Meta Junk

2010 July 28
by Dave

I hate to get all meta on you, but I’m going to do it anyway.

First off I need to apologize for the posts being a bit thin more often than not lately. The already heavy craziness of life has stepped it up significantly since the middle of May. I have some hope that the preponderance of little things overwhelming me will taper off a bit starting in the next week or so. Experience has taught me that I am a foolish optimist to expect each and every resolved personal issue to be replaced with any less than two new issues, but hopefully some of the personal craziness will chill.

In tandem with that I have high hopes that some of my professional insanity will abate enough to make space for my subconscious to use up a few more clock cycles chewing over things on your behalf.

Any way, however it goes I intend to keep to the current thrice weekly posting schedule which seems to have settled into two low calorie posts and one with at least a hint of meat on it. This week being the exception. This here is your lame excuse for a Wednesday post. Late and content free, and instead of giving you a Friday post I will be attending Defcon in Vegas.

I know that I married into the right family when the summer get together for my father in law’s birthday is at Defcon. The family that geeks out about computer security together stays together?

The main issue now is deciding which talks to go to. Here is a short list of lectures with promise:
-BUILD YOUR OWN UAV 2.0 – WIRELESS MAYHEM FROM THE HEAVENS!
-THE LAW OF LAPTOP SEARCH AND SEIZURE
-LETTING THE AIR OUT OF TIRE PRESSURE MONITORING SYSTEMS
-HACKING WITH HARDWARE: INTRODUCING THE UNIVERSAL RF USB KEYBOARD EMULATION DEVICE – URFUKED
-JACKPOTTING AUTOMATED TELLER MACHINES REDUX
-PRACTICAL CELLPHONE SPYING
-WARDRIVING THE SMART GRID: PRACTICAL APPROACHES TO ATTACKING UTILITY PACKET RADIOS
-DECEIVING THE HEAVENS TO CROSS THE SEA: USING THE THE 36 STRATAGEMS FOR SOCIAL ENGINEERING
-CYBERTERRORISM AND THE SECURITY OF THE NATIONAL DRINKING WATER INFRASTRUCTURE
-WIMAX HACKING 2010
-ELECTRONIC WEAPONRY OR HOW TO RULE THE WORLD WHILE SHOPPING AT RADIO SHACK
-THE ANATOMY OF DRUG TESTING

How am I supposed to focus on celebrating a birthday and hanging out at the pool with my son when all that goodness is on offer? I think I might be able to hit half of those without ignoring everyone. It looks like we will have lots of security stuff to talk about for the next few weeks.

Have I ever told you about the time that we went to a security convention in San Diego and Joe ended up shouting at the FBI agents and DA on a panel discussion because they had no clue as to what level of log redundancy and protection was required for admissibility as evidence. Good times.

No comments yet

Leave a Reply

Note: You can use basic XHTML in your comments. Your email address will never be published.

Subscribe to this comment feed via RSS