Click to enlargeThe Last HOPE (2008)

Look at all of these DVDs from The Last HOPE conference! They're completely region free so they'll play regardless of what part of the planet you're in. The DVDs have no ads and are completely uncut. We also have a two-disc audio set of every talk in 128 kbps high fidelity audio.

The Last HOPE was thought by many to be the last in the series of HOPE conferences. With the news that the Hotel Pennsylvania was set to be demolished, there didn't seem to be much hope for the future. However, as revealed at the closing ceremonies, this was all a big misunderstanding. "Last" was not referring to "final" but rather to "most recent." Hence, the next conference was to be called "The Next HOPE." But because nobody knew this, there was a "death" theme throughout the entire conference.

For the first time, there were three speaker tracks, along with an unscheduled track and all of the activities taking place on the second floor. The first track was named after computer scientist Grace Hopper, the second after mathematician and cryptanalyst Alan Turing, and the third after acclaimed phone phreak Joe Engressia (Joybubbles). The unscheduled, unrecorded track was named after computer pioneer Konrad Zuse.

This time, we had Steven Levy (author of "Hackers") as our keynote with featured speakers Adam Savage, Jello Biafra, Kevin Mitnick, and Steven Rambam.

To order, just click the button(s) next to the tombstones. Click on the titles for the pre-conference descriptions of these panels or to see the video in non-DVD quality.






GET ALL 100+ DVDS!
GET ALL 100+ DVDS!

TLHALNormally: $495.00Discounted Price: $349.00
AUDIO ONLY PLEASE
AUDIO ONLY PLEASE

TLHAUDA-B$5.00
Advanced Memory Forensics: Releasing the Cold Boot Utilities
Advanced Memory Forensics: Releasing the Cold Boot Utilities

TLHA07$5.00
The Art of Do-Foo
The Art of Do-Foo

TLHC11$5.00
The Attendee Meta-Data Project
The Attendee Meta-Data Project

TLHB05$5.00
Autonomously Bypassing VoIP Filters with Asterisk: Let Freedom Ring
Autonomously Bypassing VoIP Filters with Asterisk: Let Freedom Ring

TLHC08$5.00
Bagcam - How Did TSA and/or the Airlines Manage to Do That to Your Luggage?
Bagcam - How Did TSA and/or the Airlines Manage to Do That to Your Luggage?

TLHA19$5.00
Biohacking - An Overview
Biohacking - An Overview

TLHC20$5.00
Botnet Research, Mitigation and the Law
Botnet Research, Mitigation and the Law

TLHA01$5.00
Building a Better Ballot Box
Building a Better Ballot Box

TLHC15$5.00
Building Hacker Spaces Everywhere: Your Excuses are Invalid
Building Hacker Spaces Everywhere: Your Excuses are Invalid

TLHA24$5.00
Citizen Engineer - Consumer Electronics Hacking and Open Source Hardware
Citizen Engineer - Consumer Electronics Hacking and Open Source Hardware

TLHA03$5.00
A Collaborative Approach to Hardware Hacking: NYCResistor
A Collaborative Approach to Hardware Hacking: NYCResistor

TLHB10$5.00
Community Fabrication
Community Fabrication

TLHC14$5.00
A Convergence of Communities
A Convergence of Communities

TLHB16$5.00
Crippling Crypto: The Debian OpenSSL Debacle
Crippling Crypto: The Debian OpenSSL Debacle

TLHB17$5.00
Death Star Threat Modeling
Death Star Threat Modeling

TLHC02$5.00
A Decade Under the DMCA
A Decade Under the DMCA

TLHA26$5.00
Dirty New Media: Art, Activism, and Computer Counter Cultures
Dirty New Media: Art, Activism, and Computer Counter Cultures

TLHB12$5.00
Earth Intelligence Network: World Brain as Earthgame
Earth Intelligence Network: World Brain as Earthgame

TLHB02$5.00
E-Mail: Descendant of the Telegram
E-Mail: Descendant of the Telegram

TLHC01$5.00
The Emperor is Naked
The Emperor is Naked

TLHC03$5.00
Escaping High Security Handcuffs
Escaping High Security Handcuffs

TLHA28$5.00
Evil Interfaces: Violating the User
Evil Interfaces: Violating the User

TLHC04$5.00
Exploration of Possibilities: Brain Hacking
Exploration of Possibilities: Brain Hacking

