Search results
Page title matches
- ...um and Hoogewerf & Cie. organise an Awareness Raising Event relating to IT Security Questions.681 B (94 words) - 10:34, 17 February 2010
- |intro=Classic FirstTuesday on Hacking vs Security809 B (101 words) - 22:33, 12 March 2010
-
2 KB (255 words) - 14:05, 6 April 2012
Page text matches
- * 16:30 - [http://events.ccc.de/congress/2008/Fahrplan/events/3021.en.html Security Nightmares 2009]2 KB (241 words) - 13:01, 27 December 2008
- ====IT Security====8 KB (1,108 words) - 09:13, 6 March 2018
- |subtitle=100% hardcore technical security conference |description=HES is a 100% hardcore technical security conference. HES is unique by its continuous outstanding technical quality,816 B (111 words) - 15:38, 17 February 2012
- ...bourgian version of the Chaos Computer Club (CCC) a famous German based IT-Security movement, the Chaos Computer Club Luxembourg (C3L).3 KB (571 words) - 16:16, 30 September 2008
- |type=security |intro=Inter HackerSpace Security effort3 KB (413 words) - 13:33, 17 May 2010
- == Security == * [[Media:RomLux-FT-02032010 web.pdf|Presentation 'Physical Security']] held by [[User:SteveClement|Steve]] at [[FT:_Hacking_vs._Security]]2 KB (221 words) - 17:44, 6 March 2011
- == Security Fund ==4 KB (650 words) - 09:56, 17 September 2009
- ...volved to be applied to individuals, with or without skill, who break into security systems. .../docs/manuals/linux/RHL-9-Manual/security-guide/ch-risk.html RedHat Linux .Security Guide]6 KB (1,008 words) - 12:26, 26 June 2012
- |type=security1 KB (186 words) - 22:43, 18 March 2017
- |tagline=Security and Hacker Conference in Belgium784 B (104 words) - 11:14, 2 September 2010
- |tagline=International technology & security conference. Four days of technology, ideological debates and hands-on tinke338 B (40 words) - 15:40, 20 October 2011
- ...he '''required material is available'''. i.e. If you're planning to have a security zone, ask yourself: ** "What does such a security zone look like?" - Picture it!2 KB (389 words) - 21:33, 12 August 2009
- |topics=IT-Security, Hacktivism, GNU/Linux ...dable for every one who is interested in further studies in the area of IT-Security.2 KB (340 words) - 22:15, 10 February 2011
- * Cyber Security Czar? * http://arstechnica.com/security/news/2008/08/georgia-cyberattacks-lead-to-questions-about-risk-to-us.ars3 KB (388 words) - 20:52, 21 February 2010
- |tagline=Open Convention in Computer Security510 B (59 words) - 18:30, 23 July 2011
- * From where to get reliable information? (News, IT-Security, etc.) * Tools which are used by hackers && Security Papers and books about IT-Security --> splitted show9 KB (1,291 words) - 11:54, 15 July 2012
- |tagline=Security and Hacker Conference in Las Vegas, NV536 B (75 words) - 12:43, 14 November 2010
- |intro=PlumberCon is a unique hacker conference targeted at security researchers, system and network operators, application developers, hardware |tagline=PlumberCon 2009 will combine the knowledge of experienced security speakers, the crazyness of plumbing conclusions, and the fun of a small con1,020 B (129 words) - 13:44, 16 June 2010
- September. AT&T Corporate Information Security informed of Prophet's October. Bellcore Security informed of Prophet's action.9 KB (1,185 words) - 22:16, 27 September 2009
- |tagline=International IT Security Conference by hackers, for hackers - France432 B (53 words) - 10:56, 2 September 2010
- ...ing guests we aim to discuss the problems raised by intellectual property, security in the digital age and the development of our fundamental rights as a conse5 KB (672 words) - 21:15, 27 October 2014
- For security reasons it would be preferable to use low power lasers2 KB (327 words) - 12:37, 25 September 2011
- ...Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning</amazon> --[[User:Kwisatz|kwisatz]] * <amazon type="link" asin="0470068523">Security Engineering: A Guide to Building Dependable Distributed Systems</amazon> --8 KB (1,123 words) - 14:12, 2 September 2012
