Defcon 21 Badge Challenge Walkthrough Part 2

Posters: ================= There are 7 posters with cipher text. 4 labeled with numbers that when converted from dec to ascii are labeled J, A, C, and K, and three with key holes. Numbered Posters ———————– – 74 “J” (Social Engineering Village): VEVMRUBLFDZMGGLYVORVEV LMVLUGSVQZXPHWLVHMGYVO (can be decoded with atbash) => EVENIFYOUWANTTOBELIEVE ONEOFTHEJACKSDOESNTBEL – 65 “A” (Wireless […]

Defcon 21 Badge Challenge Walkthrough Part 1

I was in one of two teams that completed the Defcon Badge Challenge this year. In part one of this walkthrough I’ll provide solutions for the Lanyard and the Badges. Part 2 will have the Posters. Enjoy! Lanyards: ================= All four lanyards laid out have a bass clef and then a series of dots that […]

A Declaration of the Independence of Cyberspace by John Perry Barlow

Just as relevant today as it was in 1996. This is a Declaration of the Independence of Cyberspace. A Declaration of the Independence of Cyberspace by John Perry Barlow Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, […]

The Science of Secrecy: Introduction and Future of Cryptography

From the description: Join Imperial’s Institute for Security Science and Technology for an informative presentation on codes, ciphers and computers. Professor Richard Aldrich, Dr Martin Knight, Professor Sir Peter Knight and Dr Simon Singh take you on a tour of cryptography through the ages. From its beginnings in pen and paper to its future in […]

Communicating in E-Prime

The way we talk can have profound affects on the way we see the world and, in turn, the way the world sees and interacts with us. One of the easiest ways of eliminating poor, irrational, upsetting, and alienating communication (ie. to increase your general likability) is to stop stating opinions as facts. I recently […]

Small World Experiment

We know it today as “six degrees of separation”, but did you know that number is actually loosely based on the results of an actual experiment? In the 1960s Stanly Milgram (you know Stanly Milgram he’s the one that tricked subjects in to thinking they were torturing people for science) set out the answer the […]

Hacker Movie List

What follows is a list of “hacker movies” in no particular order. — War Games (1983) A young man finds a back door into a military central computer in which reality is confused with game-playing, possibly starting World War III. — Hackers (1995) A young boy is arrested by the US Secret Service for writing […]