Notacon Art and Technology Conference: 2006

Held on April 7th-9th 2006 in Cleveland, Ohio.

Description of the Audio
amishone-photography.mp3 4371534
AmishOne: Photography Workshop
Last year, I spent an hour trying to convey some basics of terminology and technique about photography. I'll be back to revisit the same topics again, and cover a bit more this time. Jargon laden concepts such as ISO, F-stop, exposure, focal length, and sensor size will be covered. I will present examples of picture framing, lighting, and use of flash. Finally, another round of 'questions about photography' will be included.
b9punk-goworkshop.mp3 6067621
b9punk and McFly: Learn to Play Go
An opportunity to learn the basics of go and play a few games. Boards and stones will be provided, along with printed information about the game. Hikaru fanboys will be dealt with appropriately, this means you, and us.
b9punkmcfly-hackerscene.mp3 5295159
b9punk and McFly: Europe and the USA: A Comparison and Contrast of Our Hacker Scenes
boehnlein-helpdesk.mp3 4408508
Gregory Boehnlein: Life in a Help Desk
A discussion and dissection of various Help Desk stories / recordings that we have collected over the years. Not at all politically correct, but should provide topically relevant information. Audience participation is a must.
boehnleinmutodeus-ilecs.mp3 4222660
Gregory Boehnlein: How the ILECs Have F**ked Up the ISP Industry
An hour long rant about anti-competitive practices by ILECS and RBOCS in the ISP industry and how this has totally screwed the end-user and turned what should be $8 / month DSL into a $50 / month profit whore for Ma-Bell. A dissection of why the entire Telcom Deregulation act of 1996 was a complete fraud. Anger. Frustration. Hatred. Death!
chansuter-locksmith.mp3 5174989
Jimmy Chan AKA Lemonjello and Kris Suter AKA Krnlpanik: Locksmithing Basics
Learn the basics of picking locks from the lockpicking champion at Defcon 12! Bring your own locks and, if possible picks and get on the path to learning the locksmithing trade for yourself.
clymer-honeypots.mp3 3114644
Chris Clymer: Mobile Honeypots: How to Catch a Laptop Thief
You bought that shiny new thinkpad, installed Linux on it, set a 20 character login password, a 30 character root password, passworded the BIOS, encrypted your home partition...and none of this matters if someone steals your laptop. What if there was a way to keep the attacker from knowing your sensitive data even existed, watch all of his activities, and hopefully recover your laptop?
clymer-ricinglinux.mp3 3570786
Chris Clymer: Ricing Out Your Linux Box
Lots of us are running Linux workstations these days. But most people have more important things to do than pretty up those boring default desktops. Transparent borderless terminals, gkrellm/fluxbox/KDE theming, desktop applets with adesklets/gdesklets/superkaramba...make your cube-mates green with envy.
coughanour-hajinets.mp3 4377309
David Coughanour: HajjiNets: Running an ISP in a War Zone
Right now I am currently serving in Iraq where I run IT operations for a small chunk of the Sunni triangle. One of the major projects that we have accomplished here is setting up an ISP that supports 350 subscribers. It has also survived multiple mortar attacks, and is built entirely on Linux.
curtis-media.mp3 4993613
Drew Curtis: Stupid Media Tricks: Which will kill us all first, the Bird Flu or Janet Jackson's nipple?
davidlauer.mp3 4908306
droops-makeyourownlinux.mp3 4806324
Droops: Make Your Own Linux
My first Linux distro was Slackware and i have always held a fondness in my heart for it. I recently came back to slack while making a Live CD for creating online radio shows. The version of slack that I came back to is SLAX. It allows you to create your own live cd, effectively you own Linux distro. In my talk, I will start with slackware basics and them move on to how to create your own Slax based distro. As a group we will decide what we want in a distro and then create one during the talk. When my hour is up, everyone will have our own Linux distro and will have met others at the con, because they were forced to work together.
