Παραδείγματα από το σώμα κειμένου για DEFCON
1. YOUR E–MAIL ALERTS Computer Security Computing and Information Technology Defcon or Create Your Own Manage Alerts
2. "Everything for her is at Defcon," the source said, speaking on the condition of anonymity because the person was not authorized to speak on behalf of the campaign.
3. ARTICLE Even the ATM machines were suspect at this year‘s Defcon conference, where hackers play intrusion games at the bleeding edge of computer security.
4. UserName Pass Sunday, August 7, 2005 print this page BUSINESS REPORT All News» » Hackers prowess on display at Defcon conference » Inflation falls, shares, lira, foreign reserves hit records, but economists sound warnings » Hot money works wonders in Turkey÷ shares, lira, foreign reserves hit records GREG SANDOVAL LAS VEGAS – Associated Press ARTICLE SUMMARYEven the ATM machines were suspect at this year‘s Defcon conference, where hackers play intrusion games at the bleeding edge of computer security.
5. Borrowing heavily from the model of Woodstock and the more professionalized DefCon conference, the event held every four years in the Netherlands draws an international array of experts and geeks.