Hack.lu
   HOME
*



picture info

Hack.lu
hack.lu (also written as HACKLU) is a yearly computer security conference held in Luxembourg that brings together a variety of people interested in information security. It's organized by the Computer Incident Response Center Luxembourg (CIRCL), the country's CERT for the private sector, communes and non-governmental entities. History The first conference was organized in 2005 and held its 10th edition in 2014. In the scope of European information security conferences, hack.lu is one of the oldest conferences running. Content and organisation Where other conferences often provide day-long training sessions, Hack.lu chooses a different model by filling its first few days with workshops, enforcing a strong focus on practical things. The aim of the convention is to make a bridge of the various actors in the computer security world, by discussing and presenting on topics like computer security, privacy, information technology and its cultural/technical implication on society. CTF ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Security Conference
A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts. Events Common activities at hacker conventions may include: * Presentations from keynote speakers or panels. Common topics include social engineering, lockpicking, penetration testing, and hacking tools. * Hands-on activities and competitions such as capture the flag (CTF). * "Boot camps" offering training and certification in Information Technology. List of general computer security conferences General security conferences might be held by non-profit/not-for-profit/for-profit professional associations, individuals or informal group of individuals, or by security product vendor companies. * 44Con An Infosec conference and training event that occurs annually in London, UK. * ACM-CCS (Conferences on Computer and Communications Security), security conference held sinc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Luxembourg
Luxembourg ( ; lb, Lëtzebuerg ; french: link=no, Luxembourg; german: link=no, Luxemburg), officially the Grand Duchy of Luxembourg, ; french: link=no, Grand-Duché de Luxembourg ; german: link=no, Großherzogtum Luxemburg is a small landlocked country in Western Europe. It borders Belgium to the west and north, Germany to the east, and France to the south. Its capital and most populous city, Luxembourg, is one of the four institutional seats of the European Union (together with Brussels, Frankfurt, and Strasbourg) and the seat of several EU institutions, notably the Court of Justice of the European Union, the highest judicial authority. Luxembourg's culture, people, and languages are highly intertwined with its French and German neighbors; while Luxembourgish is legally the only national language of the Luxembourgish people, French and German are also used in administrative and judicial matters and all three are considered administrative languages of the cou ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge). Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves: * identifying inform ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Computer Emergency Response Team
A computer emergency response team (CERT) is an expert group that handles computer security incidents. Alternative names for such groups include computer emergency readiness team and computer security incident response team (CSIRT). A more modern representation of the CSIRT acronym is Cyber Security Incident Response Team. History The name "Computer Emergency Response Team" was first used in 1988 by the CERT Coordination Center (CERT-CC) at Carnegie Mellon University (CMU). The term CERT is registered as a trade and service mark by CMU in multiple countries worldwide. CMU encourages the use of Computer Security Incident Response Team (CSIRT) as a generic term for the handling of computer security incidents. CMU licenses the CERT mark to various organizations that are performing the activities of a CSIRT. The history of CERT, and of CSIRTS, is linked to the existence of malware, especially computer worms and viruses. Whenever a new technology arrives, its misuse is not long in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Capture The Flag (cybersecurity)
Capture the Flag (CTF) in computer security is an exercise in which "flags" are secretly hidden in purposefully- vulnerable programs or websites. It can either be for competitive or educational purposes. Competitors steal flags either from other competitors (attack/defense-style CTFs) or from the organizers (jeopardy-style challenges). Several variations exist. Competitions can including hiding flags in hardware devices, they can be both online or in-person, and can be advanced or entry-level. The game is based on the traditional outdoor sport of the same name. History Capture the Flag (CTF) is a cybersecurity competition that is used as a test of security skills. It was first developed in 1993 at DEFCON, the largest cybersecurity conference in the United States hosted annually in Las Vegas, Nevada. The conference hosts a weekend of cybersecurity competitions including CTF. There are two ways CTF can be played: Jeopardy and Attack-Defense. Both formats test participant’s knowl ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Ruhr-University Bochum
The Ruhr University Bochum (, ) is a public research university located in the southern hills of the central Ruhr area, Bochum, Germany. It was founded in 1962 as the first new public university in Germany after World War II. Instruction began in 1965. The Ruhr-University Bochum is one of the largest universities in Germany and part of the Deutsche Forschungsgemeinschaft, the most important German research funding organization. The RUB was very successful in the Excellence Initiative of the German Federal and State Governments (2007), a competition between Germany's most prestigious universities. It was one of the few institutions left competing for the title of an "elite university", but did not succeed in the last round of the competition. There are currently nine universities in Germany that hold this title. The University of Bochum was one of the first universities in Germany to introduce international bachelor's and master's degrees, which replaced the traditional German D ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Security Conferences
A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a nominally complete computer that includes the hardware, operating system (main software), and peripheral equipment needed and used for full operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster. A broad range of industrial and consumer products use computers as control systems. Simple special-purpose devices like microwave ovens and remote controls are included, as are factory devices like industrial robots and computer-aided design, as well as general-purpose devices like personal computers and mobile devices like smartphones. Computers power the Internet, which links bill ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]