Even if you have been to ShmooCon, something that alludes most con-goers is the Hack or Halo contest. Most of the time you will see it’s organizers at table near the registration desk getting people signed up. What you may not know is how the whole thing goes down. It’s after hours so, you aren’t missing the great content during the day, and it might save you a few dollars of money spending bar time.
Many of you know who operat0r is, Darren in particular since operat0r pulled a magic trick on Darren’s ACER ONE (Archive.org Links) that turned it from brick to badass in less than 5 minutes. But what some of you may not know is that ol’ McCurdy (operat0r) has some other awesome side projects that run the same course as my style of apps. PORTABLE. But these aren’t the standard portable apps that I find on the net.
Ok, it’s not to you, but it is to a good cause. Here is their blurb: Hackers for Charity helps non-malicious hackers gain valuable job experience by putting them to work on projects for charity. They also build computer classrooms to help children and adults break the cycle of poverty through empowerment training, and feed children with funds raised by sales of Johnny Long’s books. This month, I thought that it would be fun to partner up with Hackers for Charity in order to raise money for the people of Uganda.
So I have graduated from the black and green standard hacker theme (with forest header) to a much easier to read and iPhone friendly theme. I have also added a few things to the site. Probably the most noticeable is the new logo. The logo was the created by my good friend TestMAD. He is a starving graphic artist that runs the IRC network ThinStack. He also supports a number of other projects like Geekcred, and Wess Tobler’s new project, Unpersons.
Haven’t had enough conferences yet? First, thanks to everyone who entered through email, twitter and commenting on the CSI give away. Second we do have a winner so please stop the flood. But, on to the show. The SC World Congress, Dec. 9-10, 2008, at the Javits Convention Center in New York is offering a dicount code to all readers of SBN (Security Blogger’s Network). But what is “The SC World Congress” Here is what they say:
What is CSI? This is what CSI says about it: Security is in transition. There is general agreement that security does not work, but not on how to fix it. CSI 2008 is the only event today that faces the challenge to reconsider security. This year at CSI’s annual event, the most innovative minds in security will grapple with the tough questions, providing a reality-check and alternative to cookie-cutter conferences that merely tweak the status quo.
Hi, and welcome to my trap. I see a ton of searches of just your type on my site on a daily basis. Lets get down to ranting. Maltego is an awesome tool, it’s also GIVEN AWAY for FREE.. As in beer, which they allow you to use their servers to do your stupid little ego searches on.** STOP TRYING TO STEAL IT.** Offensive Security 101. This is by far the best course / certification that I have attempted thus far in my career.
Recently there has been a lot of people in my scope that have been wondering about what “hacker” or security related podcasts are out there. iTunes does a horrible job at categorizing anything past “Technology”. That is where Hacker Media.org comes in. Not only can you get the main feed of ALL the hacker/security related podcasts out there, you can get even deeper. Droops, the maintainer of said monster, makes it so you can pick and choose what kind of shows you want to see by having individualized feeds based on categories, and as shows come and go from those categories the feed changes with it.
EDIT: Switching something from “DRAFT” to “PUBLISH” is a really important step. Sorry guys. Let me preface all of these tools with, the fact that some don’t come “portable”. To make them so, I have dropped the installer / setup file into Universal Extractor and then cleaned up the directory. PortSwigger’s Burp Suite - http://portswigger.net/suite/ This tool is essential to any web application security guru’s tool belt. If you haven’t used it already it is time to get schooled up on this wreaking ball.
So there I was… Today I was sitting at home watching Irongeek’s post of John Strand’s talk Defense In Depth is Dead, Long Live Defense In Depth. And I had one really evil thought: Someone (such as Bob), could sit at an airport. We all do this it isn’t difficult. He could then turn on his laptop and connect it the airport wireless. Another task, difficult for some, but lets go with Bob being able to.