Infrasec/Compute SecConf: Difference between revisions

Line 2: Line 2:
Security Conferences in general can be a hostile place for using your computer and it is important to know what is going on around you. So to set the scene, I am talking about the networks within the conference halls and even in your hotel room. Every conferences has varies levels of scary, so use caution with everything you do on your computer (or other computing device).  
Security Conferences in general can be a hostile place for using your computer and it is important to know what is going on around you. So to set the scene, I am talking about the networks within the conference halls and even in your hotel room. Every conferences has varies levels of scary, so use caution with everything you do on your computer (or other computing device).  


Note: If any of the terms in the "recommendation" section mean nothing or you have no idea what I am talking about, you probably shouldn't use your computer or wireless device at these conferences. You should also make sure you turn off Bluetooth and Wifi on all your devices and just use your cell phone's data network. (Have not seen anybody spoof these yet but it is very possible)
Note: If any of the terms in the "recommendation" section mean nothing or you have no idea what I am talking about, you probably shouldn't use your computer or wireless device at these conferences. You should also make sure you turn off Bluetooth and Wifi on all your devices and just use your cell phone's data network. (Have not seen anybody spoof these yet but it is very possible) (note that BlackHat 2009 featured a session on exploiting the SMS network -- be afraid).


== Recommendations ==
== Recommendations ==
canmove, Confirmed users
637

edits