Lieven Desmet

Описание к видео Lieven Desmet

BruCON - 2010
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security #BruCON

https://www.brucon.org/

BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Belgium, BruCON offers a high quality line up of speakers, security challenges and interesting workshops. BruCON is a conference by and for the security and hacker(*) community.

The conference tries to create bridges between the various actors active in computer security world, included but not limited to hackers(*), security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies, etc…..
BruCON is organized as a non-profit event by volunteers. A group of security enthusiasts decided that it was time for Belgium to have its own security and hacker conference. A lot of countries around the world have this kind of conferences to discuss and present research on computer security and related subject matters. We want to unite people who share the same passion and support the Belgian (research) communities, with BruCON as a yearly highlight. We are not professional organizers and started this as a non-profit organization. We all have full time jobs and dedicate a lot of our free time to this project. Everyone is welcome to join us and help!!
The term ‘hacker’ has been misrepresented in popular media for a long time: “Hacking has nothing to do with criminal activities such as identity theft and electronic trespassing! Rather, it [hacker] has been coined at the Massachusetts Institute of Technology (MIT) as a term for curious individuals for whom every device or piece of software is full of exciting challenges to develop potential improvements or discover alternative uses.”

“Anyone who remembers the childhood curiosity and excitement of taking apart radios and other devices to find out how they work is a good example of what is considered a hacker!”

Комментарии

Информация по комментариям в разработке