• About
  • Disclaimer

./

~ Shifts | Thoughts | Evolution | Innovation

Tag Archives: Orkut Hacks

Interview with global Hackerspaces Project!

15 Friday Oct 2010

Posted by Abhi Raj in Sectruni0

≈ Leave a comment

Tags

Biometrics, Encryption, Hack, Hackerspaces, Hacking, Indian Hacker Scene, Interview, Network Breach, Orkut Hacks, Social Networks, Twitter

Recently I had an interview with the international hackerspaces project called ‘Talking Anthropology’ on  Hackerspace Signal with varied spectrum of subjects including Indian hacker Space, Standard Related Issues Of India,  Blackberry case scenarios and varied InfoSec topics such as electronic voting machines, biometrics and cyber warfare!

The focus of the interview lies basically in the situation of India concerning hacker spaces and subjects. What’s interesting for a wider pubic of the world were the efforts of Indian government for biometrical recognition of citizens, electronic voting, Indian Tech Industry in comparison, connection to national or international hacker conferences, state of the Indian hacker scene, relationships between/position of the hacker scene and the society,  net neutrality in India, examples of hacktivism (maybe nationalism motivated attacks against Pakistan) …  etc. which i had hands on during the interview on the Signal!

A detailed post on the Interview Topics for a gain on, in much detail for wider audience would be posted soon as soon I get out of my hectic schedule. Till then let me know what topics you would like me to discuss in detail!

The detailed interview can be heard , or be downloaded from hackerspaces archieve http://signal.hackerspaces.org/archive/. An update on this can also be found on hackerspaces blog at http://blog.hackerspaces.org/. The schedule of the broadcast can been seen at  http://hackerspaces.org/wiki/Signal/Schedule.
TA16 – Indian Hackers [62:50m]

//Abhiraj

Advertisements

Twitter Updates

  • RT @DinisCruz: Here is the PDF of v0.31 of the 'Generation Z Developer' book blog.diniscruz.com/2018/03/pdf-of… Please read and let me know what you… 1 month ago
  • RT @JGamblin: Trustico: We want you to revoke 23,000 TLS certs. Digicert: We wont revoke the TLS certs unless there is a breach. Trustico… 1 month ago
  • RT @krishnan: Deciding between VMs, Containers and Serverless? This flow diagram may help. Thoughts? https://t.co/9tCqfoD1Nh 1 month ago
  • @Joi @Joi - Hello Joi, can we get an opportunity to submit an abstract today pls. Unfortunately, missed the timelin… twitter.com/i/web/status/9… 1 month ago
  • RT @tiraniddo: My book's finally here, just in time for Xmas. Thanks to @billpollock and @nostarch for all their time and effort as well as… 4 months ago

Archives

  • September 2011
  • April 2011
  • October 2010
  • September 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010

Search IT!

Advertisements

Recent Entries

  • TRAI’s initiative gripped on towards ‘Regulation on Cloud for Industry’..
  • ‘Parallelized’ Data Mining (PDM) Security..
  • Interview with global Hackerspaces Project!
  • LIGATT site vulnerable under basic injection technique!
  • ENISA’s Risk Summary Of Cloud Computing
  • Cloud Computing – It’s not ‘WHAT’ but ‘HOW’ we do things…
  • Social Networking: Privacy and Security…
  • What does a processor does when it doesn’t spends time in ‘USER ACTIVITIES’…
  • Under illumination variations, exploiting 3D image for ‘Face Authentication’ in Biometrics…
  • A glimpse on how ‘PHISHERS’ take over Corporate Network initializing with ‘Social Networks’…

Cloud Space

Biometrics Cloud Cloud Computing Cloud Computing Security Cloud Security Cloud Spectrum Computer Security Cracking Cryptography CSRF DHA Encryption Facebook GOI Hack Hackerspaces Hacking Indian Hacker Scene Injections Interview Kernel Network Network Breach NSA Orkut Hacks Parallel Computing Security PGP Phishing Processes Protocol Breach Regulation Social Networks Twitter

Blog at WordPress.com.

Cancel