dunin-kryptos.mp3 5346691
Elonka Dunin: Kryptos and The Da Vinci Code
In a courtyard at CIA Headquarters stands an encrypted sculpture called Kryptos. Its thousands of characters contain encoded messages, three of which have been solved. The fourth part, 97 or 98 characters at the very bottom, have withstood cryptanalysis for over a decade. The artist who created Kryptos, James Sanborn, has also created other encrypted sculptures such as the decade-old Cyrillic Projector, which was cracked in 2003 by an international team led by Elonka Dunin. Within the last few years, the sculpture's fame has been increasing, in large part because references to it were hidden in the bookjacket of the bestseller "The Da Vinci Code", and author Dan Brown has hinted that it will also feature in his next book, "The Solomon Key". This talk is intended for a general audience with beginning to intermediate cryptographic experience. Elonka will go over how the Cyrillic Projector code was cracked, and the current state of knowledge about the Kryptos sculpture, its own encrypted messages, and its mysterious CIA surroundings.
eastman-producingmusic.mp3 6067621
James Eastman AKA DJ Vitruvius, Micah Waldstein: Producing Music on a Shoestring Budget Producing music requires a lot of effort, a lot of time, and a lot of proverbial "blood, sweat and tears," but it doesn't require a lot of money. Freely licensed samples, low tech solutions, and a little dedication and knowledge can allow you to create, record, and produce musical masterpieces without spending a year's salary building a studio. Additionally, we will survey numerous open source applications available for audio production work in Linux.
farr-research.mp3 4842606
Nick Farr: Hacking the Research Community
One day before the opening of Defcon 9, a group of hackers who wanted to put their talents to humanitarian relief projects went out for pizza. They invited Defcon's legendary "spot the fed" emcee, Priest along for his advice. He told them the real challenge was not in fighting organizations, but in "getting organized" and "going legit". Many confs, e-mails and late-night IRCing later, The Hacker Foundation emerged. With a goal to act as a research and service organization, HF would help the community show the world how that the intellectual powers of a "hacker" could be used for good. Since incorporating in 2003, HF has faced many different regulatory, social and intellectual challenges from the usual suspects in media and government. Surprisingly, the most difficult challenges they faced came from within the community. This talk will look through the brief history of the Hacker Foundation as it achieved IRS-recognized non-profit organization status. While illustrating the successes and mistakes made along the way, Mr. Farr hopes to illustrate how research and service efforts (along with a little creative mass-social engineering) can dispel the "hacker-criminal myth".
fox-microsoft.mp3 4120999
Ryan Fox: How Microsoft is going to die (... and it's not Linux)
Microsoft will soon lose its dominance of the PC Desktop. Sure, it has been predicted before, with some other OS threatening to break MS's market share stranglehold. But the downfall will not be caused by another OS, it will happen by making the OS unimportant. Practically all of the puzzle pieces needed already exist.. but they are not yet in the right place. This entertaining, lighthearted talk will detail Microsoft's end. We will cover the technologies that will make the OS obsolete, and what still needs to be done.
hackermedia.mp3 5047433
Hacker Media Panel
This panel will discuss the hacker influence on web-based media, specifically through the form of the podcast and IPTV. It will cover current trends in hacker media, possible futures, as well as advice for creating your own hacker media.
hardy-community.mp3 4986228
Seth Hardy: Building Communities in Self-Destructive Environments
Over the past number of years, I've put in a lot of time developing and maintaining resources that are open (in varying degrees) to the world. While I do consider these projects more than worthwhile, sometimes they can be hard to deal with. While there are always problems-- with time, financially, or with other resources-- it seems that the biggest headaches always come from within. In this talk, we'll look at a few communities of varying degrees of stability I've been involved with, the problems that have come up in and because of these communities, and the steps taken to help solve these problems. These will include things created both online (2600net, and in the real world (the Hacker Halfway House, the current yet-unnamed project I'm working on).
heiland-workstation.mp3 2662400
honeywell-gender.mp3 4310101
Hacking Gender - Strategies for inclusion and change
Why are there so few women in infosec, and more generally in IT and telecom? Why should you care - is it even a problem? Most importantly, what are some constructive, positive things we can do as a community to foster a more inclusive culture? This isn't a gripe session about horror stories of women in the field. It definitely isn't about hating men. Both have been done and aren't really productive. I'll first address the "why you should care" question with some background from equity studies research. I'll then go over strategies that companies, universities, and individuals have used to successfully include women in computer science, engineering, physics and corporate IT, drawing from research done in all of these fields to find the strategies that best apply to the infosec community.
houston-font.mp3 3354312
Corey Houston: Font Making Fun
Corey will be showing how anyone can create their own handmade typeface/letterforms using a variety of different techniques. The discussion will include a history of typefaces and a discussion about three-dimensional typography.
irongeek-printer.mp3 3935361
Irongeek: Network Printer Hacking
This presentation will cover techniques that can be used to control and extract data from network printers. Most of it will be specific to HP Jetdirects, but some of the techniques are still applicable to other network printer vendors. Topics covered will include information on the basics of network printer protocols and languages, finding and controlling network printers, simple pranks, using JetDirect boxes as files/web servers, extracting faxes/stored print jobs, sniffing and replaying print jobs as well as a bit on coding your own scripts with Perl and PJL to control network printers.
jarc-collaboration.mp3 1801333
Paul Jarc: Collaborative Authorship and Patch Deployment: An Impractical Guide
Why do we believe what we believe? Is accuracy enough to give credibility? What do Wikipedia and distributed source control have in common? (And what should they have in common?) You'll come for a brain dump of a thread running through all these things, but you'll stay to shoot it full of holes and build it back up again.
kn1ghtl0rd-threatmanagement.mp3 3858918
Kn1ghtl0rd: Blended Threat Managment
I will be introducing blended threat management and explaining it's role in an IT system. I will be covering the basic configuration and what functions and how to implement them. I will also cover the licensing and features briefly and there individual functions. I will also discuss how to deploy the appliance in a TCP/IP networking environment. After the presentation I will allow for a short Q&A section and then a brief conclusion on blended threat management systems.
krembs-humanity.mp3 4807296
Jesse Fiedler Krembs AKA Agent X: Hacks for Humanity
Jesse's presentation is a follow on to Nick Farr's about the origins of the The Hacker Foundation. This talk will cover more up to date issue regard the Hacker Foundation's activities and how to get involved. Jesse will be speaking on what the Hacker Foundation does, problem's facing humanity that hacker's are uniquely suited to challenge and how to apply to the Foundation for sanctioned project status.
lynn-securityaudits.mp3 2302560
Beth Lynn: Security Audits Using Linux Live CDs
We will explore easy ways that a system administrator can perform a security audit utilizing Linux-based Live CDs. Examples of common exploit detection will be given. This talk will be practical for any size site - including home networks.
meyer-style.mp3 4991686
Eric Meyer: A Decade of Style
A look back on 10 years of CSS and a glance forward to where things are headed.
mitchell-onlinecommunities.mp3 4276582
Keith Mitchell: Internet Exchanges - Enabling Local Online Communities?
My presentation looks at the history and role of Internet Exchanges (IXPs or NAPs) for improving connectivity within communities of ISPs and others in a metro area. I will examine successful and less successful technical, operational, economic and governance models, with some examples. I then take a look at the role of "peering" in routing traffic across today's Internet backbone in the face of plummeting wholesale IP transit prices. The highest profile IXPs have traditionally been in major metro centers (e.g. the DC & Bay areas and London), but making them successful in "regional" cities is my experience a more challenging endeavour. What is the optimal geographic distribution and scope of exchanges, and what is the best balance of co-operation, competition and subsidy needed to make IXPs thrive in the metro areas and urban communities they serve?
