![pauldotcom logo](/images/pauldotcom-logo.png)
PaulDotCom mailing list archives
No subject
From: bogus () does not exist com ()
Date: Tue, 21 Oct 2008 15:14:41 -0000
all sorts. In this talk I will speak about my experiences and lessons learned in "new media". In particular how they relate to underground culture and our social responsibility to the next generation of security enthusiasts. Why You Suck <http://www.irongeek.com/i.php?page=videos/pn12/why-you-suck> Decius Drunken Rant<http://www.irongeek.com/i.php?page=videos/pn12/decius-drunken-rant> Intx80's Performance<http://www.irongeek.com/i.php?page=videos/pn12/intx80-performance> Awards and Closing<http://www.irongeek.com/i.php?page=videos/pn12/awards-and-closing> Thanks to the Phreaknic <http://www.phreaknic.info/> crew, SkyDog, Lady Merlin and the A/V team SomeNinjaMaster, Night Carnage, Greg, Brimstone, Poiu Poiu, Mudflap, and Drunken Pirate for setting up the rigs and capturing the video. --0015174c114635ee07046f875978 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Hi all, <br>All of the talks from Phreaknic 12 can be found here:<br><a hre= f=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/phreaknic-12-videos">= http://www.irongeek.com/i.php?page=3Dvideos/pn12/phreaknic-12-videos</a><br=
<br>
Here are the contents:<br><br><blockquote> <blockquote> <p align=3D"left"><a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/= pn12/opening-remarks">Opening Remarks</a><br>What is this Phreaknic you spe= ak of? Who we are, what we are about, and what is=20 this stuff I got for coming to the con? We'll go over the events, hit the hi= ghlights,=20 and some general guidelines about attending Phreaknic.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/droops-lowtek-ardu= ino-pn12">Droops/Morgellon - The Extraordinary Journey from Fundamental Electronics to Fabulous Enchanted Systems with Arduino's and Magical Potions.</a><br>Droops and Morgellon will take you from basic electronics t= o building embedded=20 systems. Learn how to build a standalone RFID tag reader with a fancy LCD display or= your=20 own oscilloscope or childrens toys that speak to you or how to solar power a=20 geothermal heat pump. There may even be some giveaways and contests. Magical Potions will b= e consumed but not provided.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/sorteal-lives= -open-source-video-editor">Sorteal - LiVes Open Source video editor</a><br>= This talk will introduce new users to the LiVES video editor and its vast a= rray=20 of supported formats, both audio and video. Basic and advanced video editing= =20 techniques will<br>be cover as well as the use of real time effects along w= ith their importance and implementation in VJ projects. The unique networking features, the desire t= o=20 build a strong<br>community around the project and the openness for develop= ers to expand the=20 project and its functionality will be addressed as well during the talk.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/trip-discussi= on-of-the-legality-of-wardriving">TRiP - Discussion of the legality of ward= riving</a><br>This talk is to provide a "current" legal status of= wardriving throughout the=20 US. The talk will include an overview of wardriving and it's history (wardialing), t= he=20 statues regulating<br>all 50 states and how courts have interrupted such st= atutes, recent arrests for wardriving/related activities, and a brief overview of the international=20 statues.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/handgrip-butt= stock-open-source-ak-47s">Handgrip/Buttstock - Open Source AK-47's</a><= br>Ensuring freedom through greater firepower. How to build yourself a lega= l,=20 paperwork-free AK47 from salvage parts.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/jack-dreher-h= acking-the-mind-body-connection">Jack Dreher- Hacking the Mind/Body Connect= ion</a><br>This talk will teach you a simple acupressure based algorithm al= ong with a=20 series of visualization exercises that can be used to overcome a wide variety of ment= al,=20 physical, emotional, and spiritual limiting beliefs. While the modality itself can be= =20 applied to a multitude of issues this talk will focus on using the techniques to enhance= =20 learning and creativity.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/russell-buttu= rini-using-the-hak5-u3-switchblade-as-an-incident-response-and-forensics-to= ol">Russell Butturini - Using the Hak5 U3 Switchblade as an Incident Response and Forensics Tool</a><br>This talk will explain how to adapt the = Hak5 switchblade, originally conceived=20 as an attack/pen-testing tool into an incident response and forensics tool using= =20 different utilities. Adaptations of the original solution using a non-U3 drive and a more automa= ted=20 solution using U3 technology will be discussed.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/lee-baird-joh= n-skinner-jail-get-your-iphone-out-and-try-not-to-get-yourself-in">Lee Bair= d/John Skinner - JAIL: Get your iPhone out, and try NOT to get yourself in!