SlideShare a Scribd company logo
Good Engineering
is good enginee
the balanced engineer
HKN SLC 2016
@dugsong
about me
about me
ethics
“software is eating the world”
– Marc Andreesen
WSJ, Aug 2011
D&D builds character(s)
Breaks rulesPlays by rules
Helpful
Harmful
ChaoticLawful
Good
Evil
security and responsibilitydevious
tactics!
creative

m
isuse!
Lawful Good Neutral Good Chaotic Good?
Lawful Neutral True Neutral Chaotic Neutral
Lawful Evil? Neutral Evil Chaotic Evil
Lawful Good Neutral Good Chaotic Good?
Lawful Neutral True Neutral Chaotic Neutral
Lawful Evil? Neutral Evil Chaotic Evil
Students Install Hot
Tub on North Campus
February 22, 2012
hacking UM
1999: birth of the hackathon
1999: disrupting the
music industry via IRC
1999: disrupting the
music industry via IRC
1999: disrupting the
music industry via IRC
hackers save the internet
hackers save the internet
hackers save the internet
Ju ne 10, 2010
the nonstop party
| Rolling Stone | 6564 | Rolling Stone | Ju ne 10, 2010
how three teenage friends, fueled
by sex, drugs and illegal code, pulled off
the biggest cybercrime of all time
// by sabrina rubin erdely
T
HEY’D BEEN HIGH ALL WEEKEND LONG – ON ECSTASY, COKE, MUSHROOMS AND
acid – so there seemed little harm in doing one last bump of
Special K while they packed up to leave their $5,000-a-night duplex
in South Beach. For the past three days, the three friends had bare-
ly bothered leaving their hotel, as a dozen club kids in town for Winter
Music Conference, the annual festival that draws DJs and ravers from
all over the world, flocked to their luxury suite to partake of the drug
smorgasbord laid out on the coffee table. But even stoned on industrial-
grade horse tranquilizers, Albert Gonzalez remained focused on business
– checking his laptop constantly, keeping tabs on the rogue operators
he employed in Turkey and Latvia and China, pushing, haranguing, issuing
hackersgone wild
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
----------------------------------------------------------------------------------------------------------
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
----------------------------------------------------------------------------------------------------------
Ju ne 10, 2010
the nonstop party
| Rolling Stone | 6564 | Rolling Stone | Ju ne 10, 2010
how three teenage friends, fueled
by sex, drugs and illegal code, pulled off
the biggest cybercrime of all time
// by sabrina rubin erdely
T
HEY’D BEEN HIGH ALL WEEKEND LONG – ON ECSTASY, COKE, MUSHROOMS AND
acid – so there seemed little harm in doing one last bump of
Special K while they packed up to leave their $5,000-a-night duplex
in South Beach. For the past three days, the three friends had bare-
ly bothered leaving their hotel, as a dozen club kids in town for Winter
Music Conference, the annual festival that draws DJs and ravers from
all over the world, flocked to their luxury suite to partake of the drug
smorgasbord laid out on the coffee table. But even stoned on industrial-
grade horse tranquilizers, Albert Gonzalez remained focused on business
– checking his laptop constantly, keeping tabs on the rogue operators
he employed in Turkey and Latvia and China, pushing, haranguing, issuing
hackersgone wild
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
----------------------------------------------------------------------------------------------------------
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
----------------------------------------------------------------------------------------------------------
Entrepreneurs, Ex-Cons, Billionaires
w00w00 in 2014
cypherpunks write code
“privacy is necessary for an open society in the electronic age”
Network Situational
Awareness with d00gle
Dug Song
dugsong@monkey.org
First private Microsoft BlueHat conference
Our Goals
Intelligence, Surveillance, Reconnaissance
Extract as much information as we can passively
Assemble it into a coherent relational database
Perform data correlation and analysis real-time
Support interesting queries and visualization of the data
Enable rapid prototyping of new traffic analysis tools
Maintain dsniff's tool-oriented modularity
Share the code (GPL) to encourage experimentation
Data collected
Login / authentication information
Phone numbers / calls
E-mail messages
Instant messages
WWW usage
Connection information
Host inventory: IP, mac address, hostname/DHCP name, OS
version, open ports / services / applications
Interactive / encrypted sessions
Exec briefing included live demo against MS
Future work
User / social network profiling
Semantic analysis of conversation data
Auto-focus
Speech transcription for full-text VOIP search? :-)
Other Big Brother stuff
Contributions and derived work from users like you!
Never released or productized, but…
lawful neutral? evil?
chaotic good?
exploit market$$$
ethics of responsibility
• Do not contribute with your work to
social harm.
• Contribute with your work to the
social good.
• These obligations stem from your
professional role.
Philip Rogaway,
“The Moral Character of Cryptographic Work”
2014: 600m users go dark
CYBERCRIME: $8B IN LOSSES SINCE 2008
Michigan firm sues bank over theft of $560,000
Experi-Metal says Comerica Bank's online security practices resulted in theft
February 12, 2010
A Michigan-based manufacturing firm is suing its bank after online crooks depleted the
company's account by $560,000 via a series of unauthorized wire transfers last year.
FDIC: Hackers took more than $120M in 3 months
March 08, 2010, 8:24 PM EST
Online banking fraud involving the electronic transfer of funds has been on the rise
since 2007 and rose to more than $120 million in the third quarter of 2009
Louisiana firm sues Capital One after losing
thousands in online bank fraud
December 7, 2009, 4:15 PM EST
An electronics testing firm in Louisiana is suing its bank, Capital One, alleging that
the financial institution was negligent when it failed to stop hackers from transferring
nearly $100,000 out of its account earlier this year.
Poughkeepsie, N.Y. slams bank for $378,000 online theft
February 8, 2010
The theft of $378,000 from the town of Poughkeepsie, N.Y. is prompting questions
about the responsibility of banks to protect customer accounts from online criminals.
In a statement last week , a town official revealed that thieves had broken into the
town's TD Bank account and transferred $378,000 to accounts in the Ukraine.
MALWARE & CYBERCRIME SUCCESS
Delaware FINCEN SARsAV-Test Malware Samples
DEMOCRATIZE SECURITY
by making it easy & effective
Mission
1/12
3/12
5/12
7/12
9/12
11/12
1/13
3/13
5/13
7/13
9/13
11/13
1/14
3/14
5/14
7/14
9/14
11/14
1/15
3/15
5/15
7/15
9/15
11/15
Doing Well by Doing GoodDuo by the numbers
Analyzing 1M
Endpoints
98% of Customers Would
Recommend Duo
Customers from
100+ Countries
200+ Apps
Supported
99.995%
Uptime
30+
Patents
2M+ Daily
Authentications
8000+
Customers
98% of Customers
Would Recommend
5000

