Submit Search
Upload
Marc Heuse. Responsiveness and Responsibility
•
0 likes
•
1,174 views
Positive Hack Days
Follow
Technology
Education
Report
Share
Report
Share
1 of 22
Recommended
Internet security
Internet security
rfukunaga
System-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
Hacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
ASSIST - Fraud Presentation
ASSIST - Fraud Presentation
ASSIST ladies networking group
Malware
Malware
Diven Chen
Online safety and security
Online safety and security
jovellconde1
Recommended
Internet security
Internet security
rfukunaga
System-Security-acit-Institute
System-Security-acit-Institute
ACIT Education Pvt Ltd
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
Internet Safety Glossary of Terms
Internet Safety Glossary of Terms
mikel_l
Hacking and virus presentation
Hacking and virus presentation
Phương Anh Pađi
ASSIST - Fraud Presentation
ASSIST - Fraud Presentation
ASSIST ladies networking group
Malware
Malware
Diven Chen
Online safety and security
Online safety and security
jovellconde1
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
khalavak
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
guesta04b0
Secure Coding 2013
Secure Coding 2013
The eCore Group
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
Paris Open Source Summit
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Nargis Parveen
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Nancy Wright White
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Marc Canter
Computer And Internet Security
Computer And Internet Security
Ashley Zimmerman
Computer And Internet Security
Computer And Internet Security
JFashant
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
Security by Weston Hecker
Security by Weston Hecker
EC-Council
Data management and office communication
Data management and office communication
Romulo Lopez
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Positive Hack Days
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Positive Hack Days
More Related Content
Similar to Marc Heuse. Responsiveness and Responsibility
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
khalavak
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
hack33
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
guesta04b0
Secure Coding 2013
Secure Coding 2013
The eCore Group
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
Paris Open Source Summit
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
Blake Carver
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Avansa Mid- en Zuidwest
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Nargis Parveen
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
xererenhosdominaram
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Nancy Wright White
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Marc Canter
Computer And Internet Security
Computer And Internet Security
Ashley Zimmerman
Computer And Internet Security
Computer And Internet Security
JFashant
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Kimberley Dray
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
David Perkins
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Being Uniq Sonu
Security by Weston Hecker
Security by Weston Hecker
EC-Council
Data management and office communication
Data management and office communication
Romulo Lopez
Similar to Marc Heuse. Responsiveness and Responsibility
(20)
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
Workshop A, Keith De La Rue, E2.0
Workshop A, Keith De La Rue, E2.0
Secure Coding 2013
Secure Coding 2013
OWF14 - Project & Community Driving : Community management of a free software...
OWF14 - Project & Community Driving : Community management of a free software...
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptx
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Introduction To Designing Online Community Nov09
Introduction To Designing Online Community Nov09
Emerce ver. Sept'08-How To Build The Open Mesh
Emerce ver. Sept'08-How To Build The Open Mesh
Computer And Internet Security
Computer And Internet Security
Computer And Internet Security
Computer And Internet Security
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Thinking Differently About Security Protection and Prevention
Thinking Differently About Security Protection and Prevention
Ethi mini1 - ethical hacking
Ethi mini1 - ethical hacking
Security by Weston Hecker
Security by Weston Hecker
Data management and office communication
Data management and office communication
More from Positive Hack Days
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Positive Hack Days
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Positive Hack Days
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
Positive Hack Days
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
Positive Hack Days
Использование анализатора кода SonarQube
Использование анализатора кода SonarQube
Positive Hack Days
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
Positive Hack Days
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Positive Hack Days
Автоматизация построения правил для Approof
Автоматизация построения правил для Approof
Positive Hack Days
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Positive Hack Days
Формальные методы защиты приложений
Формальные методы защиты приложений
Positive Hack Days
Эвристические методы защиты приложений
Эвристические методы защиты приложений
Positive Hack Days
Теоретические основы Application Security
Теоретические основы Application Security
Positive Hack Days
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
Positive Hack Days
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Positive Hack Days
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
Positive Hack Days
Формальная верификация кода на языке Си
Формальная верификация кода на языке Си
Positive Hack Days
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
Positive Hack Days
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
Positive Hack Days
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
Positive Hack Days
More from Positive Hack Days
(20)
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
Использование анализатора кода SonarQube
Использование анализатора кода SonarQube
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Автоматизация построения правил для Approof
Автоматизация построения правил для Approof
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Формальные методы защиты приложений
Формальные методы защиты приложений
Эвристические методы защиты приложений
Эвристические методы защиты приложений
Теоретические основы Application Security
Теоретические основы Application Security
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
Формальная верификация кода на языке Си
Формальная верификация кода на языке Си
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
Recently uploaded
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Zilliz
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
apidays
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Recently uploaded
(20)
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Marc Heuse. Responsiveness and Responsibility
1.
“Nobody knows” Marc “van
Hauser” Heuse The Hacker’s Choice / www.thc.org
2.
3.
4.
Security & Hacking are
changing
5.
BBS, Text Files, Groups, VMBs, local meetings
6.
Mailing Lists, e-Magazines, Groups, national meetings
7.
Web, Blogs, Books, Mailing
Lists, international Conferences, Training Courses, University Classes, …
8.
9.
Hardware Internet Pentesting Mainframes Binary DisassemblingExploitation Networking
& Routers Crypto Analysis, Crypto Implementation Large complex Apps (SAP, Oracle, SCADA, …) Standards, Policies & Procedures Telephony Forensics Social Engineering Malware / Anti-Malware Webapp Pentests Source Code Audits
10.
=> Anonymity => Specialisation =>
Lone Wolfs
11.
12.
13.
Great Hackers & Visionary Projects
14.
This makes you
successful 1. fun & passion 2. concentrate 3. naive rebel 4. teach yourself 5. talk, share & connect 6. don‘t be an asshole 7. выучить английский язык!
15.
Visionary Projects?
16.
Why?
17.
How?
18.
What?
19.
1. 2+ strong
founders 2. Passion – no ego 3. Communicate Vision 4. Easy to join & contribute This makes projects successful
20.
21.
1. My name
is … 2. I come from <city> 3. I know about: A, B, C, … 4. I want to learn about: A, …
22.
.