Friday, October 30th, 2009

Time Cumberland Lobby 9th Floor Cafe Area Contest
10:00 Registration (Until 10PM)    
11:30 Opening Ceremonies (PN Staff)      
12:00 Mudsplatter -   Vendor Area Open R00tW4rz Playground  


14:00 YodaMaster      
15:00 Ryan Anderson    
16:00 IronGeek      
17:00 Droops & Morgellon      
18:00 Dinner Break - Bailout! - Outside in the parking lot T-Shirt Sales Open! Get 'em while they're hot!   2nd Annual Ware Chair Toss! (In the parking lot)
19:00 Tyler Pitchford Mario Party! Scavenger Hunt Begins!
20:00 Acidus Registration Closes/T-Shirt Sales Close  
21:00 Porter Haile  
22:00 Intx80 - Dual Core        

Saturday, October 31st, 2009

Time Cumberland Lobby 9th Floor Cafe Area Contest
9:00   Registration Opens/T-Shirt Sales

Vendor Area Open
Pancake Breakfast by Maker's Local 256

Lampshade (TableTop Games till 6PM) Wifi Race Starts!
11:00 Brent Baldwin & Robert Jason      
12:00 SlimJim     WoW! Wifi Race Ends


14:00 Ulysses   R00tW4rz Competition R00tW4rz Competition Begins!
15:00 DosMan      
16:00 Scott Moulton   Wow! Ends  
17:00 HackerSpace Panel      
18:00 Dinner Break Registration Closes/T-Shirt Sales Close Vendor Area Closes R00tW4rz Competition Ends R00tW4rz Competition Ends!
19:00 Quigon & Jehosephat   Scavenger Hunt Ends
20:00 Presmike & Sippy   Rock Band Free For All! (Till midnight)
21:00 Presentation of Awards/Thank you's  
22:00 Why You Suck!        
Let the Parties Begin!

Sunday, November 1st, 2009

Time Cumberland Lobby 9th Floor Cafe Area Contest
9:00   Registration Desk - buy a shirt before they're gone! Assess the damage...   'Where's my liver?'
Check out time for the hotel!!!!
Meet for the G33kShoot / Lunch at Cracker Barrell.
(Range opens at 1PM)


IronGeek (Adrian Crenshaw)  
Darknets: Fun and games with anonymizing private networks - This talk will cover the basics of semi-anonymous networks, their use (political dissidence, file sharing, gaming and pr0n), how they were developed and what they mean to organizations. The main focus will be on the Tor, Freenet, anoNet and I2P Darknets, their uses and weaknesses.
Scott "Munge & Plunder" Moulton
  DIY Data Recovery Diagnostics! This talk will be about how to think though the basic problems with hard drive failures. It will include some examples and videos of recoveries and how to look at your drive and try to determine the type of problem before you destroy the drive yourself!
Droops and Morgellon

Droops and Morgellon will discuss an Arduino class that droops taught this summer, show off some of the projects the class built and tell what droops learned by teaching high school students about the creative process of hacking together your own hardware and code. They will then launch into fun projects they are working on like twittering from everything, aerial photography, photo booths, wearable electronics, network enabled toothbrushes, and sensory enhancement. Hopefully they will have worked a few kinks out and will be announcing a really cool hardware kit.

An ongoing workshop on the top floor with Arduinos, various parts and documentation, and a continuation of their talk.

Lesson #1 in high school electronics, "do not solder above pants"
Lesson #2 in high school electronics, "open source is cool"
Revelation #1 in high school electronics, "I just built that!"

Tyler "Trip" Pitchford
  This talk provides a brief introduction to reverse engineering.  Specifically, this talk focuses on the concepts and terms used in the RE community and is applicable to all forms of reverse engineering.  Examples throughout the presentation utilize linux (ELF) binary executables and the requisite RE tools.  A small 'contest' will be provided to encourage direct application of the concepts explained.
Ryan Anderson
  How To Build a Cheap* SAN
After fighting with a few canned solutions for a while, I decided starting from scratch was the most practical path toward having both a high-availability SAN and money. Using CentOS 5 as a base, and only having to compile one package from source, you can build an iSCSI SAN that is reasonably reliable and as fast as your credit line allows. I'll be walking through, in a virtual environment, how to mirror a block device on two separate machines, share it over iSCSI, and have either machine completely fail with no interruption to service.
  We are building an open source nuclear fusion reactor. This is the story of a remarkable fusion device called the Fusor and it's successor the Bussard reactor. The Bussard reactor holds the promise of cheap clean abundant energy from nuclear fusion. Using community driven research, we hope to open source a technology that may one day replace coal and oil.
  The Technological Singularity, an event in the near future in which exponentially increasing computational capacity could bring staggeringly rapid social and technological change, is hyped by some as the "End of History As We Know It" while skeptics pan it as wishful thinking, a secular "Rapture of the Geeks." This talk will critically evaluate many of the bold--and bizarre--claims made by such thinkers as Marvin Minsky, Vernor Vinge, and Ray Kurzweil about the singularity, followed by a discussion with the audience. Where better to discuss the (possible) arrival of our robot overlords than Phreaknic?
Presmike & Sippy
  "In this talk, we will discuss a new incident response methodology called Rapid Enterprise Triaging (RETRI). Designed for large-scale response efforts, RETRI uses a macro approach to the traditional IR process in order to quarantine broad network segments. And a special treat we couldn't provide at Blackhat this past summer - we are hoping to release the accompanying free tool called Codeword, which detects rootkits and malware."
Joseph (Ulysses)
A Brief History of Locks
In the beginning... people secured their valuables with rope and intricate knots later evolving to biometric and high security locks. We will cover the inner working of some of the most well know locks (and not so well known), their flaws  and why that technology was replaced or in some cases still used today. As well as what locks have meant to people through history and and how the perception of security has greatly changed or changed very little depending on your perception.
Brent Baldwin & Robert Jason
  Java junkies, listen up. Ever wonder why coffee in the store comes with a "good until" date instead of a "roasted on" date? Because, as coffee geeks know, if it was roasted more than 10 days ago, it's no good. That means almost all of the coffee industry's goods are being sold with the flavor long gone. We'll show you the best way to get your coffee fresh: home roasting. It's also a lot of fun. And the most fun of all is roasting at home with a roaster you built yourself. We plan on roasting a pound or two on the spot and waking up the crowd. We'll also discuss espresso, drip machines, and French presses, as well as exotic brew methods like cold brew and Vietnamese. And Brent will unveil his stealth method for making a good cup in your cubicle. Never again will you settle for bad office coffee!
Billy Hoffman (Acidus)
  Something New. Something web. Something Not Security
In this presentation I'll take the cloak of something new I'm working on. Its something new. Its something web related. Its not security. If you design, build, run, administer, or maintain a website or are just interested in tweaking things you definitely need to see this.
DosMan & Dave
  Lock Picking is Not a Crime (unless you are here)
This is a drinking game cleverly disguised as a talk on lock picking, there will be a regular and advanced track. Lock picking is a fun hobby and sport that many people around the world participate in (except in Tennessee). We will show you how to get started and also show you all kinds of other information about locks and security. Most important of all, we'll do this without breaking any laws of the State of Tennessee.