- |Skills=SQLi, web application security393 B (55 words) - 12:36, 14 September 2011
- |keywords=ccc, c3l, Security, Berlin, Chaos, Communication, Congress, Camp791 B (116 words) - 14:25, 3 September 2012
- * [[Allows value::security]]334 B (43 words) - 21:04, 28 November 2011
- ...lness (for that a visit to nearby Les Themes is better) but rather for the security resons when handling dangerous substances (e.g. during PCB etching). ; Infrared security cameras9 KB (1,302 words) - 18:33, 16 November 2013
- '''Security''': WPA2 Enterprise<br>8 KB (1,196 words) - 19:56, 3 September 2016
- |tagline=Security and Hacker Conference in Las Vegas, NV560 B (73 words) - 12:44, 4 May 2010
- ...um and Hoogewerf & Cie. organise an Awareness Raising Event relating to IT Security Questions.681 B (94 words) - 10:34, 17 February 2010
- |intro=hardcore hacking & computer security conference ...change ideas and have some fun in a more relaxed setting than at the usual security conferences.933 B (141 words) - 20:10, 12 March 2010
- |intro=BruCON is an annual security and hacker conference providing two days of an interesting atmosphere for o568 B (71 words) - 11:43, 24 September 2010
- |intro=Hack In The Box Security Conference 2010 – Amsterdam458 B (52 words) - 11:52, 4 May 2010
- * IPv4 in more detail, especially the security of it and the security on the different layers621 B (95 words) - 16:46, 16 January 2010
- Kereoz is a PhD student in computer security. He is passionate with arts,19 KB (2,990 words) - 12:32, 14 November 2010
- I'm mostly interested in Reverse Engineering, IT-Security and hacking (tinkering) with electrical things.535 B (92 words) - 16:08, 14 March 2010
- |intro=Classic FirstTuesday on Hacking vs Security809 B (101 words) - 22:33, 12 March 2010
- * Should we have a list for events only? Or security? * Well there is a list for security already.11 KB (1,738 words) - 09:02, 17 February 2016
- * Computer Security Incident Response and Mitigation5 KB (787 words) - 15:19, 13 August 2012
- ... toward providing innovating knowledge on tech/IT related fields including security, networks, programming, privacy, new (open) technologies, ethics and hackin795 B (105 words) - 13:43, 23 April 2010
- ...owth prospects. An internationally acclaimed expert will highlight the key security, trust and privacy challenges and perspectives for the Future Internet. ... engines that take into account media, location and context as well as new security and privacy paradigms. This session calls on renowned experts who will addr3 KB (493 words) - 09:33, 30 May 2010
- ...r this website from its box, installed an operating system, patched it for security, made sure the power and air conditioning was working in the server room, m ...o guard against disaster both human and otherwise, holds the gates against security threats and crackers, and keeps the printers going no matter how many copie3 KB (536 words) - 10:01, 28 July 2010
- |intro=Business Association Luxembourg-Russie A.S.B.L. and Security made in Lëtzebuerg (SMILE) of the Luxembourg Ministry of the Economy and F2 KB (258 words) - 10:08, 16 September 2010
- ... is an open convention /conference where people can discuss about computer security, privacy, IT and its cultural/technical implication on society. ...the convention is to : make a bridge of the various actors in the computer security world. The conference takes place at Parc Hotel Alvisse in Luxembourg the 2893 B (126 words) - 01:09, 30 October 2010
File:QR-c788e251ca64f270e29b36eb71cac5cc.png ...2010 21:24:04 +0200 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(132 × 132 (366 B)) - 19:24, 25 September 2010File:QR-1a013e5e2f8a5de2cb122472d38b7201.png ...Sep 2010 22:42:04 +0200 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (360 B)) - 20:42, 25 September 2010- * Maintain tight security with regular reviews2 KB (341 words) - 12:53, 11 July 2017
