Editing Pwn Your Own
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
== Pwn Your Own == | == Pwn Your Own == | ||
Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass | Every day we engage in activities online that are a danger to our privacy and even the security of our valuable or private information. In 2008 vice presidential candidate Sarah Palin's personal email was hacked using information publicly available online. Closer to home, every day tech savvy computer users grant themselves access to restricted internet access points owned by nabbers and local businesses. PYO is designed to help attendees become aware of tricks of the trade used by professionals to gain access to "secure information" and quickly bypass counter measures that the average individual or small business owner will put in place. This meeting will consist of a lecture and live demo of potentially malicious and in some cases semi-illegal (not in our context) practices showing just how little today's tech users are concerned about security. The lecture is followed by an explanation of how to better protect oneself from an attack. following the live demo will be a workshop on how to perform an attack to give participants a better understanding of how process works.<br><br> | ||
== About the Speaker == | == About the Speaker == |