RadioShow12
From syn2cat - HackerSpace.lu
(Difference between revisions)
m |
m (→Sources / Guide to further reading) |
||
| (3 intermediate revisions by one user not shown) | |||
| Line 4: | Line 4: | ||
|recording=2010/02/18 06:00:00 PM | |recording=2010/02/18 06:00:00 PM | ||
|broadcast=2010/02/20 01:00:00 PM | |broadcast=2010/02/20 01:00:00 PM | ||
| − | |podcastrelease=2010/01/20 | + | |podcastrelease=2010/01/20 04:00:00 PM |
| + | |podcast=LetzHack ep12 20100220 podcast.ogg | ||
| + | |podcastmp3=LetzHack ep12 20100220 podcast.mp3 | ||
}} | }} | ||
| − | |||
* Overview of todays show | * Overview of todays show | ||
* And explanation of the term Cyberwarfare | * And explanation of the term Cyberwarfare | ||
| Line 17: | Line 18: | ||
* Google did not learn from the attempt and made an (too) early launch with Buzz | * Google did not learn from the attempt and made an (too) early launch with Buzz | ||
** Responsible launch of Products | ** Responsible launch of Products | ||
| − | |||
* This and similar cyber-warfare threats | * This and similar cyber-warfare threats | ||
** Referent Objects & Threatening actors | ** Referent Objects & Threatening actors | ||
| Line 26: | Line 26: | ||
** Georgia | ** Georgia | ||
** Iranian Cyber Army | ** Iranian Cyber Army | ||
| − | * {{RadioSong | Artist=Cube-C |Album | + | * {{RadioSong | Artist=Cube-C |Album=Chip-O-Lantern | Title=Robo Ghost| Website=http://www.cube-c.ch.vu/ | Duration=03:12 }} |
* Main entries into corporate networks, how it is currently done and what the Future could look like | * Main entries into corporate networks, how it is currently done and what the Future could look like | ||
** Hardware attacks, Snooping Firmware, Ethernet Chips that "leak", Company Branded USB Sticks | ** Hardware attacks, Snooping Firmware, Ethernet Chips that "leak", Company Branded USB Sticks | ||
* Can (should) Legislation fix this? | * Can (should) Legislation fix this? | ||
** There are already Laws in Luxembourg (e-Commerce Law) | ** There are already Laws in Luxembourg (e-Commerce Law) | ||
| + | * {{RadioSong | Artist=Kangaroo MusiQue |Album=The Alan Sugartrash Orchestra | Title=KangaROO| Website=http://blog.kangaroo.cmo.de/ | Duration=02:47 }} | ||
* Cyberwarfare attempts in Luxembourg | * Cyberwarfare attempts in Luxembourg | ||
** Luxembourgs economy relies on Banks, any major Infiltrations? | ** Luxembourgs economy relies on Banks, any major Infiltrations? | ||
| Line 60: | Line 61: | ||
* http://www.thedarkvisitor.com/ | * http://www.thedarkvisitor.com/ | ||
| + | |||
| + | ==== Post-Show resources ==== | ||
| + | * http://www.youtube.com/watch?v=3qHwkT_7Zgs | ||
Latest revision as of 21:52, 21 February 2010
<< back to the RadioShow page
LetzHack ep12 20100220 podcast.mp3
| | |
|---|---|
| Participants: | kwisatz, SteveClement |
| Recording: | 2010/02/18 06:00:00 PM |
| Broadcast: | 2010/02/20 01:00:00 PM |
| Podcast Release: | 2010/01/20 04:00:00 PM |
| Podcast: | File:LetzHack ep12 20100220 podcast.ogg |
| Tools | |
| Songs: | See list of all songs |
| QrCode: |
|
Structure
- Jingle
- Intro: Preview of today's show
- Review and Outlook: The Hacker Calendar, what Conventions and Events are upcoming?
