Matt -
We'd love to have pizza/soda provided at the meeting! We've had a pizza
sponsor in the past, but they've stopped showing up (and I haven't been
able to get a response to email).
People generally don't show up until about 5 minutes before, so having
the pizza there about then would be perfect. Historically, we usually
get anywhere from 10-30 people at the meetings, depending on the topic.
The larger groups are usually for topics about fun hardware things, so I
expect we'll probably have 10-15 people.
Thanks!
Steve Meyers
On 01/10/2017 11:20 AM, Kingdon, Matthew C wrote:
Ryan,
Thank you for the meeting announcement.
If it helps the meeting and the attendance to have pizza and soda at the
meeting, I would be glad to bring in some pizzas. If that is a distraction,
then no need to do this. I work for Ciber, a consulting company as well as a
reseller of infrastructure solutions - hardware, software, services. We
partner with Red Hat, IBM, HPE, Dell, Cisco, Lenovo and others to provide
technology solutions to clients.
If you would like pizza and soda/water, let me know your best guess on number
of people that will attend and what time you want pizza to be there and I will
get it done. If you want pizza at 6:30 or 7pm to get people there early or if
you want it at 8pm for a break from the presentation, just let me know what is
best.
Matt Kingdon
Senior Client Development Executive
Ciber, Inc.
t: 801.553.1369
m: 801.580.4320
[email protected]
www.ciber.com
www.ciber.com/us/index.cfm/technologies/ibm/
-----Original Message-----
From: [email protected] [mailto:[email protected]] On
Behalf Of Steve Meyers
Sent: Tuesday, January 10, 2017 10:40 AM
To: PLUG Announce List <[email protected]>
Subject: [PLUG-announce] January Meeting: Everything We Know About
CyberSecurity is Wrong (Ryan Byrd)
Date: Tuesday, January 17th
Time: 7:00pm
Location: UVU Business Resource Center
The exploits and security breaches which are technically feasible and the ones
that actually occur in the wild are two very different things. There are two
common, bad assumptions: one, that people choose random passwords and two, that
passwords are broken with dumb brute force. Neither of those assumptions are
correct. Brute force attacks are never used on passwords of longer than six
characters because it takes too long. So instead, hackers use word list attacks
that combine list of words gathered from hacked passwords, Wikipedia, the
Gutenberg Project and YouTube comments and then combine those words in unique
ways (https://hashcat.net/wiki/doku.php?id=oclhashcat has over 5100 rules to do
this). This so-called intelligent brute force reduces the candidate key space
and makes attacks possible on 55 character or longer passwords.
Ryan is a computer engineer working at the base of the Rocky Mountains.
Sometimes he solves hard problems, builds embedded devices, creates web
applications and automates processes for good people. Sometimes he just keeps
bees. He's very busy and important.
Just go in the front doors, and follow the signs. We're usually in a conference
in the back of the main floor.
http://plug.org/uvu has directions and a map
/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug-announce
Don't fear the penguin.
*/
/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/
/*
PLUG: http://plug.org, #utah on irc.freenode.net
Unsubscribe: http://plug.org/mailman/options/plug
Don't fear the penguin.
*/