All public logs
From BruCON 2017
Combined display of all available logs of BruCON 2017. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)- 10:54, 26 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4931 of page Training 2015 - Offensive IoT Exploitation patrolled
- 10:53, 26 May 2015 Tom.Gilis (talk | contribs) protected File:Aseem Jakhar.jpg [edit=sysop] (indefinite)[move=sysop] (indefinite)[upload=sysop] (indefinite) (hist)
- 10:53, 26 May 2015 Tom.Gilis (talk | contribs) protected File:Aditya Gupta.jpg [edit=sysop] (indefinite)[move=sysop] (indefinite)[upload=sysop] (indefinite) (hist)
- 10:53, 26 May 2015 Tom.Gilis (talk | contribs) uploaded File:Aditya Gupta.jpg
- 10:50, 26 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4927 of page Training 2015 - Offensive IoT Exploitation patrolled
- 10:49, 26 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4926 of page Training 2015 - Offensive IoT Exploitation patrolled
- 10:48, 26 May 2015 Tom.Gilis (talk | contribs) uploaded File:Aseem Jakhar.jpg
- 10:40, 26 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4924 of page Training 2015 - Offensive IoT Exploitation patrolled
- 10:36, 26 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4923 of page Training 2015 - Assessing and Exploiting Control Systems patrolled
- 10:32, 26 May 2015 Tom.Gilis (talk | contribs) protected Training 2015 - Assessing and Exploiting Control Systems [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 14:27, 15 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4916 of page Training 2015 - Assessing and Exploiting Control Systems patrolled
- 14:26, 15 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4915 of page Training 2015 - Assessing and Exploiting Control Systems patrolled
- 14:19, 15 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4914 of page Training 2015 - Assessing and Exploiting Control Systems patrolled
- 14:08, 15 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4913 of page Training 2015 - Assessing and Exploiting Control Systems patrolled
- 14:03, 15 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4912 of page Training 2015 - Assessing and Exploiting Control Systems patrolled
- 14:02, 15 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4911 of page Training 2015 - Assessing and Exploiting Control Systems patrolled
- 13:57, 15 May 2015 Tom.Gilis (talk | contribs) protected Training 2015 - Assessing and Exploiting Control Systems [create=sysop] (indefinite) (hist)
- 13:50, 15 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4910 of page Training patrolled
- 20:49, 3 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4909 of page Contact patrolled
- 20:47, 3 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4908 of page Travel patrolled
- 20:46, 3 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4907 of page Tickets patrolled
- 12:37, 2 May 2015 Tom.Gilis (talk | contribs) automatically marked revision 4906 of page Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more patrolled
- 19:10, 29 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4905 of page Training patrolled
- 21:27, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4904 of page Training patrolled
- 20:57, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4903 of page Training patrolled
- 20:57, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4902 of page Training patrolled
- 20:52, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4901 of page Training 2015 - Cyber Breach Management patrolled
- 20:49, 28 April 2015 Tom.Gilis (talk | contribs) protected Training 2015 - Cyber Breach Management [edit=sysop] (indefinite)[move=sysop] (indefinite) (hist)
- 20:48, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4899 of page Training 2015 - Cyber Breach Management patrolled
- 20:48, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4898 of page Training 2015 - Cyber Breach Management patrolled
- 20:48, 28 April 2015 Tom.Gilis (talk | contribs) protected File:Chris.Nutt.jpg [edit=sysop] (indefinite)[move=sysop] (indefinite)[upload=sysop] (indefinite) (hist)
- 20:48, 28 April 2015 Tom.Gilis (talk | contribs) uploaded File:Chris.Nutt.jpg
- 20:47, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4895 of page Training 2015 - Cyber Breach Management patrolled
- 20:37, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4894 of page Training patrolled
- 20:35, 28 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4893 of page Training patrolled
- 19:23, 25 April 2015 Tom.Gilis (talk | contribs) protected File:Andrew.Honig.jpg [edit=sysop] (indefinite)[move=sysop] (indefinite)[upload=sysop] (indefinite) (hist)
- 19:23, 25 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4891 of page Training 2015 - Practical Malware Analysis - Rapid Introduction patrolled
- 19:22, 25 April 2015 Tom.Gilis (talk | contribs) uploaded File:Andrew.Honig.jpg
- 19:22, 25 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4889 of page Training 2015 - Practical Malware Analysis - Rapid Introduction patrolled
- 19:21, 25 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4888 of page Training 2015 - Practical Malware Analysis - Rapid Introduction patrolled
- 19:14, 25 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4887 of page Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more patrolled
- 19:13, 25 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4886 of page Training 2015 - Tactical Exploitation and Response patrolled
- 19:12, 25 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4885 of page Training 2015 - Wireshark WiFi and Lua-Packet Class patrolled
- 19:10, 25 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4884 of page Training 2015 - Wireshark WiFi and Lua-Packet Class patrolled
- 19:10, 25 April 2015 Tom.Gilis (talk | contribs) automatically marked revision 4883 of page Training 2015 - Wireshark WiFi and Lua-Packet Class patrolled
- 19:09, 25 April 2015 Tom.Gilis (talk | contribs) moved protection settings from Spring Training 2015 - Wireshark WiFi and Lua-Packet Class to Training 2015 - Wireshark WiFi and Lua-Packet Class (Spring Training 2015 - Wireshark WiFi and Lua-Packet Class moved to Training 2015 - Wireshark WiFi and Lua-Packet Class)
- 19:09, 25 April 2015 Tom.Gilis (talk | contribs) moved page Spring Training 2015 - Wireshark WiFi and Lua-Packet Class to Training 2015 - Wireshark WiFi and Lua-Packet Class without leaving a redirect
- 19:08, 25 April 2015 Tom.Gilis (talk | contribs) moved protection settings from Spring Training 2015 - Tactical Exploitation and Response to Training 2015 - Tactical Exploitation and Response (Spring Training 2015 - Tactical Exploitation and Response moved to Training 2015 - Tactical Exploitation and Response)
- 19:08, 25 April 2015 Tom.Gilis (talk | contribs) moved page Spring Training 2015 - Tactical Exploitation and Response to Training 2015 - Tactical Exploitation and Response without leaving a redirect
- 19:08, 25 April 2015 Tom.Gilis (talk | contribs) moved protection settings from Spring Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more to Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more (Spring Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more moved to Training 2015 - Hacking web applications – case studies of award-winning bugs in Google, Yahoo, Mozilla and more)