Open Security: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
* Jart Armin - StopBadware volunteer, security researcher | * Jart Armin - StopBadware volunteer, security researcher | ||
* Debbie Doerrlamm - StopBadware volunteer | * Debbie Doerrlamm - StopBadware volunteer | ||
* James McQuaid - Snort Inline & Smoothwall | * James McQuaid - Snort Inline & Smoothwall | ||
James maintains the open source [http://doc.emergingthreats.net/bin/view/Main/SnortConfSamples SnortConfigSamplesProject] at EmergingThreats.net. | |||
As a contractor working against a large scale hack of a major U.S. university, he provided the university | |||
with the intruders' name, photograph, address, and online accounts. | |||
James is now employed by a well known biomedical, charitable organization. | |||
Revision as of 18:01, 3 May 2008
Open Security: Harnessing the Generative Internet for the Public Good
Organizers:
- Erica George - StopBadware staff
- Jart Armin - StopBadware volunteer, security researcher
- Debbie Doerrlamm - StopBadware volunteer
- James McQuaid - Snort Inline & Smoothwall
James maintains the open source SnortConfigSamplesProject at EmergingThreats.net. As a contractor working against a large scale hack of a major U.S. university, he provided the university with the intruders' name, photograph, address, and online accounts. James is now employed by a well known biomedical, charitable organization.
The generativity of the internet is its greatest strength, and also its greatest weakness. How can we harness the collective power of collaborative innovation to combat the uglier side of what openness brings to the net? StopBadware aims to use community action to fight badware. How have StopBadware and other groups used - or could potentially use - the Internet's generativity to help protect users from malware and related issues?
We're planning a flexible, informal workshop.