Who's Who in Australian IT security - Hackers and hobbyists

Do hackers still emerge from behind their multiple monitors and talk to each other in the undignified medium of 'meatspace'? Patrick Gray offers some insights.

Previous: The vendors

The so-called "hacker scene" in Australia is alive and well. However, the Australian chapter of 2600 -- the global interest group for all things hackish -- is essentially dead. The primary manifestation of hacker magazine and community 2600 in Australia was a once lively, high volume mailing list for all types of security enthusiasts. Sadly, it's descended into farce, with the technical quality of the posts plummeting to a previously unthinkable low; many posts these days look more like requests for technical support than cutting edge commentary on security and technology.

The public "scene" has fractured into several semi-public groups. Still, once a year there's a shindig -- the Ruxcon security conference. Students, security professionals and hobbyists descend on Sydney's UTS campus to engage in chilli eating competitions, hackathons and to attend presentations, which are of a high standard by any objective measure.

In Sydney, what were the monthly 2600 meetings are now attended primarily by Ruxcon organisers at The Crystal Palace, a pub near Central Station. The venue is hardly swanky, but anyone interested in meeting some security geeks of all walks should head to The Crystal Palace on the first Friday of every month for a beer and a chat. Strangers are apparently welcome. But be warned -- this is not a get together for teetotallers.

Next: Researchers

Read more on Security policy and user awareness

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close