Editing Pwn Your Own

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
== Pwn Your Own ==
== Pwn Your Own ==
Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass countermeasures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little today's tech users are concerned about security. The lecture is followed by an explanation of how to better protect oneself from an attack. Following the live demo will be a workshop on how to perform an attack to give participants a better understanding of how process works.<br><br>
Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass counter measures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little today's tech users are concerned about security. The lecture is followed by an explanation of how to better protect oneself from an attack. following the live demo will be a workshop on how to perform an attack to give participants a better understanding of how process works.<br><br>


== About the Speaker ==
== About the Speaker ==
Please note that all contributions to Noisebridge are considered to be released under the Creative Commons Attribution-NonCommercial-ShareAlike (see Noisebridge:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)