A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Hacking Survival: So. You want to compute post-apocalypse? Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)

Hacking Survival: So. You want to compute post-apocalypse?
Derbycon 2012

Let’s assume that the world as we know it has come to and end. How? EMP? Financial Ruin? Mayans? Depending on how, it actually may make a difference to us hackers. Once we are at the end of the world, how will we get access to the ‘tubez? Likely we won’t, but we can apply the hacker mentality to binging it back. However, you’ll need to practice, be prepared and learn now in order to be the new Al Gore. Want to learn about the technology and hacker perspective to communicate with the world, when your “world” will end at the end of the block? If yes, this talk is for you.

Larry Pesce (haxorthematrix) / Darren Wigley

Larry is a Senior Security Consultant with NWN Corporation’s NProtectteam. He also diverts a significant portion of his attention co-hosting the PaulDotCom Security Weekly podcast, and likes to tinker with all things electronic and wireless, much to the disappointment of his family, friends and warranties, but to the pleasure of his third Leatherman.

Darren Wigley is gainfully employed with NWN Corporation’s NProtect team as Security Consultant, and is a member of the PaulDotCom Security Weekly podcast. Darren spends his days compromising networks, watching re-runs of Beavis and Butthead, injuring himself with power tools in the workshop and burning his fingertips with the soldering iron.

(Sorry, last few minutes of audio are missing)
 

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast