Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
My summer has been packed with security conferences. All of them have been great — I find I can learn something at every one that I attend. I saved the best for last and went to DEFCON 14 in Las Vegas (August 4-6). There was no way to attend all the sessions that I wanted (I would have to clone myself), but luckily all participants walk away with a CD full of the presentations so you can catch up with the ones you canýt attend.
DEFCON is one of the oldest and largest hacking conventions. Itýs essentially 3 days of great information about the latest and greatest in security, sans the vendor stuff (a big plus for me!). There are all kinds of competitions to test your hacking skills, including lock picking, building robots, capture the flag, and coffee wars. There's something for everyone.
I like to see the latest tools and vulnerabilities and find new things to worry about at work (and home). This year, not only were there plenty of great talks that dealt with the latest trends in cyber crime and privacy (lack thereof, really), there were numerous talks about tools that can be used for penetration or general security testing. This month, I'll introduce my favorites and, in the coming months, I will test the tools and share my experiences with how they really work.
I'll begin with Afterglow, by Raffael Marty.