21C3 - 21st Chaos Communication Congress - "The Usual Suspects"

Item set

Title
21C3 - 21st Chaos Communication Congress - "The Usual Suspects"
Veranstaltungsort
Berlin
Veranstaltungsdaten
December 27, 2004
December 28, 2004
December 29, 2004
Administrative Überordnung der Konferenz oder der Veranstaltung
Chaos Computer Club Veranstaltungsgesellschaft mbH
Vorherige Konferenz oder Veranstaltung
20C3 - 20th Chaos Communication Congress - "Not a Number"
Tag
conference
congress
Identifier
ark:/45490/bIizkL

Items

of 4
61–90 of 116
Advanced search
  • Sicherheit bei VoIP-Systemen, eine Einführung
    Der Vortrag beschäftigt sich mit Sicherheit von VoIP, einem Stiefkind der Entwicklung rund um diese neue Killerapplikation. Es wird versucht, einen Überblick über bestehende Produkte und Lösungen zu geben und aufzuzeigen, welche Sicherheit heute (noch nicht) geboten wird. Neben der Betrachtung der Protokolle SIP, IAX, H.323 und SCCP folgt auch ein Überblick über ausgewählte Produkte mit hoher Marktdurchdringung (Cisco CallManager, Asterisk...)about this event: http://www.ccc.de/congress/2004/fahrplan/event/15.en.html
  • Anti-Honeypot Technology
    Current Honeypot-based tools have a huge disadvantage: Attackers can detect honeypots with simple techniques and are to some extent also able to circumvent and disable the logging mechanisms. On the basis of some examples, we will show methods for attackers to play with honeypots.about this event: http://www.ccc.de/congress/2004/fahrplan/event/109.en.html
  • Lightning Talks: Day 2
    Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.about this event: http://www.ccc.de/congress/2004/fahrplan/event/157.en.html
  • Lightning Talks: Day 1
    Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.about this event: http://www.ccc.de/congress/2004/fahrplan/event/142.en.html
  • Fight for your Right to Fileshare
    Current copyright law has only one answer to p2p filesharers: sue them. A much better model not only for users but for authors as well, is to permit what can‘t be prevented anyway, and in turn collect a flat levy on Internet access. Thus, the Content Flatrate achieves compensation for creators without control of users.about this event: http://www.ccc.de/congress/2004/fahrplan/event/315.en.html
  • The Incomputable Alan Turing
    Live-Performance der Hörspielwerkstatt der Humboldt-Universität Berlin about this event: http://www.ccc.de/congress/2004/fahrplan/event/215.en.html
  • Portable Software-Installation with pkgsrc
    Have you tried installing a certain package on (say) Linux, Solaris, MacOS X, MS Windows and NetBSD at the same time? The pkgsrc system allows doing so by a simple "make install" instead of knowing lots of details.about this event: http://www.ccc.de/congress/2004/fahrplan/event/98.en.html
  • Einführung in kryptographische Methoden
    Kryptographie ist z. Zt. das wohl einzige Mittel um zuverlässig die Privatsphäre zu schätzen oder die Integrität von Daten sicherzustellen. Kryptographische Methoden sind außerdem auch hervorragende Mittel um Rechnersysteme vor Manipulation und Einbruch zu schützen bzw. diesen nachzuweisen. Dieser Vortrag soll eine Einführung in grundlegende Methoden bieten und richtet sich an absolute Einsteiger und setzt keine weiteren Kenntnisse voraus.
  • How To Herd Cats
    Despite the hacker ethic of free information real life frameworks for constructive dialogue are sadly lacking. Interestingly a number of systems, from socratic dialogue to parliamentary procedure already exist for structuring conversation toward a goal. In this talk we will look at hacker workgroups from open source developers to CTF teams and look at what solutions have been tried, and what tools have been developed. Also, this topic lends itself to analysis of common hacker roles and social structures that define and impede growth and development within the community.about this event: http://www.ccc.de/congress/2004/fahrplan/event/133.en.html
  • Lightning Talks: Day 2
    Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.about this event: http://www.ccc.de/congress/2004/fahrplan/event/157.en.html
  • Lightning Talks: Introducing Meshdisk single floppy Linux
    Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.about this event: http://www.ccc.de/congress/2004/fahrplan/event/250.en.html
  • Hacking EU funding for a FOSS project
    FOSS culture hacks^h^h^h^h meets the EU buerocracy. It is not easy for FOSS projects to get $$$ funding by the European Union. We'll look and discuss how it played out for the PyPy project, a language project targetting itself with a "Münchhausen" approach. We'll try to see why it took the project - tackling deeply technical issues - one year to communicate "correctly" with the European Union.about this event: http://www.ccc.de/congress/2004/fahrplan/event/62.en.html
  • Closing Event
    The final get-together looking back at three days of genuine hacking experience at bcc. 21C3 tried to reinvent the Congress in a couple of ways. Did we succeed? Could we do better? Of course we can, but looking ahead to 22C3 should bring us finally on the road to a true international event that serves the community as one of the best and funniest events on this planet.about this event: http://www.ccc.de/congress/2004/fahrplan/event/173.en.html
  • MD5 To Be Considered Harmful Someday
