April 7th - 9th, 2006

Cleveland, Ohio

Presented by

FTS Conventures


Speakers and Presenters

Schedule | Speakers | Musicians & DJs | Games & Events | Movies & Media

Last Updated : 4/6/2006

Accepted and looking for more info for speakers? Presenter Information Page

RaDMan on Art Groups
Notacon 2005
-- Image credit Jason Scott
aestetixThe Temporary Autonomous Zone
Learn to Play Go
Europe and the USA: A Comparison and Contrast of Our Hacker Scenes
Dan BjorklundEverything I Needed to Know I Learned from Reading Other People's T-shirts
Gregory BoehnleinLife in a Help Desk
How the ILECs Have F**ked Up the ISP Industry
Jimmy Chan aka Lemonjello
Kris Suter aka Krnlpanik
Locksmithing Basics
Chris ClymerMobile Honeypots: How to Catch a Laptop Thief
Ricing Out Your Linux Box
David CoughanourHajjiNets: Running an ISP in a War Zone
Drew CurtisStupid Media Tricks: Which will kill us all first, the Bird Flu or Janet Jackson's nipple?
DroopsMake Your Own Linux
Elonka DuninKryptos and The Da Vinci Code
James Eastman AKA DJ Vitruvius
Micah Waldstein
Producing Music on a Shoestring Budget
Nick FarrHacking the Research Community
Ryan FoxHow Microsoft is going to die (... and it's not Linux)
Jeremy GaddisPatch Management in a Windows environment
Jeff Goeke-SmithA Re-Introduction to Photography
Seth HardyBuilding Communities in Self-Destructive Environments
Leigh HoneywellHacking Gender - Strategies for inclusion and change
Corey HoustonFont Making Fun
IrongeekNetwork Printer Hacking
Paul JarcCollaborative Authorship and Patch Deployment: An Impractical Guide
Kn1ghtl0rdBlended Threat Management
Jesse Fiedler Krembs AKA Agent XHacks for Humanity
Beth LynnSecurity Audits Using Linux Live CDs
Eric MeyerA Decade of Style
Keith MitchellInternet Exchanges - Enabling Local Online Communities ?
P(?)NYB(?)YThe Rise and Fall of Payphones and the Evolution of Phreaking
riscphreeEncryption For Programmers
RobbtThe SPORE (Share Place Open Resource Ecology) or How to Use Social Networking to Undermine Commodity Based Capitalism
Gabe Schaffer5 Minutes Photoshop Techniques
Jason ScottThe Great Failure of Wikipedia
Your Moment of Audio Zen: A History of Podcasts
Nathan SterrettAn Introduction to Microsoft Systems Management Server
Hacking Hops: How to Brew Your Own Beer
Paul TimminsHow to Survive a Federal Investigation
Jason Scott
Lowtek Mystik
Hacker Media Panel
The Temporary Autonomous Zone

Ever suspect there's more to life than what meets the eye? Or glance at art and wonder what inspired it? The Temporary Autonomous Zone (TAZ) concept is based on an anarchistic principle of freedom between the cracks of society. As the forerunning ethic behind the rave scene, various conventions, and events like Burning Man, it is highly relevant to understanding where the "hacker ethic" holds root.

This talk will focus on both research into past history of TAZ, as well as the speaker's experiences with the underground scenes. It will also explore tips on how to construct your own isolated surreality.


aestetix has been active in underground scenes for years. More recently, he has been involved with a crew in St. Louis partly responsible for a rebirth in rave culture. Additionally, he has experienced multiple social systems in different cultures which illuminate an exposure to the TAZ principle.

b9punk and McFly
Learn to Play Go
Europe and the USA: A Comparison and Contrast of Our Hacker Scenes

for "Learn to Play Go"

An opportunity to learn the basics of go and play a few games. Boards and stones will be provided, along with printed information about the game. Hikaru fanboys will be dealt with appropriately, this means you, and us.

Dan Bjorklund
Everything I Needed to Know I Learned from Reading Other People's T-shirts
From podcasts to digital t-shirt printing, a look at the technology driving our ever growing "On-Demand" society and the social impact it's having. The ability to bring a idea from thought to product in a reduced period of time has brought new levels of credibility to niches and fringes alike. Dan will explore the technology behind this buzzword and some of the effects he has noted.
Dan is a commercial printer in the event marketing industry, no we won't tell you what that means, with a passion for questioning the status quo and breaking new technology.
N2Net Gregory Boehnlein
Life in a Help Desk
How the ILECs Have F**ked Up the ISP Industry

for "Life In a Help Desk"

A discussion and dissection of various Help Desk stories / recordings that we have collected over the years. Not at all politically correct, but should provide topically relevant information. Audience participation is a must.

for "How the ILECs Have F**ked Up the ISP Industry"

An hour long rant about anti-competitive practices by ILECS and RBOCS in the ISP industry and how this has totally screwed the end-user and turned what should be $8 / month DSL into a $50 / month profit whore for Ma-Bell. A dissection of why the entire Telcom Deregulation act of 1996 was a complete fraud. Anger. Frustration. Hatred. Death!

Gregory Boehnlein is VP of N2Net, a provider of mission critical hosting based in Cleveland, Ohio. In addition to 10 plus years of experience working with telco service providers, Greg is a director on the board of the Linux Users Group of Cleveland and an active Asterisk developer.
Jimmy Chan AKA Lemonjello
Kris Suter AKA Krnlpanik
Locksmithing Basics
Learn the basics of picking locks from the lockpicking champion at Defcon 12! Bring your own locks and, if possible picks and get on the path to learning the locksmithing trade for yourself.
Chris Clymer
Mobile Honeypots: How to Catch a Laptop Thief
Ricing Out Your Linux Box

Mobile Honeypots: How to Catch a Laptop Thief

You bought that shiny new thinkpad, installed Linux on it, set a 20 character login password, a 30 character root password, passworded the BIOS, encrypted your home partition...and none of this matters if someone steals your laptop. What if there was a way to keep the attacker from knowing your sensitive data even existed, watch all of his activities, and hopefully recover your laptop?

Ricing Out Your Linux Box

Lots of us are running Linux workstations these days. But most people have more important things to do than pretty up those boring default desktops. Transparent borderless terminals, gkrellm/fluxbox/KDE theming, desktop applets with adesklets/gdesklets/superkaramba...make your cube-mates green with envy.

Chris Clymer is an ex musician and graphic designer who was sucked in by the allure of a free OS 3 years ago. He is currently employed by NEO Digital of Massillon, Ohio, where he builds and maintains Linux and BSD-based servers, routers, and firewalls. Lately, he has been discovering that Windows does in fact have a command line...
David Coughanour
HajjiNets: Running an ISP in a War Zone
Right now I am currently serving in Iraq where I run IT operations for a small chunk of the Sunni triangle. One of the major projects that we have accomplished here is setting up an ISP that supports 350 subscribers. It has also survived multiple mortar attacks, and is built entirely on Linux.
SGT Coughanour, David A
HHC 1-110th Infantry
Fark.com Drew Curtis
Stupid Media Tricks: Which will kill us all first, the Bird Flu or Janet Jackson's nipple?
Drew Curtis was born and raised in Lexington, Kentucky. Realizing that goat herding just wasn't going to pay the bills, Drew started Fark.com in his spare time between daily soccer and beer rituals. Somehow word got out and the site grew to humongous size, without the help of pills or lotions. Fark's daily traffic exceeds most daily newspapers from across the globe, no small feat when you consider that Fark is basically only one page and gets no pageviews from clicks on articles. If you ask anyone who knew Drew from high school or college what they think about his success with Fark.com, they will answer "not at all surprised." Drew spends his spare time raising his son Storm.
Infonomicon.org Droops
Make Your Own Linux

My first Linux distro was Slackware and i have always held a fondness in my heart for it. I recently came back to slack while making a Live CD for creating online radio shows. The version of slack that I came back to is SLAX. It allows you to create your own live cd, effectively you own Linux distro.

