering

H2K2A26$5.00
Standing Up To Authority
Standing Up To Authority

H2K2A02$5.00
Steganography: Wild Rumors and Practical Applications
Steganography: Wild Rumors and Practical Applications

H2K2A05$5.00
Strategic Thought in Virtual Deterrence and Real Offense: The Computer's Role
Strategic Thought in Virtual Deterrence and Real Offense: The Computer's Role

H2K2B06$5.00
Teaching Hacker Ethics with a Common Curriculum
Teaching Hacker Ethics with a Common Curriculum

H2K2B02$5.00
Technomanifestos: Visions of the Information Revolutionaries
Technomanifestos: Visions of the Information Revolutionaries

H2K2B04$5.00
Tracking Criminals on the Internet
Tracking Criminals on the Internet

H2K2B09$5.00
The Ultimate Co-location Site
The Ultimate Co-location Site

H2K2A25$5.00
The Vanished Art of Human Intelligence
The Vanished Art of Human Intelligence

H2K2A10$5.00