</a><br>A guide on how to jailbreak your iPhone, install & = backup unauthorized apps, and=20 what to do with your iPhone once it's jailbroken.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/scott-millike= n-erin-shelton-beer-hacking-real-world-examples">Scott Milliken/Erin Shelto= n - Beer Hacking - Real World Examples</a><br>You build your own computers = from the bare parts. You'd die before paying=20 someone else to actually write a basic HTML page for you. So why is it that= you=20 pay up to 10x the actual cost of making beer for something of lesser quality? This presentati= on=20 will cover the various methods of making your own alcoholic beverages (beer, cider, wine),= =20 including the equipment required and approximate setup costs for each. Even if your skill= in=20 the kitchen is limited to the microwave, there is a method of brewing that will work fo= r=20 you. Some experimentation tricks will also be covered so that you can literally hack = your=20 beer to create a new flavor. Samples of various batches made by the presenters will= be=20 available during the presentation, assuming they haven't already drunk all of it.= </p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/bruce-herman-= the-art-of-the-approach-the-steps-to-attract-women">Bruce Herman - The Art = of the Approach: The Steps to Attract Women</a><br>I will go through a step= by step instruction of getting a womans phone number=20 and date. I will break this down bit by bit to show how to successfully do it. I will= go=20 over the things you should do and the things you should never do. Quick over veiws on body= =20 language and what yours is saying to the opposite sex. </p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/irongeek-hard= ware-keyloggers-use-review-and-stealth">Irongeek - Hardware Keyloggers: Use= , Review, and Stealth </a><br> This talk will cover hardware keyloggers and their use. About six will be= =20 presented in person for folks to try hands on, with a few others referenced in the slide= show=20 (mini-pci ones for example) . I'll cover the advantages and disadvantages of the = current=20 crop on the market and how they work. Also covered will be possible ways to detect hard= ware keyloggers via physical inspection an software.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/daniel-hooper= -an-introduction-to-software-defined-radio-by-cowboy-dan">Daniel Hooper - A= n Introduction to Software Defined Radio by Cowboy Dan</a><br>Software Defi= ned Radio (SDR) is the latest (and possibly last) iteration of=20 radio communication technology. Traditional radio technology is very=20 hardware-oriented, and somewhat inaccessible to the software-hacking community. NO LONGER! With a fixed piece of hardware such as the Universal Software Radio Periphe= ral (USRP), we can emulate many different kinds of traditional hardware, from CW Morse-= code=20 type transmissions, all the way up to digital QAM, HDTV, and beyond. This presentation will demonstrate how to get set up with GNU Radio and the= USRP hardware. We will perform a few simple tasks such as receiving radio and TV= . The=20 goal is to get most people in the audience comfortable with the setup process so= that=20 they can start experimenting.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/skydog-crew-s= tarting-your-own-hackerspace-panel-talk">SkyDog & Crew - Starting your = own Hackerspace (Panel Talk)</a><br>Got a bunch of hacker/maker friends and= wanna do some projects? Start a=20 hackerspace! We'll take you on an adventure as we look back over the last year and r= eflect on=20 the progress we have made getting our hackerspace started, and share some pitfa= lls=20 and triumphs along the way. Skydog will be joined by Seeblind, the VP of the HC= ,=20 Mudflap, the Secretary, and Someninjamaster, a devoted, hardworking member.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/scott-moulton= -at-least-ten-things-you-didnt-know-about-your-hard-drive">Scott Moulton - = At Least TEN things you didn't know about your hard drive!</a><br>This = speech comprises at least 10 things that are 2+2=3D5 type situations people= =20 do not realize about hard drives. For Example, Data is written in Cylinders on har= d=20 drives, all partitions are created on Cylinder Boundaries and that leaves an offset fro= m the=20 end of one partition to the next which leaves a gap between partitions that is unusabl= e or=20 free space at the end of the disk. In addition to that, the point would be, since the out= er=20 edge of a drive starting at Track 0 is the fastest location on the drive, and the first=20 partition is created on a cylinder boundary at the outside edge, then each and every partition you cr= eate=20 on the disk has to be at a cylinder boundary into the disk. This means the second parti= tion=20 is on a slower part of the drive than the first. So for Mac Users that create a 32 = gig=20 Fat32 partition on their drive (actually the 6th/7th partition on the drive) is 32 gigs fro= m the=20 end of the drive on a Cylinder boundary and they just installed Windows on the slowest part = of=20 the drive. No it will not be animated!