Reboot It! Episode 70 with Bill Gardner, David Vaughn, Mark Boltz-Robinson, Evan Booth, Scott Lyons, and Joshua Marpet


Upcoming Conferences


InfoSec World 2017

April 3-5 Omni Orlando Resort at Champion’s Gate


AIDE 2017 (Mark Boltz-Robinson keynote speaker)

April 3-7, Information Security Program will be on the Thursday, April 6 and and Friday, April 7

Marshall University Forensic Science Center

1401 Forensic Science Dr

Huntington, WV


BSidesNash (w/Amanda Berlin as keynote!)

April 22, 2017


There's a waitlist



April 29-30, 2017

Baltimore Convention Center

Baltimore, MD


There's a waitlist


Th0tcon 0x8 (Chicagoland con)

May 4-5, 2017




May 19-21, 2017


CarolinaCon (Raleigh)

May 19-21, 2017


BSides London

June 7


What did he say? Don’t screw with the show notes?!!!?!!!!?!!!!

I dont know….re you doing that?!!?!?!?!?!?!

Scott, why a


Cyber Security World

June 28-29, 2017

Magnolia Hotel Denver

Denver, CO


BSidesLV – Get ready for the Next Big Thing

End of July in Las Vegas, NV, United States, North America, Planet Earth, Milky way galaxy, sort of the thin area out towards the end of that spiral arm over there.



End of July in Las Vegas

CANCELLED - bring your towel. No, bring deoderant, please. And use it.

27-30 JUL 2017


DerbyCon 7.0  “Legacy”

Call for Trainers will open March 6th, 2017 and close on April 14th, 2017.

Sponsorships open to public March 7th, 2017 (contact info [at] if interested).

Training Tickets will go on sale May 1st, 2017.

Tickets will go on sale for general admission May 6th (Derby Day) 2017.

Call for Papers will open April 1st 2017 and close July 1st, 2017.

DerbyCon training is on September 20th and 21st, 2017.

DerbyCon the conference runs from September 22nd to the 24th, 2017.


Hack3rCon 8

The “Ocho”

Nov. 17 – 19, 2017

South Charleston, WV

CFP opens on June 1, 2017


Interview with David


5 lightning questions:

  1. If you were a Star Trek® or Star Wars® character, which one would it be?

  2. What's the most important part of the sandwich?

  3. If You Could Take Only Three Items With You To A Deserted Island, What Would They Be?

  4. Name 2 people, past or present, that you would like to see square off in a MMA ring.

  5. What is your favorite Linux command?




Tor and VPN users labeled as criminals will be hacked and spied by FBI under new law


Related: As Congress Repeals Internet Privacy Rules, Putting Your Options In Perspective


Phishers target World of Warcraft users with fake in-game pet offer


Dishwasher has directory traversal bug


UW professor: The information war is real, and we’re losing it


Examining the Alternative Media Ecosystem through the Production of

Alternative Narratives of Mass Shooting Events on Twitter


How police unmasked suspect accused of sending seizure-inducing tweet


Judge OKs warrant to reveal who searched a crime victim’s name on Google


Man jailed indefinitely for refusing to decrypt hard drives loses appeal


How I Let Disney Track My Every Move


Alabama House bill would require Internet porn filters


Facebook launches Stories in the main Facebook app


Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.


Venezuelans Using ‘Rare Pepes’ and Bitcoin As Currency*