Dissecting Of Non Malicious Artifacts One IP At A Time Dani Goland & Ido Naor

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=kl3BuEhEq9I



Duration: 16:16
0 views
0


BruCON - 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #BruCON

https://www.brucon.org/

BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Belgium, BruCON offers a high quality line up of speakers, security challenges and interesting workshops. BruCON is a conference by and for the security and hacker(*) community.

The conference tries to create bridges between the various actors active in computer security world, included but not limited to hackers(*), security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies, etc…..
BruCON is organized as a non-profit event by volunteers. A group of security enthusiasts decided that it was time for Belgium to have its own security and hacker conference. A lot of countries around the world have this kind of conferences to discuss and present research on computer security and related subject matters. We want to unite people who share the same passion and support the Belgian (research) communities, with BruCON as a yearly highlight. We are not professional organizers and started this as a non-profit organization. We all have full time jobs and dedicate a lot of our free time to this project. Everyone is welcome to join us and help!!
The term ‘hacker’ has been misrepresented in popular media for a long time: “Hacking has nothing to do with criminal activities such as identity theft and electronic trespassing! Rather, it [hacker] has been coined at the Massachusetts Institute of Technology (MIT) as a term for curious individuals for whom every device or piece of software is full of exciting challenges to develop potential improvements or discover alternative uses.”

“Anyone who remembers the childhood curiosity and excitement of taking apart radios and other devices to find out how they work is a good example of what is considered a hacker!”







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering