Enviar pesquisa
Carregar
Marc Heuse. Responsiveness and Responsibility
•
0 gostou
•
1,174 visualizações
Positive Hack Days
Seguir
Tecnologia
Educação
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 22
Recomendados
Internet security
Internet security
rfukunaga
System-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
Hacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
ASSIST - Fraud Presentation
ASSIST - Fraud Presentation
ASSIST ladies networking group
Malware
Malware
Diven Chen
Online safety and security
Online safety and security
jovellconde1
Recomendados
Internet security
Internet security
rfukunaga
System-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
Hacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
ASSIST - Fraud Presentation
ASSIST - Fraud Presentation
ASSIST ladies networking group
Malware
Malware
Diven Chen
Online safety and security
Online safety and security
jovellconde1
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
khalavak
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
guesta04b0
Secure Coding 2013
Secure Coding 2013
The eCore Group
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
Paris Open Source Summit
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Nargis Parveen
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Nancy Wright White
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Marc Canter
Computer And Internet Security
Computer And Internet Security
Ashley Zimmerman
Computer And Internet Security
Computer And Internet Security
JFashant
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
Security by Weston Hecker
Security by Weston Hecker
EC-Council
Data management and office communication
Data management and office communication
Romulo Lopez
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Positive Hack Days
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Positive Hack Days
Mais conteúdo relacionado
Semelhante a Marc Heuse. Responsiveness and Responsibility
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
khalavak
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
guesta04b0
Secure Coding 2013
Secure Coding 2013
The eCore Group
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
Paris Open Source Summit
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Nargis Parveen
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Nancy Wright White
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Marc Canter
Computer And Internet Security
Computer And Internet Security
Ashley Zimmerman
Computer And Internet Security
Computer And Internet Security
JFashant
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
Security by Weston Hecker
Security by Weston Hecker
EC-Council
Data management and office communication
Data management and office communication
Romulo Lopez
Semelhante a Marc Heuse. Responsiveness and Responsibility
(20)
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
Secure Coding 2013
Secure Coding 2013
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Computer And Internet Security
Computer And Internet Security
Computer And Internet Security
Computer And Internet Security
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Security by Weston Hecker
Security by Weston Hecker
Data management and office communication
Data management and office communication
Mais de Positive Hack Days
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Positive Hack Days
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Positive Hack Days
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
Positive Hack Days
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
Positive Hack Days
Использование анализатора кода SonarQube
Использование анализатора кода SonarQube
Positive Hack Days
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
Positive Hack Days
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Positive Hack Days
Автоматизация построения правил для Approof
Автоматизация построения правил для Approof
Positive Hack Days
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Positive Hack Days
Формальные методы защиты приложений
Формальные методы защиты приложений
Positive Hack Days
Эвристические методы защиты приложений
Эвристические методы защиты приложений
Positive Hack Days
Теоретические основы Application Security
Теоретические основы Application Security
Positive Hack Days
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
Positive Hack Days
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Positive Hack Days
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
Positive Hack Days
Формальная верификация кода на языке Си
Формальная верификация кода на языке Си
Positive Hack Days
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
Positive Hack Days
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
Positive Hack Days
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
Positive Hack Days
Mais de Positive Hack Days
(20)
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
Использование анализатора кода SonarQube
Использование анализатора кода SonarQube
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Автоматизация построения правил для Approof
Автоматизация построения правил для Approof
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Формальные методы защиты приложений
Формальные методы защиты приложений
Эвристические методы защиты приложений
Эвристические методы защиты приложений
Теоретические основы Application Security
Теоретические основы Application Security
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
Формальная верификация кода на языке Си
Формальная верификация кода на языке Си
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
Último
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
Sri Ambati
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Zilliz
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Último
(20)
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Marc Heuse. Responsiveness and Responsibility
1.
“Nobody knows” Marc “van
Hauser” Heuse The Hacker’s Choice / www.thc.org
2.
3.
4.
Security & Hacking are
changing
5.
BBS, Text Files, Groups, VMBs, local meetings
6.
Mailing Lists, e-Magazines, Groups, national meetings
7.
Web, Blogs, Books, Mailing
Lists, international Conferences, Training Courses, University Classes, …
8.
9.
Hardware Internet Pentesting Mainframes Binary DisassemblingExploitation Networking
& Routers Crypto Analysis, Crypto Implementation Large complex Apps (SAP, Oracle, SCADA, …) Standards, Policies & Procedures Telephony Forensics Social Engineering Malware / Anti-Malware Webapp Pentests Source Code Audits
10.
=> Anonymity => Specialisation =>
Lone Wolfs
11.
12.
13.
Great Hackers & Visionary Projects
14.
This makes you
successful 1. fun & passion 2. concentrate 3. naive rebel 4. teach yourself 5. talk, share & connect 6. don‘t be an asshole 7. выучить английский язык!
15.
Visionary Projects?
16.
Why?
17.
How?
18.
What?
19.
1. 2+ strong
founders 2. Passion – no ego 3. Communicate Vision 4. Easy to join & contribute This makes projects successful
20.
21.
1. My name
is … 2. I come from <city> 3. I know about: A, B, C, … 4. I want to learn about: A, …
22.
.