    Joux and Wang’s multicollision attack has yielded collisions for several one-way hash algorithms. Of these, MD5 is the most problematic due to its heavy deployment, but there exists a perception that the flaws identified have no applied implications. We show that the appendability of Merkle-Damgard allows us to add any payload to the proof-of-concept hashes released by Wang et al.about this event: http://www.ccc.de/congress/2004/fahrplan/event/308.en.html
  • Enforcing the GNU GPL
    Linux is used more and more, especially in the embedded market. Unfortunately, a number of vendors do not comply with the GNU GPL. The author has enforced the GPL numerous times in and out of court, and will talk about his experience.about this event: http://www.ccc.de/congress/2004/fahrplan/event/53.en.html
  • GameCube Hacking
    The GameCube - what it is made of and how it can be hacked. We'll describe different approachs of getting own code onto the GameCube and things that you can do with a GameCube under your control. Of course it runs Linux.about this event: http://www.ccc.de/congress/2004/fahrplan/event/208.en.html
  • The Kernel Accelerator Device
    KAD is an interdisciplinary development project which consists of kernel driver programming, fpga programming (VHDL/Verilog) and hardware development. There is no working KAD at the moment, but our aim is to develop such a device under the GPL with much support from everyone who likes to do so. The development will be carried out from bottom up by integrating existing components into the kad.about this event: http://www.ccc.de/congress/2004/fahrplan/event/111.en.html
  • Bluetooth Hacking
    Bluesnarfing, bluebugging and backdooring have been in the spotlight for over a year now, and, finally, the mobile phone industry have reacted and are issuing fixes for these very serious problems. Accordingly, the time has come for full disclosure...about this event: http://www.ccc.de/congress/2004/fahrplan/event/66.en.html
  • How to find *anything* on the Web
    Participants will be trained to become good "seekers". Techniques and tricks used for efficiently searching through the world wide web will be taught and search engines will be reviewed; in short: the hacker's approach to searching.about this event: http://www.ccc.de/congress/2004/fahrplan/event/158.en.html
  • Protesting in the new Millenium
    Emmanuel Goldstein describes the changing times in the United States. While hackers were always looked upon with suspicion, they are now seen as a very definite threat on the order of terrorists. Add activism into the mix and there's no end to the potential for trouble.about this event: http://www.ccc.de/congress/2004/fahrplan/event/138.en.html
  • Lightning Talks: Day 2
    Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.about this event: http://www.ccc.de/congress/2004/fahrplan/event/157.en.html
  • XMPP/Jabber
    XMPP is a free, next-generation, feature rich instant messaging architecture and protocol, which perhaps cat put an end to the great IM war between propritary protocols. This talk introduces the basic protocol concepts (bidirectional XML streams, transports/gateways to other IM-networks), the general XMPP network architecture and features like GPG end-to-end encryption will be demonstrated.about this event: http://www.ccc.de/congress/2004/fahrplan/event/101.en.html
  • Recent features to OpenBSD: ntpd and bgpd
    The talk will introduce some of the recent changes in the OpenBSD operating system, namely the introduction of bgpd, a free BGP implementation and OpenNTPD, a free NTP implementation. Using those concrete examples, Henning Brauer will point out important DOs and DONTs for writing scalable and secure network daemons.about this event: http://www.ccc.de/congress/2004/fahrplan/event/51.en.html
  • c3 - the network equipment delivery
    about this event: http://ccc.de
  • 21C3-trailer
    about this event: http://ccc.de
  • GNOME Anwendungsentwicklung
    Svens Vortrag steigt sehr schnell in die Interna von GObject, dem Objekt-Orientierungs-Framework ein, um dann anhand von Nautilus- und Evolution-Plugins zu zeigen, wie man Plugins in GNOME realsiert. Im Anschluss kann dann noch eine Hilfestellung gegeben werden, wo sich welche GNOME-Bibliotheken einsetzen lassen.about this event: http://www.ccc.de/congress/2004/fahrplan/event/37.en.html
  • Lightning Talks: Day 2
    Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.about this event: http://www.ccc.de/congress/2004/fahrplan/event/157.en.html
  • Zufallszahlengeneratoren
    Vorgestellt werden Verfahren und Schaltpläne sowie Hardware zum Erzeugen von Zufallszahlen und zugehörige mathematische Beweise. Im Mittelpunkt stehen Zufallszahlengeneratoren, die auf dem zentralen Grenzwertsatz basieren und sich auch für schnelle Anwendungen wie Rausch-Radar eignen. Einige dieser Generatoren werden auch gezeigt und vorgeführt.about this event: http://www.ccc.de/congress/2004/fahrplan/event/49.en.html
  • Practical Mac OS X Insecurity
    Some recent security problems with Mac OS X stem from the fact that Apple tries to combine the Unix security model with easy and convient usability and closed source. Showing examples from our own research we will take you on a pleasant journey to get root on almost any recent Macintosh. And of course, there will be "just one more thing".about this event: http://www.ccc.de/congress/2004/fahrplan/event/218.en.html
  • Lightning Talks: Block Ciphers
    Lightning Talks are introductory talks for projects, interesting technologies and evolving developments and other things that might be interesting to the 21C3 audience.about this event: http://www.ccc.de/congress/2004/fahrplan/event/250.en.html
of 4
61–90 of 116