In my talk, I will start with slackware basics and them move on to how to create your own Slax based distro. As a group we will decide what we want in a distro and then create one during the talk. When my hour is up, everyone will have our own Linux distro and will have met others at the con, because they were forced to work together.

Elonka Dunin
Kryptos and The Da Vinci Code
In a courtyard at CIA Headquarters stands an encrypted sculpture called Kryptos. Its thousands of characters contain encoded messages, three of which have been solved. The fourth part, 97 or 98 characters at the very bottom, have withstood cryptanalysis for over a decade. The artist who created Kryptos, James Sanborn, has also created other encrypted sculptures such as the decade-old Cyrillic Projector, which was cracked in 2003 by an international team led by Elonka Dunin. Within the last few years, the sculpture's fame has been increasing, in large part because references to it were hidden in the bookjacket of the bestseller "The Da Vinci Code", and author Dan Brown has hinted that it will also feature in his next book, "The Solomon Key". This talk is intended for a general audience with beginning to intermediate cryptographic experience. Elonka will go over how the Cyrillic Projector code was cracked, and the current state of knowledge about the Kryptos sculpture, its own encrypted messages, and its mysterious CIA surroundings.
Elonka Dunin is a professional game developer, working in St. Louis at Simutronics (play.net), a provider of massively multiplayer online games. She has won awards for cracking various codes, such as the PhreakNIC v3.0 Code, an up-until-Elonka unsolved puzzle created by se2600. She is an internationally-recognized expert on the famous Kryptos sculpture at CIA Headquarters, and webmistress of two popular cryptography-related websites -- one on Kryptos, and another with a list of the world's "Most Famous Unsolved Codes." In April 2006 (hopefully in time for Notacon!) she is releasing her first book, "The Mammoth Book of Codes and Cryptograms."
Lethargic Records James Eastman AKA DJ Vitruvius
Micah Waldstein
Producing Music on a Shoestring Budget
Producing music requires a lot of effort, a lot of time, and a lot of proverbial "blood, sweat and tears," but it doesn't require a lot of money. Freely licensed samples, low tech solutions, and a little dedication and knowledge can allow you to create, record, and produce musical masterpieces without spending a year's salary building a studio.

Additionally, we will survey numerous open source applications available for audio production work in Linux.

James Eastman

Jim has been involved in Cleveland's electronic music scene in a variety of capacities since the beginning of 2002. In that time he has become a DJ, both on the radio and with a pair of turntables, gotten into music production, and more all while surviving on the budget of a college student (now the budget of a grad student).

Micah Waldstein

Micah has been known to dabble with sound under Linux and help old ladies cross the street.

Hacker Foundation Nick Farr
Hacking the Research Community
One day before the opening of Defcon 9, a group of hackers who wanted to put their talents to humanitarian relief projects went out for pizza. They invited Defcon's legendary "spot the fed" emcee, Priest along for his advice. He told them the real challenge was not in fighting organizations, but in "getting organized" and "going legit". Many confs, e-mails and late-night IRCing later, The Hacker Foundation emerged. With a goal to act as a research and service organization, HF would help the community show the world how that the intellectual powers of a "hacker" could be used for good. Since incorporating in 2003, HF has faced many different regulatory, social and intellectual challenges from the usual suspects in media and government. Surprisingly, the most difficult challenges they faced came from within the community. This talk will look through the brief history of the Hacker Foundation as it achieved IRS-recognized non-profit organization status. While illustrating the successes and mistakes made along the way, Mr. Farr hopes to illustrate how research and service efforts (along with a little creative mass-social engineering) can dispel the "hacker-criminal myth".
Nick Farr is the Treasurer of the Hacker Foundation and Chair of the Social Engineering Department at Osric University. He holds degrees from the University of Michigan and Grand Valley State University and divides his time between the West Coast of the United States and the West Coast of the State of Michigan. He has been on the staffs and/or spoken at Rubicon 1-3, Defcon 9-13 and Notacon 1. He is often addressed at hacker cons by his initials, NFF.
Ryan Fox
How Microsoft is going to die (... and it's not Linux)

Microsoft will soon lose its dominance of the PC Desktop. Sure, it has been predicted before, with some other OS threatening to break MS's market share stranglehold. But the downfall will not be caused by another OS, it will happen by making the OS unimportant. Practically all of the puzzle pieces needed already exist.. but they are not yet in the right place.

This entertaining, lighthearted talk will detail Microsoft's end. We will cover the technologies that will make the OS obsolete, and what still needs to be done.


Ryan Fox works as a Unix Admin for a small university and continues to try to find needlessly complex solutions for mundane problems. He has created several groundbreaking web applications which are all now old and busted. He used to have free time for cool software development projects, but that time is now filled by his wife and two young sons.

Jeremy Gaddis
Patch Management in a Windows environment
With the number of viruses and worms on the loose increasing almost daily, it's now more important than ever to keep one's systems updated. As the number of machines under a single administrator's control continues to grow, it becomes impossible to keep Windows PCs up to date by hand. In this presentation, Jeremy will demonstrate how to deploy Service Packs via Group Policy and will also show off Microsoft's Windows Server Update Services, designed for managing updates in large environments.

Jeremy is a systems administrator at Ivy Tech Community College of Indiana where he's responsible for Windows servers, Red Hat Enterprise Linux servers, the network, and too much other stuff. He is also the owner of LinuxWiz Consulting, a private firm providing consulting and I.T. services for small businesses.

Jeremy is a GIAC Certified Windows Security Administrator and Microsoft Certified Professional (don't laugh, it pays the bills)."

Jeff Goeke-Smith
A Re-Introduction to Photography
Last year, I spent an hour trying to convey some basics of terminology and technique about photography. I'll be back to revisit the same topics again, and cover a bit more this time. Jargon laden concepts such as ISO, F-stop, exposure, focal length, and sensor size will be covered. I will present examples of picture framing, lighting, and use of flash. Finally, another round of 'questions about photography' will be included.
Working as a network manager drove Jeff to acquire an Amateur Radio license in the fall of 2000. Ignoring all common sense and good judgment, he dove right into the middle of building repeaters. Along the way he ended up working with dozens of groups and picking up a photography addiction. Additionally, Jeff has been distracted by various other technical topics and shiny objects. Look for him holding the camera in one hand, and the radio in the other.
Seth Hardy
Building Communities in Self-Destructive Environments
Over the past number of years, I've put in a lot of time developing and maintaining resources that are open (in varying degrees) to the world. While I do consider these projects more than worthwhile, sometimes they can be hard to deal with. While there are always problems-- with time, financially, or with other resources-- it seems that the biggest headaches always come from within. In this talk, we'll look at a few communities of varying degrees of stability I've been involved with, the problems that have come up in and because of these communities, and the steps taken to help solve these problems. These will include things created both online (2600net, aculei.net) and in the real world (the Hacker Halfway House, the current yet-unnamed project I'm working on).
Seth stopped liking writing self-promoting blurbs a long time ago. In fact, he may never have liked it to begin with. He acknowledges that there's already far too much information about him on the intarweb, and encourages people to do their own research if they're interested.
Leigh Honeywell
Hacking Gender - Strategies for inclusion and change

Why are there so few women in infosec, and more generally in IT and telecom? Why should you care - is it even a problem? Most importantly, what are some constructive, positive things we can do as a community to foster a more inclusive culture?