File:QR-f89134a3164f6e2ffaea6b525ef7f5d4.png ...Oct 2010 19:03:50 +0200 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (368 B)) - 17:03, 14 October 2010File:QR-fcc440f47e0b536bae750e093fdeaa6b.png ...2010 19:04:25 +0200 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(132 × 132 (371 B)) - 17:04, 14 October 2010File:QR-de1aab9a21fb1168f30655191477481e.png ...Oct 2010 12:25:48 +0200 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (374 B)) - 10:25, 16 October 2010File:QR-024065d0626c1e3948c5645849fd0399.png ...2010 10:31:33 +0200 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(132 × 132 (362 B)) - 08:31, 18 October 2010- ...g the h4x0roam network profile. This should provide an acceptable level of security even on computers which do not have an encrypted hard drive (for example du SECURITY='wpa-config'4 KB (677 words) - 16:26, 20 May 2012
File:QR-6c888b6346fee81a2744c2fc3657206c.png ...2010 13:40:42 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(132 × 132 (372 B)) - 12:40, 8 November 2010File:QR-b177507e3837e237acf1fe86fe040988.png ...Dec 2010 01:54:38 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (370 B)) - 00:54, 10 December 2010File:QR-f873b50340c66348cd634380095746a9.png ...2011 02:24:20 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(132 × 132 (360 B)) - 01:24, 4 January 2011File:QR-b73a5bade55e5253c57a36cdd53bfe2a.png ...Jan 2011 03:03:18 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (367 B)) - 02:03, 4 January 2011File:QR-59063581d925e32e052c0ae472948ffe.png ...2011 20:53:24 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(132 × 132 (368 B)) - 19:53, 11 January 2011File:QR-c78cbce0fe05a10d740d3884c9b26e3d.png ...Jan 2011 21:00:29 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (368 B)) - 20:00, 11 January 2011- |keywords=chaos, security263 B (35 words) - 08:04, 17 March 2017
- ...ox Add-On for rating website of their trustworthy, reliability and general security.1 KB (156 words) - 16:17, 19 March 2012
- ...st available revolutions will be unveiled: social networks, mobile trends, security, applications, data centers, e-commerce… And the upcoming ICT topics will2 KB (267 words) - 14:05, 6 April 2012
- * '''Bluetooth''' is almost as bad as rfid in terms of security. (And how do you get the code onto your phone in the first place if it isn'780 B (147 words) - 19:24, 23 May 2011
- * Discuss further handling of security@lists.hackerspace.lu and the mallory project. ==== security@lists.hackerspace.lu ====15 KB (2,187 words) - 13:48, 27 December 2011
File:QR-08d6b7c561e5eda37b59bff2d4788db7.png ...6 Jun 2011 16:16:15 +0200 by the QrCode Extension for page [[Communication Security]].(132 × 132 (371 B)) - 14:16, 26 June 2011File:QR-f14b3ee5001efaf414131ec7561defb6.png ...6 Jun 2011 16:19:11 +0200 by the QrCode Extension for page [[Communication Security]].(132 × 132 (356 B)) - 14:19, 26 June 2011File:QR-5a8c58efeca16f20cc3f33a2ce8e4455.png ...9 Jun 2011 10:19:53 +0200 by the QrCode Extension for page [[Communication Security]].(132 × 132 (366 B)) - 08:19, 29 June 2011- ...open for all convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on |intro=Hack.lu is an open conference where people can discuss about computer security, privacy, IT and its impact on society.1 KB (189 words) - 16:05, 25 September 2011
- |intro=Brussels, Belgium. BruCON is an annual security conference providing two days of an interesting atmosphere for open disc ...hallenges and interesting workshops. BruCON is a conference by and for the security and hacker(*) community.2 KB (252 words) - 20:08, 3 July 2011
File:QR-b9162a71eff4c8b6821af889c4268bca.png ...4 Jul 2011 08:12:05 +0200 by the QrCode Extension for page [[Communication Security]].(132 × 132 (363 B)) - 06:12, 4 July 2011File:QR-75bb0c08f484ff583771df99cf4eb4c3.png ...2011 21:56:43 +0200 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(132 × 132 (371 B)) - 19:56, 6 July 2011- ...ertificate, or you just click on "Get certificate" and confirm by "Confirm Security Exception", please ensure that the "Permanently store this exception" is en2 KB (257 words) - 14:46, 24 June 2012