Customers
Customers from
80+ Countries
3M+ Daily

Authentications
250+ Apps

Supported
20+

Patents
Duo by the numbers
Analyzing 1M
Endpoints
98% of Customers Would
Recommend Duo
Customers from
100+ Countries
200+ Apps
Supported
99.995%
Uptime
30+
Patents
2M+ Daily
Authentications
8000+
Customers
thank you!
lessons from crazy jack
< 20: Be A Good Student,

Learn to Learn
20s: Follow a Good Boss, 

Not a Company
30s: Try Working for Yourself,

Choose Best Field
40s: Be Aware Of and

Utilize Your Strengths
50s: Young People Lead;

Invest in Them

More Related Content

What's hot

FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)forensicsnation
 
2600 v06 n4 (winter 1989)
2600 v06 n4 (winter 1989)2600 v06 n4 (winter 1989)
2600 v06 n4 (winter 1989)
Felipe Prado
 
Internet ppt 2009
Internet ppt 2009Internet ppt 2009
Internet ppt 2009
Lisa Stack
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
Mark Fisher
 
B2B2-Chapter-2.pdf
B2B2-Chapter-2.pdfB2B2-Chapter-2.pdf
B2B2-Chapter-2.pdf
MnicaCarolinaNelson
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
VaishnaviPalkar
 

What's hot (8)

FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
2600 v06 n4 (winter 1989)
2600 v06 n4 (winter 1989)2600 v06 n4 (winter 1989)
2600 v06 n4 (winter 1989)
 
Internet ppt 2009
Internet ppt 2009Internet ppt 2009
Internet ppt 2009
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
B2B2-Chapter-2.pdf
B2B2-Chapter-2.pdfB2B2-Chapter-2.pdf
B2B2-Chapter-2.pdf
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Il2011 local
Il2011 localIl2011 local
Il2011 local
 
Forbidden Fruit
Forbidden FruitForbidden Fruit
Forbidden Fruit
 

Similar to The Balanced Engineer

News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
n|u - The Open Security Community
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
Комсс Файквэе
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
Felipe Prado
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
Mustufain Ahmed Ansari
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
MAXfocus
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
- Mark - Fullbright
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
homeworkping8
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
fasttrackcomputersol
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
ishmecse13
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
HackIT Ukraine
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudRay Brannon
 