This isn't a gripe session about horror stories of women in the field. It definitely isn't about hating men. Both have been done and aren't really productive. I'll first address the "why you should care" question with some background from equity studies research. I'll then go over strategies that companies, universities, and individuals have used to successfully include women in computer science, engineering, physics and corporate IT, drawing from research done in all of these fields to find the strategies that best apply to the infosec community.

Leigh Honeywell (a.k.a. hypatia) spent a few years in university learning about physics, equity studies, and history of science before settling on computer science as a discipline. She teaches information security courses in Toronto, Ontario, Canada.
Corey Houston
Font Making Fun
Corey will be showing how anyone can create their own handmade typeface/letterforms using a variety of different techniques. The discussion will include a history of typefaces and a discussion about three-dimensional typography.
Corey Houston is a Senior at Eastern Michigan University majoring in graphic design. He works for the department of Campus Life, helping to design documents and promotional materials for upcoming campus events.
Network Printer Hacking
This presentation will cover techniques that can be used to control and extract data from network printers. Most of it will be specific to HP Jetdirects, but some of the techniques are still applicable to other network printer vendors. Topics covered will include information on the basics of network printer protocols and languages, finding and controlling network printers, simple pranks, using JetDirect boxes as files/web servers, extracting faxes/stored print jobs, sniffing and replaying print jobs as well as a bit on coding your own scripts with Perl and PJL to control network printers
Irongeek has worked at university campus for the past nine years doing mostly end user support, with a bit of info security work from time to time. He does security research, writes articles and creates Flash presentations (the “Hacking Illustrated” series) for the website http://www.Irongeek.com as well as other hacker media outlets.
Paul Jarc
Collaborative Authorship and Patch Deployment: An Impractical Guide
Why do we believe what we believe? Is accuracy enough to give credibility? What do Wikipedia and distributed source control have in common? (And what should they have in common?) You'll come for a brain dump of a thread running through all these things, but you'll stay to shoot it full of holes and build it back up again.
Paul Jarc enjoys nothing more than a good ponder. He has been known to have as many as four thoughts in a single day, though sadly he can no longer tell you what half of them were.
Blended Threat Managment
I will be introducing blended threat management and explaining it's role in an IT system. I will be covering the basic configuration and what functions and how to implement them. I will also cover the licensing and features briefly and there individual functions. I will also discuss how to deploy the appliance in a TCP/IP networking environment. After the presentation I will allow for a short Q&A section and then a brief conclusion on blended threat management systems.
As a member of the computer security community, kn1ghtl0rd has authored numerous articles and text files on a wide variety of technology topics. He is also the host of Kn1ght's Round Table, which is a technology news based podcast. Also and avid member of the Infonomicon Computer Club, kn1ghtl0rd has helped to spread information to the rest of the community as well as further his knowledge by exploring new technologies.
Hacker Foundation, Defcon & 893 Studio Jesse Fiedler Krembs
AKA Agent X
Hacks for Humanity
Jesse's presentation is a follow on to Nick Farr's about the origins of the The Hacker Foundation. This talk will cover more up to date issue regard the Hacker Foundation's activities and how to get involved. Jesse will be speaking on what the Hacker Foundation does, problem's facing humanity that hacker's are uniquely suited to challenge and how to apply to the Foundation for sanctioned project status.
Jesse Krembs is co-founder of the Hacker Foundation and its current president. He travels widely performing radio survey & installation work, for Fortune 500 companies and municipalities. He's been involved with Defcon since 1998 is now Head Speaker goon. He restores classic motorcycles and tinkers with tech in his shop in Burlington Vermont.
Beth Lynn
Security Audits Using Linux Live CDs
We will explore easy ways that a system administrator can perform a security audit utilizing Linux-based Live CDs. Examples of common exploit detection will be given. This talk will be practical for any size site - including home networks.
Linux System administrator for Carnegie Mellon School of Computer Science. Open Source advocate and Western PA Linux User Group board member.
meyerweb.com Eric Meyer
A Decade of Style
A look back on 10 years of CSS and a glance forward to where things are headed.
Eric A. Meyer has been working with the web since late 1993 and is an internationally recognized expert on the subjects of HTML, CSS, and Web standards. He is currently Principal Consultant for Complex Spiral Consulting, focusing on helping clients understand and use open Web standards to cut costs and improve efficiency. When not otherwise busy, Eric is usually bothering his wife Kat in some fashion.
UK Network Operator's Forum Keith Mitchell
Internet Exchanges - Enabling Local Online Communities ?

