tag:blogger.com,1999:blog-14114712.post114530508015549333..comments2024-03-03T02:04:07.138-08:00Comments on ADD / XOR / ROL: halvar.flakehttp://www.blogger.com/profile/12486016980670992738noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-14114712.post-1145541962795618852006-04-20T07:06:00.000-07:002006-04-20T07:06:00.000-07:00Being read by a nice looking security star is alwa...Being read by a nice looking security star is always an ego boost! Thanks Halvar for your nice words.<BR/><BR/>While I do not like being despised by most "vocal" security people (mailing lists, blogs, ...) for being a security consultant, I do not believe "real" hacking has its place in security conferences.<BR/><BR/>Once upon a time it could be nice to have someone talk about real world methodologies (I found the excel file with all the passwords), but it would get old really fast (I found the domino database/text file/nis domain/unprotected ldap server with all the passwords).<BR/><BR/>The only fun part is in hacking custom stuff, but you can't talk about this.<BR/><BR/>Watching a talk about uninitialized local variables, even if I know I'll never need this knowledge in "real life", is way more exciting than another honeypot talk.Emiliehttps://www.blogger.com/profile/02797926977491227751noreply@blogger.com