RadioShow12

From syn2cat - HackerSpace.lu
(Difference between revisions)
Jump to: navigation, search
m
Line 28: Line 28:
 
* {{RadioSong | Artist= |Album= | Title=| Website= | Duration= }}
 
* {{RadioSong | Artist= |Album= | Title=| Website= | Duration= }}
 
* Main entries into corporate networks, how it is currently done and how the Future could look like
 
* Main entries into corporate networks, how it is currently done and how the Future could look like
 +
** Social Networks
 +
** Hardware hacks
 +
** Social Hacks
 +
*** your offspring on you corporate LAN
 +
** Infiltrating new Staff via Temp contracts
  
 
=== Sources / Guide to further reading ===
 
=== Sources / Guide to further reading ===

Revision as of 19:07, 18 February 2010


<< back to the RadioShow page n/a

Add a new RadioShow
Radio.png
Cyberwarfare and Inn'terviews
Participants: kwisatz, SteveClement, annemannen
Recording: 2010/02/18 06:00:00 PM
Broadcast: 2010/02/20 01:00:00 PM
Podcast Release: 2010/01/20 02:00:00 PM
Podcast:
n/a
Tools
Songs: See list of all songs
QrCode: QR-ec3aab494cb013aa06c33cce936e9422.png



Structure

  • Jingle
  • Intro: Preview of today's show
  • Review and Outlook: The Hacker Calendar, what Conventions and Events are upcoming?

  • Hacker News
    • If applicable: New Projects at the space.
    • If applicable: Upcoming Workshops.
    • Tool news (cf. Linux Magazin)



  • Overview
  • Inn'terViews (Part I)
Song:
Artist
Title
Duration
Album
License
Description
Artist's website


  • Inn'terViews (Part II)
Song:
Artist
Title
Duration
Album
License
Description
Artist's website


  • Operation Aurora (Intro)
Song:
Artist
Title
Duration
Album
License
Description
Artist's website


  • Aurora, how it was done
Song:
Artist
Title
Duration
Album
License
Description
Artist's website


  • This and similar cyber-warfare threats
Song:
Artist
Title
Duration
Album
License
Description
Artist's website


  • Main entries into corporate networks, how it is currently done and how the Future could look like
    • Social Networks
    • Hardware hacks
    • Social Hacks
      • your offspring on you corporate LAN
    • Infiltrating new Staff via Temp contracts

Sources / Guide to further reading

Personal tools
Namespaces

Variants
Actions
Navigation
syn2cat
Hackerspace
Activities
Initiatives
Community
Tools
Tools