TLHC10$5.00
Featured Speaker - Jello Biafra
Featured Speaker - Jello Biafra

TLHA32$5.00
Featured Speaker - Kevin Mitnick
Featured Speaker - Kevin Mitnick

TLHA23$5.00
Featured Speaker - Steven Rambam
Featured Speaker - Steven Rambam

TLHA20A-B$5.00
Featured Speaker - Adam Savage
Featured Speaker - Adam Savage

TLHA30$5.00
From a Black Hat to a Black Suit - <br>How to Climb the Corporate Security Ladder Without Losing Your Soul
From a Black Hat to a Black Suit -
How to Climb the Corporate Security Ladder Without Losing Your Soul


TLHB04$5.00
Ghetto IDS and Honeypots for the Home User
Ghetto IDS and Honeypots for the Home User

TLHB21$5.00
Graffiti Research Lab Extravaganza
Graffiti Research Lab Extravaganza

TLHA25$5.00
Grand Theft Lazlow - Hacking the Media by Laughing at Them
Grand Theft Lazlow - Hacking the Media by Laughing at Them

TLHA29$5.00
Hackateer Premiere
Hackateer Premiere

TLHB24$5.00
A Hacker's View of the Freedom of Information Act (FOIA)
A Hacker's View of the Freedom of Information Act (FOIA)

TLHA08$5.00
Hacker Space Design Patterns
Hacker Space Design Patterns

TLHB09$5.00
Hackers and Planet Earth
Hackers and Planet Earth

TLHC09$5.00
Hacking Cool Things with Microcontrollers
Hacking Cool Things with Microcontrollers

TLHA04$5.00
Hacking Democracy: An In Depth Analysis of the ES&S Voting Systems
Hacking Democracy: An In Depth Analysis of the ES&S Voting Systems

TLHA05$5.00
Hacking International Networks and System(s) using VoIP
Hacking International Networks and System(s) using VoIP

TLHB23$5.00
Hacking the Mind, Hacking the Body: Pleasure
Hacking the Mind, Hacking the Body: Pleasure

TLHB13A-B$5.00
Hacking the Price of Food: An Urban Farming Renaissance
Hacking the Price of Food: An Urban Farming Renaissance

TLHB07$5.00
Hacking the Young Lady's Illustrated Primer: <br>Dispatches from the Field of Educational Technology
Hacking the Young Lady's Illustrated Primer:
Dispatches from the Field of Educational Technology


TLHA10$5.00
The History of Phone Phreaking, 1960-1980
The History of Phone Phreaking, 1960-1980

TLHB20$5.00
Home Is Where The Heart Is? The Question of Jurisdiction
Home Is Where The Heart Is? The Question of Jurisdiction

TLHB31$5.00
How Do I Pwn Thee? Let Me Count The Ways
How Do I Pwn Thee? Let Me Count The Ways

TLHA12$5.00
How Piracy Feeds a Starving Audience
How Piracy Feeds a Starving Audience

TLHC16$5.00
How to Talk to the Mainstream Media
How to Talk to the Mainstream Media

TLHB30$5.00
Identification Card Security: Past, Present, Future
Identification Card Security: Past, Present, Future

TLHB33$5.00
The (Im)possibility of Hardware Obfuscation
The (Im)possibility of Hardware Obfuscation

TLHB01$5.00
The Innermost Unifier: Today It's the Corporate Anthem
The Innermost Unifier: Today It's the Corporate Anthem

TLHA13$5.00
Installation Art in HOPE Space
Installation Art in HOPE Space

TLHB19$5.00
The Intersection of Culture Jamming, Hacking, and Hacktivism
The Intersection of Culture Jamming, Hacking, and Hacktivism

TLHA27A-B$5.00
Introduction to MCU Firmware Analysis and Modification with MSP430static
Introduction to MCU Firmware Analysis and Modification with MSP430static

TLHC05$5.00
Introduction to the Open Web Application Security Project
Introduction to the Open Web Application Security Project

TLHC06$5.00
IPv6, the Next Generation Network Playground - How to Connect and Explore
IPv6, the Next Generation Network Playground - How to Connect and Explore

TLHC12$5.00
Keynote Address - Steven Levy
Keynote Address - Steven Levy

TLHA17$5.00
Kitchen Hack Lab: Interactive Food Disassembly
Kitchen Hack Lab: Interactive Food Disassembly

TLHB08$5.00
The Last HOPE Closing Ceremonies
The Last HOPE Closing Ceremonies

TLHA33$5.00
Macro Social Engineering
Macro Social Engineering

TLHC07$5.00
Maintaining a Locksporting Organization and Breakthroughs in the Community
Maintaining a Locksporting Organization and Breakthroughs in the Community

TLHA02$5.00
Methods of Copying High Security Keys
Methods of Copying High Security Keys

TLHA18$5.00
Monumental Women Who Influenced Today's Technology
Monumental Women Who Influenced Today's Technology

TLHB06$5.00
The New York City Taxi System: Privacy vs. Utility
The New York City Taxi System: Privacy vs. Utility

