<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>admin &#8211; WorldToor</title>
	<atom:link href="/author/admin/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description></description>
	<lastBuildDate>Mon, 20 May 2013 16:06:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.2</generator>

<image>
	<url>/wp-content/uploads/sites/5/2019/01/cropped-worldtoor-32x32.png</url>
	<title>admin &#8211; WorldToor</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Introduction to GNU Radio &#8211; Tempest Void</title>
		<link>/2013/05/20/introduction-to-gnu-radio-tempest-void/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 16:06:47 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=64</guid>

					<description><![CDATA[Introduction to GNU Radio A primer on GNU Radio and SDR (Software Defined Radio) in general. What it is and how to go about using it. Hands-on workshops to follow. Tempest Void Electrical engineer, freelance consultant, often working on spiffy projects that don&#8217;t exist.]]></description>
										<content:encoded><![CDATA[<h1>Introduction to GNU Radio</h1>
<p>A primer on GNU Radio and SDR (Software Defined Radio) in general. What it is and how to go about using it. Hands-on workshops to follow.</p>
<h1>Tempest Void</h1>
<p>Electrical engineer, freelance consultant, often working on spiffy projects that don&#8217;t exist.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Using USB devices as a trusted boot media &#8211; SID</title>
		<link>/2013/05/20/using-usb-devices-as-a-trusted-boot-media-sid/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 16:06:11 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=61</guid>

					<description><![CDATA[Using USB devices as a trusted boot media for malware remediation, system recovery, and forensics capture/analysis. TBA SID]]></description>
										<content:encoded><![CDATA[<h1>Using USB devices as a trusted boot media</h1>
<p>for malware remediation, system recovery, and forensics capture/analysis.<br />
TBA</p>
<h1>SID</h1>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stupid whitehat tricks &#8211; Robert</title>
		<link>/2013/05/20/stupid-whitehat-tricks-robert/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 16:04:51 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">/?p=58</guid>

					<description><![CDATA[Stupid whitehat tricks This talk will be a light hearted look back at some amusing hacks from my past. Robert Focused on computer forensics and information security defense. Earlier this year I moved back to Chicago to take a senior position on the security team of a US fortune 500 company. For the previous six [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Stupid whitehat tricks</h1>
<p>This talk will be a light hearted look back at some amusing hacks from my past.</p>
<h1>Robert</h1>
<p>Focused on computer forensics and information security defense. Earlier this year I moved back to Chicago to take a senior position on the security team of a US fortune 500 company. For the previous six years I lived and worked in Germany as a member of a computer emergency response team for a US government contractor. I split my time between working, hacking on technology, attending hacker conferences, and traveling the world. The best time are when I get to combine all four at once.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Electronic Privacy in the Era of Big Data &#8211; Big Brother *is* Watching &#8211; Pat</title>
		<link>/2013/05/20/electronic-privacy-in-the-era-of-big-data-big-brother-is-watching-pat/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 15:59:27 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=55</guid>

					<description><![CDATA[Electronic Privacy in the Era of Big Data &#8211; Big Brother *is* Watching As we&#8217;ve seen recently in the Petreus matter, what you put out there (and even things you don&#8217;t actually _put_ out there) can come back to bite you. This talk will give a brief overview of the legislative whack-a-mole efforts that are [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Electronic Privacy in the Era of Big Data &#8211; Big Brother *is* Watching</h1>
<p>As we&#8217;ve seen recently in the Petreus matter, what you put out there (and even things you don&#8217;t actually _put_ out there) can come back to bite you. This talk will give a brief overview of the legislative whack-a-mole efforts that are the ongoing attempt to extend privacy rights into the electronic realm.</p>
<h1>Pat</h1>
<p>Pat Wilson retired from a career in computer sysadmin and security and has spent the last 4 years bashing her head into the rock of law school. She will sit for the California Bar in February, after which she&#8217;ll have to find a job.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WorldToor Forum &#8211; nfiltr8</title>
		<link>/2013/05/20/worldtoor-forum-nfiltr8/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 15:58:27 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=52</guid>

					<description><![CDATA[WorldToor Forum The WorldToor Forum will be held to discuss future WorldToor Events, activities, and ways we can get more participate. nfiltr8 I&#8217;m the Vice-Chairman of ToorCon and have been with the organization since 1999. My main role at ToorCon is operations. I&#8217;d like to consider myself a 1337 organizer of hax0r events, but in [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>WorldToor Forum</h1>
<p>The WorldToor Forum will be held to discuss future WorldToor Events, activities, and ways we can get more participate.</p>
<h1>nfiltr8</h1>
<p>I&#8217;m the Vice-Chairman of ToorCon and have been with the organization since 1999. My main role at ToorCon is operations. I&#8217;d like to consider myself a 1337 organizer of hax0r events, but in reality I&#8217;m just a nerdy caterer with a spreadsheet. My day job is the Director of Product Development at UNIXSurplus, Inc.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FPGA Crypto Tricks &#8211; h1kari</title>
		<link>/2013/05/20/fpga-crypto-tricks-h1kari/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 15:57:29 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=50</guid>

