Tips
Here you will find tips and tricks to make your day at the Congress.
You should bring a Multisurgeoutlet or whatever you call a device that multiplies power plugs. We never have enough. Same goes for Patch Cable.
On the first day you'll experience delays at the entrance. We apologize. And thanks for showing that patience again.
Security in the Congress-Networks, specifically in the Hackcenter Network will not be maintained. Network traffic can and will be recorded for testing purposes. By many people and organisations. Use of weak-/non-encrypted passwords (telnet, ftp, pop3 etc) at your own risk.
With regard to security of her/his own PC or Laptop and especially
its data, everybody is on her/his own. Good luck.
Additionally, law enforcment can not and will not be prohibited
in the 18C3 space.
Crypto-Filesysteme sind Dein Freund
Warning! We do not state anything about quality and security of the below mentioned crypto file systems. It is just a listof systems being in wide use by many people and that have more or less proven to be more or less trouble-free. Use on your own risk, we do not make any explicit recommendations.
- Linux: http://encryptionhowto.sourceforge.net/Encryption-HOWTO-4.html
- Mac OS / Windows: http://www.pgpi.org/products/pgpdisk/
- Windows/Linux: http://www.bestcrypt.com/download.htm (commercial)
- Mac OS X: Applications -> Utillities -> DiskCopy. Create a new disk image, select "Encryption with AES". Watch out: the image does not unmount automatically when the system goes to sleep!
- Overview of Linux Crypto File Systems: http://home.t-online.de/home/hburde/cryptfs.html
- CFS: http://www.crypto.com/software/
- OpenBSD: Enable encryption of the swap partition:
- To enable build-in encryption of swap-partition under openbsd, set the vm.swapencrypt.enable sysctl option to 1.
- Edit
/etc/sysctl.conf
with your favorite editor and change the 0 to 1 in line:vm.swapencrypt.enable=0 # 1=Encrypt pages that go to swap
- save file and reboot.