myself-abewrapup.mp3 3191396
Myself: The Anything But Ethernet Wrapup
ponyboy-phreaking.mp3 2029145
Ponyboy: The Rise and Fall of Payphones and the Evolution of Phreaking
'The Rise and Fall of Payphones and the Evolution of Phreaking' is a glorified timeline mapping the birth of the pay telephone in 1889, to the slow death of the industry in the present day. Following the presentation there will be a short trivia game with prizes an a Q&A session.
riscphree-encryption.mp3 2863431
Riscphree: Encryption for Programmers
This talk will discuss encryption from a programmer's perspective. Topics will include a beginners rundown of terms and small introduction to cryptography, legalities concerning the development of cryptographic material, basic concepts and examples, and finally, ethics. Examples will include source code, but will not apply to one specific language as to ensure more understanding with all developers. Even if you are not a programmer, with the information presented in the beginning of the talk, you should find it enjoyable and understandable.
schaffer-photoshop.mp3 3819348
Gabe Schaffer: 5 Minute Photoshop Techniques
Learn how to turn snapshots into art with 5 simple steps you can do in Photoshop, the GIMP, or any other fine digital photography tool. Bring your own images on CD or USB key to see them transformed before your very eyes.
scott-podcast.mp3 4075811
Jason Scott: Your Moment of Audio Zen: A History of Podcasts
The name either excites you or makes you cringe (Hey, maybe it does both) but the fact is, Podcasts are now the hot new thing. Jason Scott provides a quick history of the podcast, as well as its predecessors, its likely replacements, and how the world is likely to look back on this explosion of home-made radio. Subjects covered include pirate radio, shortwave, "Push" technology, the weird birth of RSS, and where things got entirely out of hand.
scott-wikipedia.mp3 4223285
Jason Scott: The Great Failure of Wikipedia
In just a few short years, Wikipedia, the anyone-can-edit, anyone-can-fix collection of articles, has become a juggernaut. In its current incarnation, it has achieved a reputation as a good, effective source of knowledge and facts, maintained by an army of researchers, experts, and just plain folks working together towards founder Jimbo Wales' goal of "A world in which every single person on the planet is given free access to the sum of all human knowledge." There are naysayers and skeptics, and there are fans and supporters. Jason is a little of all of these, and in a quick-paced talk will discuss what he has learned studying Wikipedia for about a year; its advantages, disadvantages, and most importantly, how much we can learn about the nature of human interaction and communication from it, in a world where information is becoming a part of our bloodstreams and subject to the same fears of contamination. Wikipedia will fail, but it will do so in the sacrifice of a greater good, and we will have been better off for what it will teach us. Let us have a rousing wake.
sterrett-beer.mp3 833740
Nathan Sterrett: Hacking Hops: How to Brew Your Own Beer
Nathan will be conducting an introduction to beer making also called homebrew. He will have examples of the necessary equipment and ingredients. This is a beginner class it will not be covering all grain brewing. He will have pictures of the process but because of hotel rules prohibit bringing outside alcohol so he will not bring any beer or batches in progress.
sterrett-sms.mp3 3821947
Nathan Sterrett: An Introduction to Microsoft Systems Management Server
Is Microsoft Systems Management Server (SMS) a good fit for your environment? How do you handle patch management on your client computer? How much does SMS cost to implement? With the number of computers per support staff constantly increasing look to enterprise management systems to reduce your workload. He will demonstrate the core features of SMS, remote control, hardware/software inventory, software deployment, and reporting. Nathan will talk about how The University of Akron has implemented SMS, costs associated with installation, and issues that have arisen from enterprise management systems.
timmins-investigation.mp3 4279517
Paul Timmins: How to Survive a Federal Investigation
Rather than just yet another boring speech about 802.11b and security, this will be a story about what happens when the world closes in on you, because of the above items. Detailed will be a good account of my arrest by the FBI, my interrogation, my court hearings, and what it's like to hear your name opening the 6 o'clock news. I intend to be quite humorous and sarcastic, but also quite serious. If this is a situation I can be in, it's a situation anyone can be in.
timmins-telcodata.mp3 4244499
Paul Timmins: Telco Data

There are 38 files for a total of 155,405,699 bytes.