- RadioShow12 (From 20 February 2010 13:00:00, Till 20 February 2010 14:00:00)
- LiLux Meeting 201002 (From 24 February 2010 20:00:00, Till 24 February 2010 22:00:00)
- OpenVPN (From 26 February 2010 02:00:00, Till 26 February 2010 03:00:00)
- AGFeb2010 (From 28 February 2010 15:00:00, Till 28 February 2010 17:00:00)
- RomLux: Hacking vs. Security (From 2 March 2010 18:30:00, Till 2 March 2010 21:30:00)
- FT: Hacking vs. Security (From 2 March 2010 18:30:00, Till 2 March 2010 21:00:00)
- … further results
- Hacker News
- Overview of todays show
- And explanation of the term Cyberwarfare
- Are you INN? Our first voices from the street attempt. (Inn'terViews (Part I))
| Song: Blitter Baiter | |
|---|---|
| Artist | StarPause |
| Title | Blitter Baiter |
| Duration | 03:41 |
| Album | Akid EP |
| License | |
| Description | |
| Artist's website | http://starpause.bandcamp.com/ |
- Inn'terViews (Part II)
- Operation Aurora (Intro)
| Song: The Day Time Ran Away | |
|---|---|
| Artist | Ozzed |
| Title | The Day Time Ran Away |
| Duration | 02:20 |
| Album | 8-bit Empire |
| License | |
| Description | |
| Artist's website | http://ozzed.net/ |
- Aurora, how it was done
- Google did not learn from the attempt and made an (too) early launch with Buzz
- Responsible launch of Products
- This and similar cyber-warfare threats
- Referent Objects & Threatening actors
- Titan Rain
- Moonlight Maze
- Ghostnet
- Estonia
- Georgia
- Iranian Cyber Army
| Song: Robo Ghost | |
|---|---|
| Artist | Cube-C |
| Title | Robo Ghost |
| Duration | 03:12 |
| Album | Chip-O-Lantern |
| License | |
| Description | |
| Artist's website | http://www.cube-c.ch.vu/ |
- Main entries into corporate networks, how it is currently done and what the Future could look like
- Hardware attacks, Snooping Firmware, Ethernet Chips that "leak", Company Branded USB Sticks
- Can (should) Legislation fix this?
- There are already Laws in Luxembourg (e-Commerce Law)
| Song: KangaROO | |
|---|---|
| Artist | Kangaroo MusiQue |
| Title | KangaROO |
| Duration | 02:47 |
| Album | The Alan Sugartrash Orchestra |
| License | |
| Description | |
| Artist's website | http://blog.kangaroo.cmo.de/ |
- Cyberwarfare attempts in Luxembourg
- Luxembourgs economy relies on Banks, any major Infiltrations?
- Who could defend or at least detect an attempt in Luxembourg?
- Cyber counter measures?
- Cyber Security Czar?
| Song: Mustard | |
|---|---|
| Artist | Saskrotch |
| Title | Mustard |
| Duration | 03:04 |
| Album | I'll have you naked by the end of this ROM |
| License | |
| Description | |
| Artist's website | http://www.myspace.com/saskrotch |
Sources / Guide to further reading
- http://www.wired.com/threatlevel/2010/01/operation-aurora/
- http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/index.html
- http://www.pcworld.com/article/187018/chinas_google_hack_shouldnt_surprise_anyone.html
- http://www.aolnews.com/world/article/chinese-hack-attack-targeted-google-and-other-us-firms/19317169
- http://www.wired.com/threatlevel/2010/01/hack-of-adob
- http://www.wired.com/threatlevel/2010/02/max-vision-sentencing/
- http://www.wired.com/threatlevel/2009/12/gonzalez-guilty-plea-heartland/
- http://www.wired.com/threatlevel/2010/02/sweden-probing-cisco-nasa-hacks/
- http://www.scmagazineus.com/russia-confirms-involvement-with-estonia-ddos-attacks/article/128737/
- http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
- http://www.pcworld.com/businesscenter/article/148675/georgia_presidents_web_site_falls_under_ddos_attack.html
- http://arstechnica.com/security/news/2008/08/georgia-cyberattacks-lead-to-questions-about-risk-to-us.ars
- http://asert.arbornetworks.com/2008/08/georgia-ddos-attacks-a-quick-summary-of-observations/
