Friday, April 5, 2002
Room A, Room B
11:00
12:00
Doors open
Registration begins
13:00
Martin L. Shoemaker: "
.NET is an Elephant
"
Donald R. Glass: "
Assessing and Enhancing Windows 2000 Security Using in-box Tools
"
13:00
14:00
Jerry Dempsey: "
The Anatomy of a Hack
"
14:00
15:00
Jim Yuill: "
Using Military Intelligence Techniques for Incident Responce Investigation
"
Aviram Jenik: "
Bypassing the Firewall: Application Level Attacks
"
15:00
16:00
Matthew S. Hamrick: "
Using XML as a Transport for Secure Assertions
"
Andrzej Jan Taramina: "
We're not in Kansas any more, Toto! The Mobile GPS Demonstration Platform (MGDP) Project
"
16:00
17:00
Tom Mason: "
802.11: Form, Function, Use and Security
"
Myself: "
Introduction to digital transmission systems and maybe other neat stuff
"
17:00
18:00
18:45
Welcome to Rubi Con 2002: A brief introduction
Thanks for coming, everyone!
19:00
Keynote address:
Dark Tangent
20:00
21:00
Dead Addict: "
Sucessfully leaking evidence of corporate crime
"
22:00
Michael Ossmann: "
Thin Client Security: How Citrix or Tarantella Can Make or Break a Great Strategy
"
Michael Lucas: "
SNMP-based Network Monitoring
"
22:00
23:00
Luke Kanies: "
Concentrating on LDAP
"
Mikko H. Hyppönen: "
Wireless Viruses: Content security on Smartphones and PDAs
"
23:00
24:00
Win NFF's T-Shirts, Round I
Admin-X-: "
New Technology File System and Alternate Data Streams
"
24:00
Saturday, April 6, 2002
Room A, Room B
01:00
Jenn Vesperman: "
Linux PAM
"
01:00
02:00
rious: "
Physical Security and the Enterprise Network
"
Darkcube: "
GOT ALL MAH' HOES ON LOCKDOWN...
"
02:00
03:00
04:00
05:00
06:00
07:00
08:00
09:00
Jeremy Hunsinger: "
It's About US: The Political Dimensions of Internet Security
"
Ryan Fox: "
Secure Web Application Design
"
09:00
10:00
Richard Thieme: "
The Truth About Life, Hacking and...
"
Clif Flynt: "
Configuring a Linux firewall with IPChains
"
10:00
11:00
Glenn Jacobson: "
Thin Clients and the Future of Linux
"
Clif Flynt: "
Confiuring a Linux Firewall
"
11:00
12:00
Dennis Salguero: "
MySQL Administration
"
Karl Mozurkewich: "
The Ownership of You: Peer-to-Peer
"
12:00
13:00
Frank Keeney: "
Sniffing 802.11b for fun and profit
"
Jason Scott: "
BBS: Always and Forever
"
13:00
14:00
Mark Epstein: "
Examining the Challenges Associated with Network Security Policy Implementation
"
Jesse Lovelace: "
Secure Real-Time Messaging
"
14:00
15:00
Kyle Amon: "
Building and Managing Firewall/VPN Systems with OpenBSD
"
Seth Hardy: "
Distributed Cracking of Elliptic Curve Cryptosystems
"
15:00
16:00
Lars Hecking: "
Development and Application of AMaViS, an Email Virus Scanner
"
Joshua Teitelbaum: "
CryptoMail: Pervasive and Transparent Email Cryptography for all
"
16:00
17:00
Dr. Gordon B. Agnew: "
Elliptic Curve Cryptography: What is it and Why do we Need it?
"
Paul "Froggy" Schneider: "
Computing considerations in an educational environment
"
17:00
18:00
Dave Piscitello: "
Debugging IPsec
"
Jose Nazario: "
Secure Shell Session Keys: How Random is Random?
"
18:00
19:00
plastek: "
Linux Kernel Security Basics
"
Sarah Loyd: "
Running and configuring BIND securely
"
19:00
20:00
Bill Cheswick: "
Mapping the Internet and Intranets
"
David Sugar: "
DotGNU and you, the future of free software web services
"
20:00
21:00
Richard Forno: "
An Armchair General's Guide to Information Warfare
"
Chad Margita: "
TCSM and Security Measures
"
21:00
22:00
Mike O'Connor: "
Everything you know about Unix Vendor Security is a Myth
"
Bill Marquette: "
A conceptual approach to application security
"
22:00
23:00
Project Nexus: "
PND Demonstration
"
Jon Erickson: "
The Password Probability Matrix: A winnowing method for brute-force password cracking using lossy compression
"
23:00
24:00
Cybertr0n: "
The Ins and Outs of Being Caught: A Personal Story of Celco 51
"
Triax: "
UPnP: Microsoft's 'holey' vision
"
24:00
Sunday, April 7, 2002
Room A, Room B
01:00
Win NFF's T-Shirts, Round II
Mobsters: "
Hacking your Urine: A guide to passing drug tests
"
01:00
03:00
George Hotelling: "
War Dialing in the 21st Century
"
03:00
04:00
05:00
06:00
07:00
08:00
09:00
John Mozena: "
Why Haven't We Solved Spam Yet?
"
Mark Hayden: "
Commodity Hardware-based Scalable Storage Systems
"
09:00
10:00
Christopher R. Hertel: "
Crossing Proprietary Software Boundaries with Samba and its Ilk
"
Walter B. Ligon III: "
Beowulf: Coming Out of the Underground
"
10:00
11:00
Dan Kivel: "
Voice over IP and the Horrors of NT
"
Maxime Labelle: "
Secure Tunneling With IPSec
"
11:00
12:00
Ron Gage: "
Reverse Engineering a Proprietary Industrial Communications Protocol using Linux
"
Sir Ace: "
Corporate Networking: NIS, DNS, NFS, clustering, and blahness in the void
"
12:00
13:00
Lewis McCarthy: "
Microsoft Passport and the Quest for Single Sign-On
"
Vladimir Dergachev: "
Evolution of Open Source Projects
"
13:00
14:00
Sebastien Tricaud: "
Analysis of Port Scanning Methods
"
Allen P. Numerick: "
Securing Your Box Beyond the Firewall Policy
"
14:00
15:00
Closing ceremonies
Prizes, props, and thanks for coming!
16:00
Violent expulsion of remaining attendees