FS2600 August 2009. News/Announcements Defcon Site fail Contact info.

Slides:



Advertisements
Similar presentations
The Internet: Educates Us Entertains Us Connects us False information
Advertisements

What Homeowners Need to Learn About Lock Security Joseph Kingma Medeco Security Locks.
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Lockpicking & Physical Security Deviant Ollam A Security Fable American 700 Padlock Solid design Serrated pins Interchangeable cores.
Kwikset Rekey Ultramax Rekeying the Ultramax by Kwikset this presentation is designed for beginners.
Section 2.2 – Locks and Keys Digital security often begins with physical security… 1.
Public Affordable Housing and Community Training (PAHCT) Engagement Study High-Level Findings Report.
Internet Security Passwords.
What is Welzoo? For every day that you visit the site, Welzoo will donate $0.03 to our organization at no cost to us – This money comes from sponsors and.
10 DEEP Your Best Friend A B C D E F G H I Jobless.
Lock Picking Michael Lee Math 187 Spring Lock Picking and Cryptanalysis Cryptanalysis is the study of techniques that facilitate the deciphering.
You Want Me To Do What? Part 2 Presented by Keystone Computer Concepts
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Sections 2.1 Physical Protection and Attacks 2.2 – Locks and Keys Digital security often begins with physical security… 1.
PASSWORD MANAGEMENT MADE EASY A Project Play Date - September 26, 2008 Beth Carpenter, Library Services Manager, Outagamie Waupaca Library System.
Decoding the Kwikset SmartKey™ Shmoocon 2009 Shane Lawson
MLO’s Make It Easy For Borrowers To Understand Your Loan Proposals With The LoanQConnect Mortgage Calculator.
Chapter 6.  Natural environmental threats  Supply system threats  Manmade threats  Politically motivated threats.
Week 11 - Friday.  What did we talk about last time?  Security planning  Risk analysis  Security policies.
Mischief:  Definition – to willfully destroy or damage property or data; interfering with the lawful use of property or data; interfering with any person.
The Reality of Identity Theft Dan Clements CardCops CBAI Sept 26, 2009.
People do business with people they know, like and trust! If They remember you and what you do for a living!
Computer Crime Confucius say: "Cracker who gets busted doing one of these crimes, will spend long time in jail house soup."
Georgia Protecting Your Vision The Small Nonprofit’s Guide to Insurance Communities in Schools Georgia Network.
 There are many games to play on at sploder.com especially this series they are called the Square Head Adventures. If you type Sploder Gametastico.
Information provided by Microsoft CYBERETHICS.
◦ Overview of the business ◦ Trends of the business ◦ Key strengths and weaknesses ◦ Major Issues ◦ Competitors and potential competition.
…. Make It Easy For Borrowers To Understand Your Loan Proposals With The LoanQConnect Mortgage Calculator.
CONTROL OF HAZARDOUS ENERGY. Types of Energy To Be Controlled  Kinetic – Energy of motion  Potential – Energy of position  Electrical – From generated.
Staying Safe Lesson Purpose: To review ways students can stay safe. Grades 1, 2, 3.
FAQs: Big Questions from Our Hearts and Minds Is There Anything that Could Make God Love Me More or Less? Romans 8:28–39.
Teens Against Bullying Mrs. Harry’s Advisory Class.
The 9 digital elements By : Rana Asaad Class : 6E.
Attack the Key Own the Lock
The Cornerstone Method
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Attack the Key Own the Lock
By: Asfa Khan and Huda Mukhtar
Attack the Key Own the Lock by datagram & Schuyler Towne Defcon 18 (2010)‏ Las Vegas, NV.
PAGE 1 Aleks Security Cyber Security Inc Nov 7 Understanding the virtual & physical.
Locksport An Emerging Subculture By Schuyler Towne DEFCON 15 Aug
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Staying Secure Online How do we buy and sell safely on the Internet?
Technology Education THE PERSONAL COMPUTER (PC) SOFTWARE PART 2.
Google and the Cloud Review. Definition The Cloud refers to anything that involves delivering hosted services over the internet.
Safety in the digital world. Survey Thank you for completing the Information Security Survey!
Cybersecurity Test Review Introduction to Digital Technology.
Caroline LaMagna ITRT Suffolk Public Schools Internet Research Introduction.
Nine Elements of Digital Citizenship Isabella Freijah.
Who Am I? Haystax Technology Contact Info Todays Agenda.
Differences between robots and machines 1 Most machines don’t walk but lots of robots do. 2 Robots can talk machines can’t talk. 3 Most robots have arms.
Instructor: Mr. Perfors What Are We Going to Learn This Quarter? Keyboarding Microsoft Word and Excel Website design Internet safety Advanced internet.
The Lock Talk at Secure State Schuyler Towne. Parts of the Lock HOUSING KEYWAY PLUG.
Contact Us.
Week 12 - Friday CS363.
FIG 01: ASSEMBLED COTTERED JOINT
Online Safety.
How To Add A Xerox Printer To Google Chrome
Frio River Cabins - Frio Vacation Homes - Frio Country Resort

1 Book 2 books Old books new Books
LORBEN Polling “Debate”
Reactive Android Development
MicroSaver® Retractable Laptop Lock
Demo Video For A Travel Agency
Firebase Vs. MongoDB: Choose the Best Database of 2019
Meet Us
Contact Us
How to fill out the FAFSA.
Presentation transcript:

FS2600 August 2009

News/Announcements Defcon Site fail Contact info

Lockpicking 101

What Exactly is Lockpicking Anyway? Opening a lock without damaging it

FAQ Isn't it illegal? IN ARKANSAS there is no specific law against them  Are you teaching people how to steal things? Aren't bad guys the only people that pick locks? Why should I learn to pick locks? This is for informational purposes only.

Methods For Opening A Lock Picking Bypassing Decoding

Know Your Lock

How A Lock Works

Types of Locks Pin Tumbler Padlocks House locks Warded Old locks (skeleton keys) Wafer File cabinets

Picking Goal: Push all the pins to the shear line while applying rotational tension to open the lock

Picking

Bypassing Goal: Open a lock without manipulating the pins

Bypassing Shims Levers/boltss

Shims Opens most padlocks and combonation locks

Shims

Make your own out of a coke can!

Levers/Wards See demo

Bumping

Decoding Making a key Impressioning Filing *See videos

Security Measures Security pins Spool pins Serrated pins *see video

Locks of Love? Donate your locks Pick competitively Potential way to make money and Inspired by Johnny Long's talk

Resources Google video