Security SIG: Securing Wireless Access Points and Laptops

REGISTRATIONPriceQuantity
$15.00
$0.00

Description

  • The Monthly Meeting of the Security SIG





     

    Main Presentation

    Securing Wireless Access Points and Laptops

    Many SIG members have been asking Security SIG Founders and Co-Hosts Ames Cornish and Ira Victor to demonstrate some of the techniques they use in their security practices. In this special SIG, your hosts Ames and Ira will show you best practices for securing wireless access points. They will also demonstrate low cost or free tools to improve the confidentiality, integrity and availability when using wireless laptops.



    They will also demonstrate a new wireless cracking technique that cracks certain wireless internet systems in record time.



    You are invited to bring your laptop and USB thumb drives to this event if you wish to try some of the techniques in real time. Power outlets are limited, so charge your laptop battery before the event!





     

    Opening Topic

    Eradicate Software Piracy

    Many software companies lose revenues to illegal copying, particularly in developing markets, the work of technically proficient 'pirates' who specialize in reverse engineering. In the developed world, many customers exceed their permitted licenses. This piracy results in some $35B of illegal copies of software installed, annually according to BSA. Some software companies have commented in the press that they loose a third of their revenue to piracy. Other software companies would argue, privately, that losses are much higher. Recovery of even a fraction of this loss would have a strong positive impact, as it would go straight to the bottom line.



    Software piracy has been around as long as software, and has not yet been solved until now. Jan Samzelius, CEO of ByteShield, will discuss software piracy, what has been done so far, compare available technologies and why the fundamentally different ByteShield approach to software copy protection is orders of magnitude better than traditional methods.



    The ByteShield solution works directly on the executable and makes the crackers' work extremely difficult, requiring analysis of thousands of lines of code and breaking tamper resistant modules. Reverse engineering is next to impossible. ByteShield enables a very flexible, yet highly targeted approach that fits within software companies' established business practices, with no change to the existing development process.



    ByteShield offers, for the first time, the opportunity to leverage the viral effect of, say, a full featured trial, essential in the establishment of market share, with robust copy protection. This level of copy protection ensures that software companies recover the appropriate value for its development investment. ByteShield will not change how a software company runs its business, but it will improve how it profits from its business.

     

    Jan Samzelius, Chairman and CEO, ByteShield, Inc.

    Jan is one of the founders of ByteShield and has been its full-time leader for three years. He has been CEO of several startups in the past decade. He holds an important patent in the area of text processing and is the co-inventor of several of ByteShield's current patent applications.



    Jan has worked extensively in marketing, primarily as a consultant.



    After many years of consulting assignments for Coca-Cola, he has focused on service industries. Jan has worked with the telecom industry for almost 20 years. Jan received his MBA from Harvard Business School in 1979.



    Event Logistics

    Location

    Cubberley Community Center

    4000 Middlefield Road, Room H-1

    Palo Alto, CA

    Agenda

    6:30 - 7:00 p.m. Registration / Networking / Refreshments / Pizza

    7:00 - 9:00 p.m. Presentation and Discussion

     

    Price

    $15 at the door for non-SDForum members

    No charge for SDForum members

    No registration required