RadioShow12
From syn2cat - HackerSpace.lu
<< back to the RadioShow page
n/a
Cyberwarfare and Inn'terviews | |
---|---|
Participants: | kwisatz, SteveClement, annemannen |
Recording: | 2010/02/18 06:00:00 PM |
Broadcast: | 2010/02/20 01:00:00 PM |
Podcast Release: | 2010/01/20 02:00:00 PM |
Podcast: | n/a |
Tools | |
Songs: | See list of all songs |
QrCode: |
Structure
- Jingle
- Intro: Preview of today's show
- Review and Outlook: The Hacker Calendar, what Conventions and Events are upcoming?
- RadioShow12 (From 20 February 2010 13:00:00, Till 20 February 2010 14:00:00)
- LiLux Meeting 201002 (From 24 February 2010 20:00:00, Till 24 February 2010 22:00:00)
- OpenVPN (From 26 February 2010 02:00:00, Till 26 February 2010 03:00:00)
- AGFeb2010 (From 28 February 2010 15:00:00, Till 28 February 2010 17:00:00)
- RomLux: Hacking vs. Security (From 2 March 2010 18:30:00, Till 2 March 2010 21:30:00)
- FT: Hacking vs. Security (From 2 March 2010 18:30:00, Till 2 March 2010 21:00:00)
- … further results
- Hacker News
- Overview
- Inn'terViews (Part I)
Song: Blitter Baiter | |
---|---|
Artist | StarPause |
Title | Blitter Baiter |
Duration | 03:41 |
Album | Akid EP |
License | |
Description | |
Artist's website |
- Inn'terViews (Part II)
Song: Mustard | |
---|---|
Artist | Saskrotch |
Title | Mustard |
Duration | 3:04 |
Album | I'll have you naked by the end of this ROM |
License | |
Description | |
Artist's website |
- Operation Aurora (Intro)
Song: The Day Time Ran Away | |
---|---|
Artist | Ozzed |
Title | The Day Time Ran Away |
Duration | 02:20 |
Album | 8-bit Empire |
License | |
Description | |
Artist's website |
- Aurora, how it was done
Song: | |
---|---|
Artist | |
Title | |
Duration | |
Album | |
License | |
Description | |
Artist's website |
- This and similar cyber-warfare threats
- Referent Objects & Threatening actors
- Titan Rain
- Moonlight Maze
- Estonia
- Georgia
Song: | |
---|---|
Artist | |
Title | |
Duration | |
Album | |
License | |
Description | |
Artist's website |
- Main entries into corporate networks, how it is currently done and what the Future could look like
Sources / Guide to further reading
- http://www.wired.com/threatlevel/2010/01/operation-aurora/
- http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/index.html
- http://www.pcworld.com/article/187018/chinas_google_hack_shouldnt_surprise_anyone.html
- http://www.aolnews.com/world/article/chinese-hack-attack-targeted-google-and-other-us-firms/19317169
- http://www.wired.com/threatlevel/2010/01/hack-of-adob
- http://www.wired.com/threatlevel/2010/02/max-vision-sentencing/
- http://www.wired.com/threatlevel/2009/12/gonzalez-guilty-plea-heartland/
- http://www.wired.com/threatlevel/2010/02/sweden-probing-cisco-nasa-hacks/
- http://www.scmagazineus.com/russia-confirms-involvement-with-estonia-ddos-attacks/article/128737/
- http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
- http://www.pcworld.com/businesscenter/article/148675/georgia_presidents_web_site_falls_under_ddos_attack.html
- http://arstechnica.com/security/news/2008/08/georgia-cyberattacks-lead-to-questions-about-risk-to-us.ars
- http://asert.arbornetworks.com/2008/08/georgia-ddos-attacks-a-quick-summary-of-observations/