TLHB11$5.00
No-Tech Hacking
No-Tech Hacking

TLHB37$5.00
"Off the Grid" Voice/Data Communications
"Off the Grid" Voice/Data Communications

TLHA15$5.00
One Last Time: The Hack/Phreak History Primer
One Last Time: The Hack/Phreak History Primer

TLHA11$5.00
Packing and the Friendly Skies - <br>Why Transporting Firearms May Be the Best Way to Safeguard Your Tech When You Fly
Packing and the Friendly Skies -
Why Transporting Firearms May Be the Best Way to Safeguard Your Tech When You Fly


TLHB03$5.00
Pen Testing the Web with Firefox
Pen Testing the Web with Firefox

TLHC25$5.00
PenTest Labs Using LiveCDs
PenTest Labs Using LiveCDs

TLHC24$5.00
PGP versus PKI
PGP versus PKI

TLHC21$5.00
Phone Losers of America
Phone Losers of America

TLHB28$5.00
Phreaking 110: The State of Modern Phreaking
Phreaking 110: The State of Modern Phreaking

TLHC22$5.00
Phreaks, Confs, and Jail
Phreaks, Confs, and Jail

TLHA21$5.00
Policy Hacking: Taking Back Public Sector IT
Policy Hacking: Taking Back Public Sector IT

TLHB15$5.00
Port Knocking and Single Packet Authorization: Practical Deployments
Port Knocking and Single Packet Authorization: Practical Deployments

TLHC19$5.00
Postal Hacking
Postal Hacking

TLHB35$5.00
Programming Your Mobile Phone for International Calling
Programming Your Mobile Phone for International Calling

TLHC27$5.00
Project Telephreak
Project Telephreak

TLHB14$5.00
Pseudonymization Methodologies: Personal Liberty vs. the Greater Good
Pseudonymization Methodologies: Personal Liberty vs. the Greater Good

TLHC17$5.00
REAL ID Act and RFID: Privacy and Legal Implications
REAL ID Act and RFID: Privacy and Legal Implications

TLHB25$5.00
Reprimand Panel
Reprimand Panel

TLHC18$5.00
RIAA Litigations: How the Tech Community Can Help
RIAA Litigations: How the Tech Community Can Help

TLHB18$5.00
Safecracking
Safecracking

TLHB22$5.00
Sharing Your Love of Technology with Normal People - Prometheus Radio Project Tips
Sharing Your Love of Technology with Normal People - Prometheus Radio Project Tips

TLHA16$5.00
Simulating the Universe on Supercomputers
Simulating the Universe on Supercomputers

TLHC26$5.00
The Singularity: Focus on Robotics and Hackers
The Singularity: Focus on Robotics and Hackers

TLHB27$5.00
Social Engineering
Social Engineering

TLHA22$5.00
Spy Improv: Everything You Ever Wanted to Ask and Did Not Know Who to Ask
Spy Improv: Everything You Ever Wanted to Ask and Did Not Know Who to Ask

TLHB29A-B$5.00
Starting Your Own Con for Fun and No Profit: A How-to
Starting Your Own Con for Fun and No Profit: A How-to

TLHC23$5.00
Strengths and Weaknesses of (Physical) Access Control Systems
Strengths and Weaknesses of (Physical) Access Control Systems

TLHB36$5.00
Technical Surveillance Countermeasures<br> (TSCM) - A Brief Primer on the Arcane Art and Science of Electronics Surveillance and "Bug" Detection
Technical Surveillance Countermeasures
(TSCM) - A Brief Primer on the Arcane Art and Science of Electronics Surveillance and "Bug" Detection


TLHA14$5.00
Undoing Complexity - From Paper Clips to Ball Point Pens
Undoing Complexity - From Paper Clips to Ball Point Pens

TLHA09$5.00
VLANs Layer 2 Attacks: Their Relevance and Their Kryptonite
VLANs Layer 2 Attacks: Their Relevance and Their Kryptonite

TLHC28$5.00
VoIP (In)security: Italians Do It Better
VoIP (In)security: Italians Do It Better

TLHC13$5.00
Warrantless Laptop Searches at U.S. Borders
Warrantless Laptop Searches at U.S. Borders

TLHB34$5.00
What and Who is "Anonymous"?
What and Who is "Anonymous"?

TLHB32$5.00
Wikipedia: You Will Never Find a More Wretched Hive of Scum and Villainy
Wikipedia: You Will Never Find a More Wretched Hive of Scum and Villainy

TLHA06$5.00
YouTomb - A Free Culture Hack
YouTomb - A Free Culture Hack

TLHA31$5.00
The Zen of the Hacker
The Zen of the Hacker

TLHB26$5.00