Security
SecuritySecurity
Security
Bob Cherry
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
KALPITKALPIT1
 
2 Conferences in 1 hour
2 Conferences in 1 hour2 Conferences in 1 hour
2 Conferences in 1 hourIan Forrester
 

Similar to The Balanced Engineer (20)

News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
Security
SecuritySecurity
Security
 
Reflection
ReflectionReflection
Reflection
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
2 Conferences in 1 hour
2 Conferences in 1 hour2 Conferences in 1 hour
2 Conferences in 1 hour
 

More from Dug Song

Passwords Found on a Wireless Network
Passwords Found on a Wireless NetworkPasswords Found on a Wireless Network
Passwords Found on a Wireless Network
Dug Song
 
Ann Arbor Startup Development 2009
Ann Arbor Startup Development 2009Ann Arbor Startup Development 2009
Ann Arbor Startup Development 2009
Dug Song
 
Startups: The Extreme Sport of Business
Startups: The Extreme Sport of BusinessStartups: The Extreme Sport of Business
Startups: The Extreme Sport of Business
Dug Song
 
From the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing SecurityFrom the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing Security
Dug Song
 
A Hacker's Life
A Hacker's LifeA Hacker's Life
A Hacker's Life
Dug Song
 
Letter from Ann Arbor Residence Inn
Letter from Ann Arbor Residence InnLetter from Ann Arbor Residence Inn
Letter from Ann Arbor Residence Inn
Dug Song
 
Nidsbench - Network Intrusion Detection Test Suite
Nidsbench - Network Intrusion Detection Test SuiteNidsbench - Network Intrusion Detection Test Suite
Nidsbench - Network Intrusion Detection Test Suite
Dug Song
 
Entrepreneurs Foundation of Ann Arbor
Entrepreneurs Foundation of Ann ArborEntrepreneurs Foundation of Ann Arbor
Entrepreneurs Foundation of Ann Arbor
Dug Song
 
Monkey-In-The-Middle (2001)
Monkey-In-The-Middle (2001)Monkey-In-The-Middle (2001)
Monkey-In-The-Middle (2001)
Dug Song
 
Network Situational Awareness with d00gle
Network Situational Awareness with d00gleNetwork Situational Awareness with d00gle
Network Situational Awareness with d00gle
Dug Song
 
Silver Needle in the Skype
Silver Needle in the SkypeSilver Needle in the Skype
Silver Needle in the SkypeDug Song
 
Fragroute - NIDS Testing Revisited (2002)
Fragroute - NIDS Testing Revisited (2002)Fragroute - NIDS Testing Revisited (2002)
Fragroute - NIDS Testing Revisited (2002)
Dug Song
 
Intrusion Detection 101 (1999)
Intrusion Detection 101 (1999)Intrusion Detection 101 (1999)
Intrusion Detection 101 (1999)
Dug Song
 
SSH Traffic Analysis Attacks (2001)
SSH Traffic Analysis Attacks (2001)SSH Traffic Analysis Attacks (2001)
SSH Traffic Analysis Attacks (2001)
Dug Song
 
A Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityA Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityDug Song
 
A Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityA Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityDug Song
 
A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)
Dug Song
 
A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)
Dug Song
 
Ann Arbor Startup Community Development H1'09
Ann Arbor Startup Community Development H1'09Ann Arbor Startup Community Development H1'09
Ann Arbor Startup Community Development H1'09
Dug Song
 

More from Dug Song (19)

Passwords Found on a Wireless Network
Passwords Found on a Wireless NetworkPasswords Found on a Wireless Network
Passwords Found on a Wireless Network
 
Ann Arbor Startup Development 2009
Ann Arbor Startup Development 2009Ann Arbor Startup Development 2009
Ann Arbor Startup Development 2009
 
Startups: The Extreme Sport of Business
Startups: The Extreme Sport of BusinessStartups: The Extreme Sport of Business
Startups: The Extreme Sport of Business
 
From the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing SecurityFrom the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing Security
 
A Hacker's Life
A Hacker's LifeA Hacker's Life
A Hacker's Life
 
Letter from Ann Arbor Residence Inn
Letter from Ann Arbor Residence InnLetter from Ann Arbor Residence Inn
Letter from Ann Arbor Residence Inn
 
Nidsbench - Network Intrusion Detection Test Suite
Nidsbench - Network Intrusion Detection Test SuiteNidsbench - Network Intrusion Detection Test Suite
Nidsbench - Network Intrusion Detection Test Suite
 