- |keywords=OpenVPN, VPN, Tunnel, OpenSSL, SSL, Networking, Security, Encryption2 KB (321 words) - 21:48, 26 February 2012
- |keywords=ccc, camp, chaos, security ...nts.ccc.de/camp/2011/Fahrplan/events/4439.en.html Machine-to-machine (M2M) security] - 21h002 KB (316 words) - 09:35, 13 August 2011
File:QR-e3f48ae7234513c58d698b3d658e1472.png ...3 Nov 2011 18:31:48 +0100 by the QrCode Extension for page [[Communication Security]].(132 × 132 (362 B)) - 17:31, 3 November 2011File:QR-420c2773105dd98ad611ee1da7504c22.png ...Nov 2011 04:12:04 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (371 B)) - 03:12, 4 November 2011File:QR-a48c744d6ac1dc254c6ace5d39b74a00.png ...2011 12:55:53 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(148 × 148 (429 B)) - 11:55, 5 November 2011File:QR-ce31fd4b58aa4a02d9ec5cf3a6d4a8e7.png ...2011 17:06:13 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].(132 × 132 (360 B)) - 16:06, 7 November 2011File:QR-4368f413c3926f1dfa24efa0ea24389c.png ...8 Nov 2011 03:46:44 +0100 by the QrCode Extension for page [[Communication Security]].(132 × 132 (373 B)) - 02:46, 8 November 2011File:QR-a977d30fad6e18a77effb696778e1817.png ...Nov 2011 08:05:21 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (379 B)) - 07:05, 10 November 2011File:QR-326f61487fe5afd6a872ca3bd4a60ad3.png ...Nov 2011 21:04:26 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].(132 × 132 (366 B)) - 20:04, 11 November 2011- |type=security969 B (168 words) - 06:25, 24 August 2017
File:QR-a9738af0c66d50d9e0590d47e6a44145.png ...8 Nov 2011 19:20:25 +0100 by the QrCode Extension for page [[Communication Security]].(132 × 132 (366 B)) - 18:20, 28 November 2011- |keywords=ccc, c3l, Security, Berlin, Chaos, Communication, Congress2 KB (277 words) - 18:33, 10 March 2012
- * Don't encrypt mails on a mailing lists. (What about security issues?)62 KB (9,953 words) - 13:47, 27 December 2011
- * security: starttls * security: starttls1 KB (162 words) - 22:39, 18 March 2017
- ...s and media, disruptive technologies, with a special highlight on trust in security."647 B (89 words) - 21:37, 8 March 2012
- * at the cache people can put donation in box. For security, go back and recover the money from box.4 KB (642 words) - 15:03, 28 April 2012
File:LetzHack ep66 20120428 podcast.mp3 [[Has Topic::IT Security]](38.52 MB) - 21:00, 12 May 2012File:LetzHack ep66 20120428 podcast.ogg [[Has Topic::IT Security]](40.3 MB) - 21:00, 12 May 2012- |subtitle=IT Security Event |description=CONFidence is an annual IT security conference that will take place on 23-24th May, 2012 in Krakow, Poland for656 B (92 words) - 19:29, 20 May 2012
- * There was the idea to do a workshop at the conference, if possible not IT security related but more hands on.9 KB (1,444 words) - 10:31, 19 August 2012
- | 2012-03-19 || SMILE SECURITY MADE IN LETZEBUERG"" || Events: Haxogreen: Haxogreen sponsoring || 1536.028 KB (3,117 words) - 16:49, 3 January 2013
- ...open for all convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on ...f the convention is to make a bridge of the various actors in the computer security world. The conference takes place at Parc Hotel Alvisse in Luxembourg the 2900 B (129 words) - 17:07, 21 October 2012
- ** is about security awareness. Not really our domain.2 KB (257 words) - 20:04, 16 February 2013
- * maybe do some demos of security stuff4 KB (607 words) - 19:22, 21 September 2013
- 3) driving security staff nuts893 B (124 words) - 17:34, 21 January 2013
- Security Security15 KB (1,880 words) - 17:15, 12 May 2013
- ...u keep exclusively all processing internal to your scripting language, the security level is about the same. =Base security=3 KB (568 words) - 21:12, 2 January 2015
- ...e currently running Science Festival and some impressions from the hack.lu security conference655 B (70 words) - 14:55, 8 December 2013
- main themes are: browser based security, alternatives to icloud, etc will also incluse a talk about web security2 KB (385 words) - 17:37, 12 November 2014