All of the devices ended up being disabled without showing they had been tampered with. Another fundraiser for the EFF was the firearm-training simulator. For some reason, hackers seem to love guns, and the simulator was a popular attraction at the convention. A number of relatively ancient computers were on display in the Old School Computing room.
The best part was that all the computers were working, and attendees were encouraged to log in and play around. The Lockpicking Village gave attendees a chance to improve their lockpicking skills. The village also hosted timed lockpicking challenges. The vendor area sold a wide array of goods. Everything from computers to lock picks to clothing — including these password-protected undergarments — was available.
Dozens of high-security locks were available for picking in the Lockpicking Village. Mystery Challenge organizer Lost gets a custom upgrade to his hat while waiting for the closing ceremony to begin.
DefCon admin Lockheed gives details of network usage during the DefCon closing ceremony. Posted in: Bad Sites. HOME ». Security Predictions for Business Process Compromise. Popular Posts Sorry. No data so far. Start on. Show related SlideShares at end. WordPress Shortcode. Next SlideShares. Download Now Download to read offline and view in fullscreen. Download Now Download Download to read offline. Chema Alonso Follow. Security Professional. Tutorial de-foca. Libro de Seguridad en Redes.
CyberCamp Low Hanging Fruit. Seguridad en Navegadores. Default Passwords: Adelante por favor. Related Books Free with a 30 day trial from Scribd. Related Audiobooks Free with a 30 day trial from Scribd. Daniela Rocha. Show More. Views Total views. Actions Shares. No notes for slide. Defcon FOCA 2 1. FOCA 2. What our FOCA is not 3.
0コメント