Entrepreneurs Foundation of Ann Arbor
Entrepreneurs Foundation of Ann ArborEntrepreneurs Foundation of Ann Arbor
Entrepreneurs Foundation of Ann Arbor
 
Monkey-In-The-Middle (2001)
Monkey-In-The-Middle (2001)Monkey-In-The-Middle (2001)
Monkey-In-The-Middle (2001)
 
Network Situational Awareness with d00gle
Network Situational Awareness with d00gleNetwork Situational Awareness with d00gle
Network Situational Awareness with d00gle
 
Silver Needle in the Skype
Silver Needle in the SkypeSilver Needle in the Skype
Silver Needle in the Skype
 
Fragroute - NIDS Testing Revisited (2002)
Fragroute - NIDS Testing Revisited (2002)Fragroute - NIDS Testing Revisited (2002)
Fragroute - NIDS Testing Revisited (2002)
 
Intrusion Detection 101 (1999)
Intrusion Detection 101 (1999)Intrusion Detection 101 (1999)
Intrusion Detection 101 (1999)
 
SSH Traffic Analysis Attacks (2001)
SSH Traffic Analysis Attacks (2001)SSH Traffic Analysis Attacks (2001)
SSH Traffic Analysis Attacks (2001)
 
A Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityA Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm Activity
 
A Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm ActivityA Snapshot of Global Internet Worm Activity
A Snapshot of Global Internet Worm Activity
 
A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)
 
A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)A Stateful Inspection of Firewall-1 (2000)
A Stateful Inspection of Firewall-1 (2000)
 
Ann Arbor Startup Community Development H1'09
Ann Arbor Startup Community Development H1'09Ann Arbor Startup Community Development H1'09
Ann Arbor Startup Community Development H1'09
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

