test

-------------- next part --------------
An HTML attachment was scrubbed...
URL: /pipermail/general_brlug.net/attachments/20050321/da005eb9/attachment.htm
From [EMAIL PROTECTED]  Mon Mar 21 22:29:04 2005
From: [EMAIL PROTECTED] (Joey Kelly)
Date: Mon Mar 21 22:24:59 2005
Subject: [Nolug] Re: [brlug-general] need feedback on security talk outline
In-Reply-To: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
        <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>

On Monday March 21 2005 20:12, -ray spake:
>
> One big omission I see is Social Engineering.  It's the easiest way to
> hack, and the most overlooked aspect of security (i like talking about
> Social Engineering).

Yeah, this is important.

>
> Some other topics you may want to mention.  These may be included in the
> topics you have already:

Thanks for the list. I'll see how much of this fits with my particular angle.

> User training

Hmm... you mean teaching users the rudiments of safe computing?

>
> Those topics came from a talk i gave to some MBAs on the managerial
> aspects of security.  There was also a section on how to think like a
> hacker.  If you want i can send it, it's .ppt but i created it in
> OpenOffice.

Sure, why not? Post it here for all to see?

Thanks.

-- 


Joey Kelly
< Minister of the Gospel | Linux Consultant >
http://joeykelly.net
GPG key fingerprint = 8F11 D859 81A6 DE8C 5429  4A07 7146 1AFD 5C41 161E


"I may have invented it, but Bill made it famous."
 --- David Bradley, the IBM employee that invented CTRL-ALT-DEL
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : /pipermail/general_brlug.net/attachments/20050321/b79da47d/attachment.bin
From [EMAIL PROTECTED]  Mon Mar 21 17:26:50 2005
From: [EMAIL PROTECTED] (Will Hill)
Date: Mon Mar 21 23:36:06 2005
Subject: [brlug-general] need feedback on security talk outline
In-Reply-To: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>

You might mention the following applications:  KDE Kwallet for password 
management, Guarddog, Guidedog and Smoothwall for packet filters and VPN.  
I'm not really qualified to judge the quality of these programs but they are 
intersting and I'm happy to use them.  There are also root kit detectors out, 
and Debian is pushing them by default but I have no idea how to use them.  

There's been a deluge of information about time to 0wnership of various 
operating systems and what uses owned computers are put to.  The good people 
at Honeynet and Slashdot have crammed several numbers into my head lately.

Do you have any rules of thumb about how to separate sensitive data from 
nonsensitive data?  




On Monday 21 March 2005 07:32 pm, Joey Kelly wrote:
> Guys,
>
> Here is an outline for a security talk I gave a few years ago. I am trying
> to update it  ...

Reply via email to