Episode247

From Security Weekly Wiki
Revision as of 02:11, 9 June 2011 by Mikep (talk | contribs)
Jump to navigationJump to search


Announcements

PaulDotCom Security Weekly - Episode 247 for Thursday June 9th, 2011.

  • El primer Episodio de PaulDotCom Espanol esta disponible aqui. Tenemos mas entrevistas en las semanas que vienen....
  • Sign up for Blackhat Training Courses:
    • PaulDotCom Blackhat Training Sign up for "Offensive Countermeasures: Making Defense Sexy" as a two-day course at Blackhat July 30-31. Every student gets a FREE "Hack Naked" t-shirt and sticker!
    • Tenable Security Blackhat Training Sign up for "Advanced Vulnerability Scanning Techniques Using Nessus" July 30-31 or August 1-2

Special Preview of Code 2600

7:30 PM

Directed by Jeremy Zerechak, Code2600 is billed as "the story of the rise of communication and computer technology in the United States as told through the events and people who helped to build and manipulate it. "Code 2600" is an exploration of the struggle to protect the complex information networks that have shaped our way of life from those who could potentially send the card house crashing down. It is a criminal and philosophical journey through the human integration of the world with our World, The Internet."

  1. What were your motives in making this film?
  2. Did you come away with any fresh insight as to how fragile the Internet really is? Or do you think the Internet is more resilient now than ever?
  3. What do you think will be more successful in keeping the Internet safe: Legislation or Technical controls?
  4. After making this film, do you think the Internet would be better protected by having the U.S. cede more control of the Internet and its maintenance over to outside countries?
  5. What do you think of the recent Anonymous attacks on Sony and Amazon?
  6. What scene did you wish you could have kept but had to cut?
  7. Where will this be premiering?
  8. How tough was it to get folks to be interviewed on camera for the film?
  9. Where was the film shot?
  10. Do you have any hacking experience? Did any of the interviewed folks offer to give you a demo?
  11. What other projects are you considering turning your attention to?

Guest Tech Segment: Tim Tomes on [ttp://lanmaster53.com/2011/06/search-engine-domain-transfer-gxfr/ GXFR], the Search Engine Based Domain Transfer Tool

Tim's a Captain and former Red Team leader for the Army, principle developer and maintainer of the Army's first Network Defense course, and adviser to the Army Cyber Leader College. Tim is also the author of GXFR and is on to give us a special tech segment on his Search Engine Based Domain Transfer Tool.

Tim's Blog


Stories For Discussion

PaulDotCom Blog Roundup

Larry's Stories

Paul's Stories

Darren' Stories

  1. 1 in 4 hackers are informants... Report that the FBI and US Secret service have created quite a army of informants that has led to a web of distrust and deceit in the underground black hat world. And when can we get some hacker images that don't have a CRT monitor in them... I haven't seen a CRT monitor actually in use for real since 1998