t2.fi
CFP | t2 infosec conference
http://t2.fi/category/cfp
Important Information for Speakers. Call for Papers 2016. If you are tired of any of the following: 1) conferences where coffee service equals one coupon (= cup) per day, 2) conferences with crazy-ass lines making world’s busiest transit hubs seem like a pleasurable life experience, 3) conferences showcasing talks indistinguishable from sponsored content, or 4) conferences which overcharge and underdeliver, please continue reading. While Helsinki cannot offer you sunshine, resorts or palm trees, we can c...
t2.fi
t2'12 Challenge | t2 infosec conference
http://t2.fi/challenge/t212-challenge
Important Information for Speakers. The challenge is over. A well known carder gang needs to be found and taken down, and it requires an investigator with ninja skills to do it. Based on previously gathered intelligence, each gang member possess a piece of an image file that is known to be incriminating evidence and enough to put the whole gang behind bars. The only lead we have is the homepage of a young woman. As soon as you find a PNG image, browse to http:/ t2.fi/ext/2012/challenge. The answer must h...
t2.fi
Challenge | t2 infosec conference
http://t2.fi/challenge
Important Information for Speakers. The purpose of the t2 Challenge is to have an opportunity to win free tickets to the upcoming conference. The rules are simple: the first one to solve the Challenge will win a free ticket to the t2 conference. In addition to this, the Advisory Board will select another winner from among the next ten correct answers. The criteria for the other selection is the elegance of the answer. In short, you can win with both speed and style :). Peter Kosinar, Slovakia (first one ...
t2.fi
t2'11 Challenge | t2 infosec conference
http://t2.fi/challenge/t211-challenge
Important Information for Speakers. The challenge is over. This year you are facing a multistage Challenge. Each stage contains a hidden URL. Browse to the URL and input your email address to receive a link to the next stage. Once you have solved all the stages, send a description of your solution to the email address you received in the last email. Rules of the Challenge. Anybody can participate, excluding the organizers and employees of the company that made the challenge. All rights are reserved.
t2.fi
t2'15 call for papers | t2 infosec conference
http://t2.fi/2015/06/01/call-for-papers-2015
Important Information for Speakers. Call for Papers 2015. Why spend your valuable conference time in the longest lines you have seen in your life, getting a sun burn or totally lost in the canals with your rental boat, being deprived of chewing gum or waking up in Nong Palai without any recollection how you got there? Helsinki offers you the safe and comfortable low-temperature alternative with a chance of first snow. Finland, the home country of many things you thought came from Japan.
t2.fi
Sponsors | t2 infosec conference
http://t2.fi/sponsors
Important Information for Speakers. T2 was born at a time when there was a need for a conference that was from hacker to hacker. When there was not one single independent, technically oriented, information security conference in Finland in existence. By and large, while there is a focus on newly emerging information security research, presentations at the conference address all aspects of information security, from auditing, to pen-testing, to security and defensive strategies. The presenters are not...
t2.fi
Budgets, t2 and IMSI catchers | t2 infosec conference
http://t2.fi/2015/01/03/budgets-t2-and-imsi-catchers
Important Information for Speakers. Budgets, t2 and IMSI catchers. Looking back at the past couple of years, the content has, more than once, been ahead of the times. A recent example would be the IMSI catcher hulabaloo. In Norway a couple of months after @raviborgaonkar. 8216;s and Swapnil’s t2 presentation. 8220;It must be obvious… that there is a contradiction in wanting to be perfectly secure in a universe whose very nature is momentariness and fluidity.”. 8212; Alan Watts, The Wisdom of Insecurity.
t2.fi
t2'08 Challenge | t2 infosec conference
http://t2.fi/challenge/t208-challenge
Important Information for Speakers. The challenge is over. Upon execution, T208-CHALLENGE.EXE. Rules of the Challenge. Anybody (except organizers and employees of the company that made the challenge) can participate. The answer must have a detailed description of methods and tools used. It is not allowed to publish the solution on public forums. It is not allowed to modify or distribute the binary. All rights are reserved. Filesize: 2 420 611 bytes. Nishad Herath / Novologica. October 27 - 28, 2016.
t2.fi
Fortuna Huiusce Diei | t2 infosec conference
http://t2.fi/2015/06/27/fortuna-huiusce-diei
Important Information for Speakers. Making predictions is easy when you have friends in low places. They indeed helped us secure a solid 5/5 performance for our 2015. Already during H1. It’s all about making your own luck –. Lady Fortune is not that random when you know what’s happening in the operational area. To summarize what has happened during the past few months:. The doomsday clock was moved closer to midnight. We got vulns with funny. This brings us to the CFP. Call for Papers 2015.