					<description><![CDATA[FPGA Crypto Tricks This talk will cover some interesting tricks for cracking different lesser-known but massively deployed ciphers with FPGAs along with a real world demonstration of the implications of what happens when some ciphers are broken. h1kari David Hulton is the co-founder and chairman of the ToorCon group of events (ToorCon San Diego, ToorCon [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>FPGA Crypto Tricks</h1>
<p>This talk will cover some interesting tricks for cracking different lesser-known but massively deployed ciphers with FPGAs along with a real world demonstration of the implications of what happens when some ciphers are broken.</p>
<h1>h1kari</h1>
<p>David Hulton is the co-founder and chairman of the ToorCon group of events (ToorCon San Diego, ToorCon Seattle, ToorCamp, and WorldToor). He&#8217;s also the co-founder and Director Security Applications at Pico Computing where he dedicates most of his time to breaking codes with the custom Field Programmable Gate Array (FPGA) systems that his company develops. He&#8217;s mostly known for attack research he&#8217;s published on 802.11, GSM, smart cards, automobiles, and many other widely deployed systems. He&#8217;s also the co-owner of Ada&#8217;s Technical Books &#8212; a carefully curated paradise for geeks, with his wonderful wife.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>KISS: A Bit Too Simple &#8211; Greg</title>
		<link>/2013/05/20/kiss-a-bit-too-simple-greg/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 15:55:23 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=46</guid>

					<description><![CDATA[KISS: A Bit Too Simple KISS (`Keep it Simple Stupid&#8217;) is an efficient pseudo-random number generator specified by G. Marsaglia and A. Zaman in 1993. G. Marsaglia in 1998 posted a C version to various USENET newsgroups, including \texttt{sci.crypt}. Marsaglia himself has never claimed cryptographic security for the KISS generator, but many others have made [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>KISS: A Bit Too Simple</h1>
<p>KISS (`Keep it Simple Stupid&#8217;) is an efficient pseudo-random number generator specified by G. Marsaglia and A. Zaman in 1993. G. Marsaglia in 1998 posted a C version to various USENET newsgroups, including \texttt{sci.crypt}. Marsaglia himself has never claimed cryptographic security for the KISS generator, but many others have made the intellectual leap and claimed that it is of cryptographic quality. In this paper we show a number of reasons why the generator does not meet the KISS authors&#8217; claims, why it is not suitable for use as a stream cipher, and that it is not cryptographically secure. Our best attack requires about 70 words of generated output and a few hours of computation to recover the initial state.</p>
<h1>Greg</h1>
<p>Greg Rose is a Senior VP in the office of the Chief Scientist for QUALCOMM Incorporated, where he works on cryptographic security and authentication for third-generation mobile phones and other technologies and manages other diverse groups. He holds a number of patents for cryptographic methods and has successfully cryptanalyzed widely deployed ciphers. Greg was program chair of the 1996 and 2000 USENIX Security Symposia, and General Chair of Crypto 2003. Some of his papers and free software are available at <a href="http://www.seer-grog.net/">http://www.seer-grog.net/</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sparkle Party &#8211; fNaCK</title>
		<link>/2013/05/20/41/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 15:52:24 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=41</guid>

					<description><![CDATA[Sparkle Party  You&#8217;re invited. fNaCK Geek specializing in offensive computing products and dense IP network design. People that have paid me $ for grey matter rental include Fortune 10, DoD, casinos, and the bar down the street. Currently learning about and trying not embarrass myself too much in software defined radios and RF exploitation.]]></description>
										<content:encoded><![CDATA[<h1>Sparkle Party</h1>
<p><em id="__mceDel"> You&#8217;re invited.</em></p>
<h1>fNaCK</h1>
<p>Geek specializing in offensive computing products and dense IP network design. People that have paid me $ for grey matter rental include Fortune 10, DoD, casinos, and the bar down the street. Currently learning about and trying not embarrass myself too much in software defined radios and RF exploitation.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Trekking in the Kingdom of Mustang &#8211; David</title>
		<link>/2013/05/20/trekking-in-the-kingdom-of-mustang-david/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 15:47:02 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=37</guid>

					<description><![CDATA[Trekking in the Kingdom of Mustang May of this year I spent 3 weeks on a rarely available, traditional Himalayan camping trek to the &#8220;Mustang,the Last Forbidden Kingdom.&#8221; There is no road (yet) through Upper Mustang, a special-permit area of Nepal. It is a 5 day trek to get to the capital city, pop. 800. [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>Trekking in the Kingdom of Mustang</h1>
<p>May of this year I spent 3 weeks on a rarely available, traditional Himalayan camping trek to the &#8220;Mustang,the Last Forbidden Kingdom.&#8221; There is no road (yet) through Upper Mustang, a special-permit area of Nepal. It is a 5 day trek to get to the capital city, pop. 800. This Tibetian Kingdom is stunningly beautiful, culturally rich, and provides a extraordinary backdrop for introspection.</p>
<h1>David</h1>
<p>Undergrad in the arts at Ripon College, Wisconsin. Have owned several retail businesses in San Diego, from Hardwood and woodworking supply to art galleries. Presently owner of David Alan Collection in Solana Beach, Ca. It&#8217;s worth a peep at the website: <a href="http://www.thedavidalancollection.com/">www.thedavidalancollection.com</a> (blog and villa avail on home page.) I spend about half of each year in the Far East collecting art and antiques throughout Asia, from Bali, Indoneasia, Japan, Thailand and China for David Alan Collection, as well as designing and making one-of-a-kind furniture and art pieces. Amita and I live in the San Diego area and travel extensively together and well as working on our own international projects.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Believe In Film &#8211; Colby</title>
		<link>/2013/05/20/believe-in-film-colby/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 20 May 2013 15:45:27 +0000</pubDate>
				<category><![CDATA[Talks]]></category>
		<guid isPermaLink="false">/?p=35</guid>

					<description><![CDATA[Believe In Film Why shoot film in the age of digital? Colby I&#8217;m involved with IT outsourcing at a Seattle area employer over the years and during my down time, I turn to photography as my comfort zone.]]></description>
										<content:encoded><![CDATA[<h1>Believe In Film</h1>
<p>Why shoot film in the age of digital?</p>
<h1>Colby</h1>
<p>I&#8217;m involved with IT outsourcing at a Seattle area employer over the years and during my down time, I turn to photography as my comfort zone.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