My presentation looks at the history and role of Internet Exchanges (IXPs or NAPs) for improving connectivity within communities of ISPs and others in a metro area. I will examine successful and less successful technical, operational, economic and governance models, with some examples. I then take a look at the role of "peering" in routing traffic across today's Internet backbone in the face of plummeting wholesale IP transit prices.

The highest profile IXPs have traditionally been in major metro centers (e.g. the DC & Bay areas and London), but making them successful in "regional" cities is my experience a more challenging endeavour. What is the optimal geographic distribution and scope of exchanges, and what is the best balance of co-operation, competition and subsidy needed to make IXPs thrive in the metro areas and urban communities they serve ?


Keith Mitchell is currently chairman of the UK Network Operators' Forum (UKNOF). He has been involved in the European Internet industry for nearly 20 years, including founding the first British commercial ISP, PIPEX.

Since 1994 he has been active in the Internet interconnect arena, setting up and serving as Executive Chairman of the world's largest nonprofit Internet Exchange, LINX, and more recently XchangePoint. As well as serving on the boards of Internet registries Nominet and the RIPE NCC, Keith has campaigned on privacy and public policy issues, and presented to international Internet meetings including NANOG and ICANN.

Keith and his own Autonomous System of BGP routers and Linux servers are re-locating to Cleveland in spring 2006.

The BellCoreOmnimedia group P(?)NYB(?)Y
The Rise and Fall of Payphones and the Evolution of Phreaking
'The Rise and Fall of Payphones and the Evolution of Phreaking' is a glorified timeline mapping the birth of the pay telephone in 1889, to the slow death of the industry in the present day. Following the presentation there will be a short trivia game with prizes an a Q&A session.
P(?)NYB(?)Y is an avid phone phreak, telephone history enthusiast, and the host of a phreaking-based radio show BellCoreRadio. Come join him as he takes you on a trip throughout the history of the pay telephone and the phreaks who paved the way for modern telephonic hackers.
Encryption For Programmers

This talk will discuss encryption from a programmer's perspective. Topics will include a beginners rundown of terms and small introduction to cryptography, legalities concerning the development of cryptographic material, basic concepts and examples, and finally, ethics. Examples will include source code, but will not apply to one specific language as to ensure more understanding with all developers.

Even if you are not a programmer, with the information presented in the beginning of the talk, you should find it enjoyable and understandable.

riscphree is a freelance programmer whose main focus is on security and encryption. Writing many of his own algorithms for personal use, now he's ready to share his knowledge to the masses. While new to the con scene, he hopes to pass on the valuable information about securing your sensitive data to you.
The SPORE (Share Place Open Resource Ecology) or How to Use Social Networking to Undermine Commodity Based Capitalism.

The Spore is a concept inspired by the prevalence of social networking and an attempt to create a underground virtual gift economy that will allow people to connect and share information and resources.

By sharing existing resources and incorporating accountability and feedback in order to amplify cooperation people can create independence from the industrial commodity market which is rapidly exhausting the earth's resources.

The SPORE is a potential patchwork of open source technologies such as Drupal.org, PSYC(concurrent decentralized IM), GPG, RSS and Dyne:bolic. that interlock in order to build a means to digest consumer trash and transform it into useful resources.

The presentation will explore the potentials for social networking in creating social change and alternative economics and provide an overview of existing technologies.

