ToorCon 2004 Pre-Registration Closing

From: h1kari@toorcon.org
Date: Tue Aug 31 2004 - 17:29:55 EDT


Hey everyone,

ToorCon is approaching fast this year and we wanted to make sure that all
of you know that we're trying hard to make ToorCon 6 the best ToorCon
yet. We're still in the process of finalizing our second keynote, but
otherwise the lineup is complete with over 30 talks this year! We just
wanted to let you all know details about this year and that
pre-registration is closing in only 10 days! Save $15 and pre-register
today!

DETAILS
ToorCon, San Diego's own information security conference looks forward to
it's 6th year in September 2004. Founded originally by the San Diego 2600
group and active members in the local security community, ToorCon has
slowly grown from a small underground gathering to a conference
attracting security professionals and hackers from all around the world.
ToorCon's goal is simple -- To bridge the gap between intrusion and
defense and create an environment that gets people motivated to learn,
participate, and contribute to the community around them.

Who: You
What: ToorCon Information Security Conference 2004
When: September 24th-26th, 2004
Where: Manchester Grand Hyatt
        One Market Place
        San Diego, CA 92101
        http://manchestergrand.hyatt.com/property/index.jhtml
Why: http://www.toorcon.org

PRE-REGISTRATION
Pre-registration for ToorCon is $60 online before Sept. 10th. Admission
will be $75 at the door. You will recieve an official ToorCon badge, an
entry into the drawings, and access to all of the event except the
Friday Seminars. You can either register online or at the Manchester
Grand Hyatt during the conference on Friday, Saturday, or Sunday.

ROOTWARS
RootWars is back again this year and better than ever. Since last year
the RootWars engine (openinfreno) has been open sourced and is being
constantly improved. We've just recently posted this year's rules on
the website along with information on how the competition will be run.
To sign up your team for the competition, please email
rootwars@toorcon.org.

BOFS
The Shmoo Group will be organizing Birds of a Feather (BoF) sessions
this year at ToorCon in the evening on Saturday. The point of the BoF's
is to create a social environment for groups to talk about whatever
topic they want. Pizza & beer will be provided during the BoF sessions
and the Slagheap Party complements of The Shmoo Group and Slagheap.
To sign up for a BoF, please email bofs@toorcon.org.

GENERAL LINEUP
This year we are putting an emphasis on Privacy and Anonymity because of
our theme of "20 years after big brother". To do this, we've split the
lineup into two distinct tracks, Attack & Destroy and Protect & Defend
spanning across 2 days. This year we will also have a special emphasis
on anonymous networks, advanced attack methods, cryptography,
steganography, forensics and tracking, and reverse engineering.

Keynote: Richard Thieme, Thiemeworks
Moving Mountains: Zen Hacking, Weakness as Strength, and Ultimate
Intentions

Simple Nomad, NMRC
NMRC Warez: MysteryNet and Beyond

Jennifer Granick, Stanford Law School
Patriot Act, Privacy and You

Marshall Beddoe, Baseline Research
Blackbox Protocol Analysis using Bioinformatics Algorithms

Jose Nazario, Arbor Networks, Inc.
The Worm Problem: Darkness Ahead, but any Light?

Richard Johnson, iDEFENSE Labs
Hooking the Linux ELF Loader

Dan Kaminsky, Avaya
The Black Ops of DNS

Optyx
Advancement in Rootkit Technology

Bill McCarty & Patrick McCarty, Azusa Pacific University
Honeynets for the Masses: The Honeynet Project's Honeywall

Brad Harris & Deker, Sparta, Inc.
Advanced Packet Injection in 802.11a/b/g Networks

aempirei, Baseline Research
A Survey of Novel Approaches to Network Security

Beetle, The Shmoo Group
Wireless Weapons of Mass Destruction for Windows

Len Sassaman
TBA

Brian Markus
UNIX Fundamentals

Justin Mason, SpamAssassin
Spam Forensics: Reverse-Engineering Spammer Tactics

Jaguar
Reversing and Exploiting Microsoft Services for Unix

Tri Huynh, SentryUnion
Runtime Analysis Against Execution Tampering

Matt Granet
Rage against the Platform: PalmOS

Brian Hernacki, Symantec Research Labs
Risks in Passive Network Discovery Systems

Kartik Trivedi, Foundstone
Advanced Google Hacking

Todd MacDermid, Jack Lloyd, and Kathy Wang
CUTLASS - Cryptographic Protection for Everyone's Voice and Data

Anthony Lineberry, Charles Hooper, & Jake Applebaum
Hacking Embedded Linux Devices

Joshua Teitelbaum & Peter Leung, CryptoMail.org
CryptoMail Encrypted E-Mail for All (Including Grandma)

Bruce Potter, The Shmoo Group
Wireless Location Services

Laurent Butti & Franck Veysset, France Telecom
Wireless Security

Mike Lynn, ISS
A Security Analysis of Voice over IP

Acidus
Privacy Implications of Magstripes

SEMINARS
This year ToorCon is offering a day of intensive Deep Knowledge Seminars
geared towards corporate attendees that are looking for a more intimate
environment for learning about today's high-tech security issues.

Keynote: Jon Callas, CTO, PGP

Jim Butterworth, Guidance Software
Incident Response: The Ultimate Network Defense

Scott Kennedy, SAIC
Mobile Cyber Warfare Training

Tom St Denis, Secure Science Corporation
Cryptanalysis in Society

Dan Kaminsky, Avaya
Applied Scanrand

------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:02 EDT