RadioShow12
From syn2cat - HackerSpace.lu
(Difference between revisions)
m |
m (→Sources / Guide to further reading) |
||
(One intermediate revision by one user not shown) | |||
Line 4: | Line 4: | ||
|recording=2010/02/18 06:00:00 PM | |recording=2010/02/18 06:00:00 PM | ||
|broadcast=2010/02/20 01:00:00 PM | |broadcast=2010/02/20 01:00:00 PM | ||
− | |podcastrelease=2010/01/20 | + | |podcastrelease=2010/01/20 04:00:00 PM |
+ | |podcast=LetzHack ep12 20100220 podcast.ogg | ||
+ | |podcastmp3=LetzHack ep12 20100220 podcast.mp3 | ||
}} | }} | ||
− | |||
* Overview of todays show | * Overview of todays show | ||
* And explanation of the term Cyberwarfare | * And explanation of the term Cyberwarfare | ||
Line 60: | Line 61: | ||
* http://www.thedarkvisitor.com/ | * http://www.thedarkvisitor.com/ | ||
+ | |||
+ | ==== Post-Show resources ==== | ||
+ | * http://www.youtube.com/watch?v=3qHwkT_7Zgs |
Latest revision as of 21:52, 21 February 2010
<< back to the RadioShow page
LetzHack ep12 20100220 podcast.mp3
Cyberwarfare and Inn'terviews | |
---|---|
Participants: | kwisatz, SteveClement |
Recording: | 2010/02/18 06:00:00 PM |
Broadcast: | 2010/02/20 01:00:00 PM |
Podcast Release: | 2010/01/20 04:00:00 PM |
Podcast: | File:LetzHack ep12 20100220 podcast.ogg |
Tools | |
Songs: | See list of all songs |
QrCode: |
Structure
- Jingle
- Intro: Preview of today's show
- Review and Outlook: The Hacker Calendar, what Conventions and Events are upcoming?
- RadioShow12 (From 20 February 2010 13:00:00, Till 20 February 2010 14:00:00)
- LiLux Meeting 201002 (From 24 February 2010 20:00:00, Till 24 February 2010 22:00:00)
- OpenVPN (From 26 February 2010 02:00:00, Till 26 February 2010 03:00:00)
- AGFeb2010 (From 28 February 2010 15:00:00, Till 28 February 2010 17:00:00)
- FT: Hacking vs. Security (From 2 March 2010 18:30:00, Till 2 March 2010 21:00:00)
- RomLux: Hacking vs. Security (From 2 March 2010 18:30:00, Till 2 March 2010 21:30:00)
- … further results
- Hacker News
- Overview of todays show
- And explanation of the term Cyberwarfare
- Are you INN? Our first voices from the street attempt. (Inn'terViews (Part I))
Song: Blitter Baiter | |
---|---|
Artist | StarPause |
Title | Blitter Baiter |
Duration | 03:41 |
Album | Akid EP |
License | |
Description | |
Artist's website | http://starpause.bandcamp.com/ |
- Inn'terViews (Part II)
- Operation Aurora (Intro)
Song: The Day Time Ran Away | |
---|---|
Artist | Ozzed |
Title | The Day Time Ran Away |
Duration | 02:20 |
Album | 8-bit Empire |
License | |
Description | |
Artist's website | http://ozzed.net/ |
- Aurora, how it was done
- Google did not learn from the attempt and made an (too) early launch with Buzz
- Responsible launch of Products
- This and similar cyber-warfare threats
- Referent Objects & Threatening actors
- Titan Rain
- Moonlight Maze
- Ghostnet
- Estonia
- Georgia
- Iranian Cyber Army
Song: Robo Ghost | |
---|---|
Artist | Cube-C |
Title | Robo Ghost |
Duration | 03:12 |
Album | Chip-O-Lantern |
License | |
Description | |
Artist's website | http://www.cube-c.ch.vu/ |
- Main entries into corporate networks, how it is currently done and what the Future could look like
- Hardware attacks, Snooping Firmware, Ethernet Chips that "leak", Company Branded USB Sticks
- Can (should) Legislation fix this?
- There are already Laws in Luxembourg (e-Commerce Law)
Song: KangaROO | |
---|---|
Artist | Kangaroo MusiQue |
Title | KangaROO |
Duration | 02:47 |
Album | The Alan Sugartrash Orchestra |
License | |
Description | |
Artist's website | http://blog.kangaroo.cmo.de/ |
- Cyberwarfare attempts in Luxembourg
- Luxembourgs economy relies on Banks, any major Infiltrations?
- Who could defend or at least detect an attempt in Luxembourg?
- Cyber counter measures?
- Cyber Security Czar?
Song: Mustard | |
---|---|
Artist | Saskrotch |
Title | Mustard |
Duration | 03:04 |
Album | I'll have you naked by the end of this ROM |
License | |
Description | |
Artist's website | http://www.myspace.com/saskrotch |
Sources / Guide to further reading
- http://www.wired.com/threatlevel/2010/01/operation-aurora/
- http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/index.html
- http://www.pcworld.com/article/187018/chinas_google_hack_shouldnt_surprise_anyone.html
- http://www.aolnews.com/world/article/chinese-hack-attack-targeted-google-and-other-us-firms/19317169
- http://www.wired.com/threatlevel/2010/01/hack-of-adob
- http://www.wired.com/threatlevel/2010/02/max-vision-sentencing/
- http://www.wired.com/threatlevel/2009/12/gonzalez-guilty-plea-heartland/
- http://www.wired.com/threatlevel/2010/02/sweden-probing-cisco-nasa-hacks/
- http://www.scmagazineus.com/russia-confirms-involvement-with-estonia-ddos-attacks/article/128737/
- http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
- http://www.pcworld.com/businesscenter/article/148675/georgia_presidents_web_site_falls_under_ddos_attack.html
- http://arstechnica.com/security/news/2008/08/georgia-cyberattacks-lead-to-questions-about-risk-to-us.ars
- http://asert.arbornetworks.com/2008/08/georgia-ddos-attacks-a-quick-summary-of-observations/