The Balanced Engineer

  • 1. Good Engineering is good enginee the balanced engineer HKN SLC 2016 @dugsong
  • 5. “software is eating the world” – Marc Andreesen WSJ, Aug 2011
  • 6.
  • 7.
  • 8. D&D builds character(s) Breaks rulesPlays by rules Helpful Harmful ChaoticLawful Good Evil
  • 9.
  • 11. Lawful Good Neutral Good Chaotic Good? Lawful Neutral True Neutral Chaotic Neutral Lawful Evil? Neutral Evil Chaotic Evil
  • 12. Lawful Good Neutral Good Chaotic Good? Lawful Neutral True Neutral Chaotic Neutral Lawful Evil? Neutral Evil Chaotic Evil
  • 13. Students Install Hot Tub on North Campus February 22, 2012
  • 14.
  • 16. 1999: birth of the hackathon
  • 17. 1999: disrupting the music industry via IRC
  • 18. 1999: disrupting the music industry via IRC
  • 19. 1999: disrupting the music industry via IRC
  • 20. hackers save the internet
  • 21. hackers save the internet
  • 22. hackers save the internet
  • 23.
  • 24.
  • 25. Ju ne 10, 2010 the nonstop party | Rolling Stone | 6564 | Rolling Stone | Ju ne 10, 2010 how three teenage friends, fueled by sex, drugs and illegal code, pulled off the biggest cybercrime of all time // by sabrina rubin erdely T HEY’D BEEN HIGH ALL WEEKEND LONG – ON ECSTASY, COKE, MUSHROOMS AND acid – so there seemed little harm in doing one last bump of Special K while they packed up to leave their $5,000-a-night duplex in South Beach. For the past three days, the three friends had bare- ly bothered leaving their hotel, as a dozen club kids in town for Winter Music Conference, the annual festival that draws DJs and ravers from all over the world, flocked to their luxury suite to partake of the drug smorgasbord laid out on the coffee table. But even stoned on industrial- grade horse tranquilizers, Albert Gonzalez remained focused on business – checking his laptop constantly, keeping tabs on the rogue operators he employed in Turkey and Latvia and China, pushing, haranguing, issuing hackersgone wild //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// ---------------------------------------------------------------------------------------------------------- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// ----------------------------------------------------------------------------------------------------------
  • 26. Ju ne 10, 2010 the nonstop party | Rolling Stone | 6564 | Rolling Stone | Ju ne 10, 2010 how three teenage friends, fueled by sex, drugs and illegal code, pulled off the biggest cybercrime of all time // by sabrina rubin erdely T HEY’D BEEN HIGH ALL WEEKEND LONG – ON ECSTASY, COKE, MUSHROOMS AND acid – so there seemed little harm in doing one last bump of Special K while they packed up to leave their $5,000-a-night duplex in South Beach. For the past three days, the three friends had bare- ly bothered leaving their hotel, as a dozen club kids in town for Winter Music Conference, the annual festival that draws DJs and ravers from all over the world, flocked to their luxury suite to partake of the drug smorgasbord laid out on the coffee table. But even stoned on industrial- grade horse tranquilizers, Albert Gonzalez remained focused on business – checking his laptop constantly, keeping tabs on the rogue operators he employed in Turkey and Latvia and China, pushing, haranguing, issuing hackersgone wild //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// ---------------------------------------------------------------------------------------------------------- //////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////// ----------------------------------------------------------------------------------------------------------
  • 28. cypherpunks write code “privacy is necessary for an open society in the electronic age”
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. Network Situational Awareness with d00gle Dug Song dugsong@monkey.org First private Microsoft BlueHat conference
  • 34. Our Goals Intelligence, Surveillance, Reconnaissance Extract as much information as we can passively Assemble it into a coherent relational database Perform data correlation and analysis real-time Support interesting queries and visualization of the data Enable rapid prototyping of new traffic analysis tools Maintain dsniff's tool-oriented modularity Share the code (GPL) to encourage experimentation
  • 35. Data collected Login / authentication information Phone numbers / calls E-mail messages Instant messages WWW usage Connection information Host inventory: IP, mac address, hostname/DHCP name, OS version, open ports / services / applications Interactive / encrypted sessions Exec briefing included live demo against MS
  • 36. Future work User / social network profiling Semantic analysis of conversation data Auto-focus Speech transcription for full-text VOIP search? :-) Other Big Brother stuff Contributions and derived work from users like you! Never released or productized, but…
  • 37.
  • 38.
  • 39.
  • 42.
  • 44. ethics of responsibility • Do not contribute with your work to social harm. • Contribute with your work to the social good. • These obligations stem from your professional role. Philip Rogaway, “The Moral Character of Cryptographic Work”
  • 45. 2014: 600m users go dark
  • 46. CYBERCRIME: $8B IN LOSSES SINCE 2008 Michigan firm sues bank over theft of $560,000 Experi-Metal says Comerica Bank's online security practices resulted in theft February 12, 2010 A Michigan-based manufacturing firm is suing its bank after online crooks depleted the company's account by $560,000 via a series of unauthorized wire transfers last year. FDIC: Hackers took more than $120M in 3 months March 08, 2010, 8:24 PM EST Online banking fraud involving the electronic transfer of funds has been on the rise since 2007 and rose to more than $120 million in the third quarter of 2009 Louisiana firm sues Capital One after losing thousands in online bank fraud December 7, 2009, 4:15 PM EST An electronics testing firm in Louisiana is suing its bank, Capital One, alleging that the financial institution was negligent when it failed to stop hackers from transferring nearly $100,000 out of its account earlier this year. Poughkeepsie, N.Y. slams bank for $378,000 online theft February 8, 2010 The theft of $378,000 from the town of Poughkeepsie, N.Y. is prompting questions about the responsibility of banks to protect customer accounts from online criminals. In a statement last week , a town official revealed that thieves had broken into the town's TD Bank account and transferred $378,000 to accounts in the Ukraine.
  • 47. MALWARE & CYBERCRIME SUCCESS Delaware FINCEN SARsAV-Test Malware Samples
  • 48. DEMOCRATIZE SECURITY by making it easy & effective Mission
  • 49. 1/12 3/12 5/12 7/12 9/12 11/12 1/13 3/13 5/13 7/13 9/13 11/13 1/14 3/14 5/14 7/14 9/14 11/14 1/15 3/15 5/15 7/15 9/15 11/15 Doing Well by Doing GoodDuo by the numbers Analyzing 1M Endpoints 98% of Customers Would Recommend Duo Customers from 100+ Countries 200+ Apps Supported 99.995% Uptime 30+ Patents 2M+ Daily Authentications 8000+ Customers 98% of Customers Would Recommend 5000
 Customers Customers from 80+ Countries 3M+ Daily
 Authentications 250+ Apps
 Supported 20+
 Patents Duo by the numbers Analyzing 1M Endpoints 98% of Customers Would Recommend Duo Customers from 100+ Countries 200+ Apps Supported 99.995% Uptime 30+ Patents 2M+ Daily Authentications 8000+ Customers
  • 51. lessons from crazy jack < 20: Be A Good Student,
 Learn to Learn 20s: Follow a Good Boss, 
 Not a Company 30s: Try Working for Yourself,
 Choose Best Field 40s: Be Aware Of and
 Utilize Your Strengths 50s: Young People Lead;
 Invest in Them