Robbt is a open-source technology advocate and DiY media activist. He currently lives in Arawak City and helps admin various web-sites for free. He used to live in Chicago and help run the Autonomous Zone, a anti-authoritarian infoshop community center. He is currently a part of the global indymedia network through work with Columbus Indymedia http://cbusimc.org
Gabe Schaffer
5 Minute Photoshop Techniques
Learn how to turn snapshots into art with 5 simple steps you can do in Photoshop, the GIMP, or any other fine digital photography tool. Bring your own images on CD or USB key to see them transformed before your very eyes.
Gabe Schaffer, Cleveland's native son and self-described huguenot decided to take up photography after failing as a pirate. Upon laying down his eye-patch, hook, and peg-leg, he picked up his camera and never looked back. He started programming on a Timex/Sinclair in 1983, using Photoshop 2.5 on a Mac in 1993, and shooting with a digital camera in 2001 with a Canon D30. Arrgh!
textfiles.com, bbsdocumentary.com Jason Scott
The Great Failure of Wikipedia
Your Moment of Audio Zen: A History of Podcasts

for "The Great Failure of Wikipedia"

In just a few short years, Wikipedia, the anyone-can-edit, anyone-can-fix collection of articles, has become a juggernaut. In its current incarnation, it has achieved a reputation as a good, effective source of knowledge and facts, maintained by an army of researchers, experts, and just plain folks working together towards founder Jimbo Wales' goal of "A world in which every single person on the planet is given free access to the sum of all human knowledge."

There are naysayers and skeptics, and there are fans and supporters. Jason is a little of all of these, and in a quick-paced talk will discuss what he has learned studying Wikipedia for about a year; its advantages, disadvantages, and most importantly, how much we can learn about the nature of human interaction and communication from it, in a world where information is becoming a part of our bloodstreams and subject to the same fears of contamination.

Wikipedia will fail, but it will do so in the sacrifice of a greater good, and we will have been better off for what it will teach us. Let us have a rousing wake.

for "Your Moment of Audio Zen: A History of Podcasts"

The name either excites you or makes you cringe (Hey, maybe it does both) but the fact is, Podcasts are now the hot new thing. Jason Scott provides a quick history of the podcast, as well as its predecessors, its likely replacements, and how the world is likely to look back on this explosion of home-made radio. Subjects covered include pirate radio, shortwave, "Push" technology, the weird birth of RSS, and where things got entirely out of hand.

(Jason Scott is currently collecting every podcast at podcasts.textfiles.com).


Jason Scott is a digital historian, archivist and filmmaker, who has run a number of sites collecting history related to bulletin board systems, early and current internet, and a host of other related artifacts. He runs TEXTFILES.COM, which is a family of sites related to bulletin boards, hacker media, and computer art. He is the director of the documentary "BBS", which covers the history of Bulletin Board Systems, and is currently in production on a new work on text adventures.

Nathan Sterrett
An Introduction to Microsoft Systems Management Server
Hacking Hops: How to Brew Your Own Beer

for "An Introduction to Microsoft Systems Management Server"

Is Microsoft Systems Management Server (SMS) a good fit for your environment? How do you handle patch management on your client computer? How much does SMS cost to implement? With the number of computers per support staff constantly increasing look to enterprise management systems to reduce your workload. He will demonstrate the core features of SMS, remote control, hardware/software inventory, software deployment, and reporting. Nathan will talk about how The University of Akron has implemented SMS, costs associated with installation, and issues that have arisen from enterprise management systems.

for "Hacking Hops: How to Brew Your Own Beer"

Nathan will be conducting an introduction to beer making also called homebrew. He will have examples of the necessary equipment and ingredients. This is a beginner class it will not be covering all grain brewing. He will have pictures of the process but because of hotel rules prohibit bringing outside alcohol so he will not bring any beer or batches in progress.