</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/bruce-potter-= three-cool-security-technologies-youve-never-heard-of">Bruce Potter - Three= Cool Security Technologies You've Never Heard Of</a><br>This talk will= introduce you to 3 cool security technologies that you've=20 probably never been exposed to. There is still innovation going on, and much of the most useful= tech=20 isn't getting press time. So I'm going to try and rekindle some of that love = you've=20 lost over the years by giving you the 20 minute low-down on each one. Go get some wine, l= ight=20 the candles, sit back, and enjoy security again. What are the 3 technologies? W= ell,=20 you'll just have to attend the talk to find out.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/nathan-hamiel= -shawn-moyer-satan-is-on-my-friends-list-attacking-social-networks">Nathan = Hamiel /Shawn Moyer - Satan is on my Friends List: Attacking Social Networks</a><br>Social Networking is shaping up to be the perfect st= orm... An implicit trust of=20 those in one's network or social circle, a willingness to share information, little or no= =20 validation of identity, the ability to run arbitrary code (in the case of user-created ap= ps)=20 with minimal review, and a tag soup of client-side user-generated HTML (Hello? MySpace? = 1998=20 called. It wants its markup vulns back). Yikes. But enough about pwning the kid from homeroom who copied your calc homework= .=20 With the rise of business social networking sites, there are now thousands of pu= blic=20 profiles with real names and titles of people working for major banks, the defense and=20 aerospace industry, federal agencies, the US Senate... A target-rich and trusting=20 environment for custom-tailored, laser-focused attacks. Our talk will show the results of a series of public experiments aimed at= =20 pointing out the security and privacy ramifications of everyone's increasingly open, inc= reasingly=20 connected online personae and the interesting new attack vectors they've created.= </p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/david-hickman= -joshua-restivo-the-government-found-child-porn-on-my-pc-now-what">David Hi= ckman/Joshua Restivo - The Government Found Child Porn on My PC. Now What?</a><br>Most users of the Internet are acquainted with peer= to peer filesharing and the=20 amount of pornography available therein and elsewhere on the Internet. Any active=20 filesharing user has likely downloaded some form of child pornography unintentionally. Law= =20 enforcement has taken the stance that downloading, possession, and/or distribution of c= hild pornography, even accidental or system compromise, is a crime that will be= =20 prosecuted to the fullest extent of the law. As a result, there are task forces, which sc= our=20 p2p networks looking for the hashes of known child pornography. When found, the local=20 jurisdiction is notified to investigate. In many cases these local investig= ators do not have the=20 computer skills or experience handle the case correctly. Unfortunately, once the computers are seized, the accused automatically inh= erit=20 the stigma of being associated with this type of crime. Only if they have acces= s to=20 competent defense forensics do they have a chance of avoiding charges, having existin= g=20 charges dropped or winning their case in court. This talk will concentrate on what happens in the pre-indictment and=20 post-indictment stages of a case from the defense forensics viewpoint.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/darren-kitche= n-lessons-learned-in-hacker-media">Darren Kitchen - Lessons Learned in Hack= er Media</a><br>From e-zine to podcast the world of hacking has been filled= with media of all=20 sorts. In this talk I will speak about my experiences and lessons learned in "new med= ia". In=20 particular how they relate to underground culture and our social responsibility to the= next generation of security enthusiasts.</p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/why-you-suck"=
Why You Suck</a></p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/decius-drunke= n-rant"> Decius Drunken Rant</a></p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/intx80-perfor= mance">Intx80's Performance</a></p> <p align=3D"left"> <a href=3D"http://www.irongeek.com/i.php?page=3Dvideos/pn12/awards-and-cl= osing">Awards and Closing</a></p> </blockquote> </blockquote> <p align=3D"center"> =A0</p> <p align=3D"center"> Thanks to the <a href=3D"http://www.phreaknic.info/">Phreaknic</a> crew, Sk= yDog,=20 Lady Merlin and the A/V team SomeNinjaMaster, Night Carnage, Greg, Brimston= e, Poiu Poiu, Mudflap, and Drunken=20 Pirate for setting up the rigs and capturing the video.</p><br> --0015174c114635ee07046f875978--
Current thread:
- No subject, (continued)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)
- No subject (Oct 21)