2600: The Hacker Archives

About this original series

Welcome! This is the place to go to see some real hacker culture and history. Our first four conferences (HOPE, Beyond HOPE, H2K, and H2K2) can be found in their entirety right here. Please enjoy our efforts to preserve it all and buy a DVD or two if you want a copy of anything for your personal library. We appreciate the support! Visit http://store.2600.com/videos.html to see details on the hundreds of talks from our assorted conferences, all of which will eventually be posted here.

Episodes of 2600: The Hacker Archives

    • The Fifth HOPE (2004): Security Through Automate...

      Friday, July 9, 2004: 11:00 am (Area "A"): Automated binary analysis techniques have become sufficiently advanced so that having the source to software is no longer a prerequisite for finding security flaws. The binary is equivalent to the source. And a patch is equivalent to a detailed description of a security flaw. This talk will cover the implications of the latest binary analysis technology and give an overview of some of the technology available. Hosted by Dildog and Weld Pond

      • Season / Episode
        S. 5 / Ep. 77
      • Release date
        Oct 9, 2012
      • Runtime
        54:42
    • The Fifth HOPE (2004): AS/400: Lifting the Veil ...

      Saturday, July 10, 2004: 5:00 pm (Area "B"): The AS/400 system from IBM is a powerful system that is in widespread use. Despite that, it is difficult to find information on it or learn about it from any school. A general overview of its design and the architecture of the OS will be presented. This will then be tied into fundamental computing knowledge to show where "interesting" data can be found and where possible weaknesses are in the system. Hosted by StankDawg

      • Season / Episode
        S. 5 / Ep. 17
      • Release date
        Oct 9, 2012
      • Runtime
        54:22
    • The Fifth HOPE (2004): How To Break Anonymity Ne...

      Saturday, July 10, 2004: 11:00 pm (Area "B"): Today's anonymous communication software (such as Mixmaster, Mixminion, Nymservers, JAP, Tor, Anonymizer, etc.) allows people to communicate while concealing their identities from each other and from external attackers. But no deployed system is strong enough to protect every pattern of user behavior against a sufficiently resourceful adversary, and many of them fall to far simpler attacks. In this talk, Nick Matthewson will discuss working attacks...

      • Season / Episode
        S. 5 / Ep. 1
      • Release date
        Oct 9, 2012
      • Runtime
        58:10
    • The Fifth HOPE (2004): Retaliation With Honeypots

      Sunday, July 11, 2004: 10:00 am (Area "B"): Most of the time a honeypot is considered to be a security resource whose value lies in being probed, attacked, or compromised. The purpose of this talk is to explain how honeypots might be deployed not only to use passive defense technologies, but also active defense ones. As a specific example, think about what might happen the day honeypots are able to automatically strike back at an aggressor or a worm! Different technical possibilities offered t...

      • Season / Episode
        S. 5 / Ep. 12
      • Release date
        Oct 9, 2012
      • Runtime
        51:59
    • The Fifth HOPE (2004): Propaganda in Art and Media

      Saturday, July 10, 2004: 12:00 pm (Area "B"): We see propaganda around us every day, some of it a lot more obvious than others. This panel will show you how to find it and how to make some of your own. Whether it's something like Frederic Guimont's comic book adaptation of George Orwell's 1984 or Mike Castleman's "Students For an Orwellian Society" website, you too can have fun with manipulation of the masses. Lazlow will reveal from the inside how mainstream media strives for control of the m...

      • Season / Episode
        S. 5 / Ep. 22
      • Release date
        Oct 9, 2012
      • Runtime
        49:10
    • The Fifth HOPE (2004): Bloggers at the DNC

      Friday, July 9, 2004: 6:00 pm (Area "B"): The Democratic National Convention has become a sclerotic, television-driven celebrity parade. This year bloggers - aka hacker journalists - are being invited onto the floor to shake things up. Can the Internet bring democracy back to the mother of all Democratic Party shindigs? The panel will talk about what is planned - from WiFi to video blogging - and how you can get involved, in Boston or remotely. Hosted by Brad Johnson, Adam Mordecai, Matt Stoll...

      • Season / Episode
        S. 5 / Ep. 31
      • Release date
        Oct 9, 2012
      • Runtime
        52:10
    • The Fifth HOPE (2004): Security Through Diversity

      Friday, July 9, 2004: 2:00 pm (Area "B"): Establishing a diversity of operating systems and software on the Internet is now being viewed as essential to global information security. This talk will explore how individual systems and large networks can improve their tolerance to massive attack through this principle. Copies of obscure OS's will be handed out for good questions. Interpretive dance may or may not be involved. Hosted by Javaman

      • Season / Episode
        S. 5 / Ep. 34
      • Release date
        Oct 9, 2012
      • Runtime
        50:24
    • The Fifth HOPE (2004): Tactical Media and the Ne...

      Sunday, July 11, 2004: 11:00 am (Area "A"): The Institute for Applied Autonomy (IAA), The Yes Men, and the Critical Art Ensemble (CAE) are activist collectives that use unconventional means to deliver their message. The IAA is an anonymous collective of artists, hackers, and radical engineers who have produced projects such as high speed graffiti-writing robots and map-based websites that help people avoid surveillance cameras. The Yes Men have gained international notoriety for their use of e...

      • Season / Episode
        S. 5 / Ep. 47
      • Release date
        Oct 9, 2012
      • Runtime
        55:05
    • The Fifth HOPE (2004): When Corporations Attack

      Friday, July 9, 2004: 2:00 pm (Area "A"): We all know the wrath that major corporations are capable of unleashing when the actions of hackers and other individuals anger them. This panel will focus on two of these cases. Dan Morgan was the publisher of Satellite Watch News, a publication that focused on the technical workings of the satellite industry. DirecTV (owned by General Motors) managed to completely shut down the newsletter and take nearly all of his possessions. Acidus and Virgil Grif...

      • Season / Episode
        S. 5 / Ep. 74
      • Release date
        Oct 9, 2012
      • Runtime
        56:10
    • H2K2 (2002): GNU Radio: Free Software Radio Coll...

      Sunday, July 14, 2002: 2:00 pm (Area "B"): The GNU Radio project is building a platform for experimenting with software radios - systems where the actual waveforms received and transmitted are defined by software, not special purpose hardware. One of their projects is building an all-software ATSC (HDTV) receiver. An all-software free ATSC receiver would allow among other things the construction of the mother of all "personal video recorders." Think Tivo or Replay on steroids. The folks from t...

      • Season / Episode
        S. 4 / Ep. 1
      • Release date
        Sep 12, 2012
      • Runtime
        59:33