Nathan Sterrett is one of the SMS Administrators at The University of Akron in Akron, Ohio. He is part of the team that brought SMS to The University of Akron two years ago and is responsible for end-user patch management. Currently he is working on Macintosh OS X enterprise management solutions for the campus. Nathan has been brewing beer for more than four years and made approximately twenty different kinds of beer and more than fifty batches.
Paul Timmins
How to Survive a Federal Investigation

Rather than just yet another boring speech about 802.11b and security, this will be a story about what happens when the world closes in on you, because of the above items. Detailed will be a good account of my arrest by the FBI, my interrogation, my court hearings, and what it's like to hear your name opening the 6 o'clock news. I intend to be quite humorous and sarcastic, but also quite serious. If this is a situation I can be in, it's a situation anyone can be in.

  • What to do if you're arrested
  • What to do if you're raided (and why a search warrant means EVERYTHING)
  • What to do when you're interrogated
  • What to do when you find yourself caught in the middle of a crime you want nothing to do with
  • What I could have done better
  • How to cope with the crushing feeling you get when you see: "The United States of America, vs (Your name here)"
  • Court precedents you should know about
  • Preparing to find out who your friends truly are
  • A deer in the headlights: Backing up the data you want to have when it's all over
  • Forfeiture, and what it means to you
  • The importance of competent legal representation
  • What to do before you go in to make your arrest and release easier

I will be able to hand out a limited number of copies of all my legal documents on CD-ROM. All items to date have been scanned and converted to PDF format. If attendance is high, the documents are also available on my website.


Paul Timmins is a 25 year old network engineer for an unnamed software company located in Southfield, MI. His interests include amateur radio, telecommunications, computers, pikachu, blue things, and curly fries. Paul's life was going along just great, until November 9, 2003, at approximately 3:45pm ET, when he was arrested by federal authorities on what became a case where one of the (if not THE) harshest computer crimes sentence in US history was handed down. (Although his sentence was one of the lightest handed down). This case took over 2 years in court, during which even the most casual outside observer could tell he has had little to no involvement with the crime, besides sharing a two bedroom apartment with a co-defendant.

Paul Timmins was sentenced to 2 years probation and a $100 fine. He was released early from probation in November of 2005, having served almost 8 months on probation.

Jason Scott P(?)NYB(?)Y Droops Lowtek Mystik Drew
Hacker Media Panel
This panel will discuss the hacker influence on web-based media, specifically through the form of the podcast and IPTV. It will cover current trends in hacker media, possible futures, as well as advice for creating your own hacker media.

Jason Scott is a guy who will moderate the panel.

P(?)NYB(?)Y and Mesa are the hosts of BellCoreRadio. P(?)NYB(?)Y is a member of the Infonomicon Crew and contributor to many other internet radio shows. Mesa runs Underground radio 2k9, an online radio station devoted to independent musicians.

droops is some guy who reallly loved listening to Radio FreeK America, and thought to himself, hey i could do this. so he did, along with his buddy obfuscated he created infonomicon radio. now droops is involved with twatech radio, a daily tech show; is the admin of hackermedia.org, which lists the latest hackermedia on the global interweb; started podcastincubator.com, where free hosting is done for aspiring internet media people; a member of the DDP, a group that produces BinRev radio and hack tv; member of infonomicon media, a group that is heavily involved with all this mess, its members create alot of audio and video that will be talked about on the panel.

Lowtek Mystik is also a member of the Infonomicon Crew, admin of podcastincubator.com and host of Ninja Night School Radio. He is an audiophile (lover of audio) and has always has a strong desire for understanding and learning.

Drew is a software engineer and software product manager who is old enough to remember the BBS days and when CompuServe was cool. He has had a web site for over 10 years, a blog for nearly 3 years, and a podcast for just over 1 year. If longevity implied expertise, he'd be the perfect person to put on a hackermedia panel.

Audio Visual rentals provided by Rentech Solutions

© 2006 FTS Conventures | Contact Webmaster
fax: 616-608-0501 | Contact Us