April 16th - 19th, 2009

Cleveland, Ohio

Presented by

FTS Conventures


Speakers and Presenters

Last Updated : 3/25/2009

Jeri Ellsworth speaks at Notacon 5
Jeri Ellsworth speaks
Notacon 2008
-- Image credit Ben Chodroff

A reference for accepted speakers can be found here.

Click here for Workshops and Performance listings

AestetixHow to Give Talks and Influence Organizers - Propaganda
James "Myrcurial" ArlenFrom a Black Hat to a Black Suit - The Econopocalypse Now Edition
catfoodInjection Rejection, or How I Learned To Stop Worrying and Love Bobby Tables
CG & g0neTime To Replicate The Real Threat: Client Side Penetration Testing
Chris ClymerThe State of Apple Security
Adrian "IronGeek" CrenshawHacking Video Tutorial Tips: Getting the point across with screencasting computer videos
Critical ArtwareThe Artware Development Environment Artware Environmentblockparty 2009
Drew Curtis"The Long Slow Death of Mainstream Media (no really): How We Got Here
droops & Morgellon the Lowtek MysticInteractivity with Arduinos, Transducing the Physical World
Tom "agent0x0" EstonThe Rise of the Autobots: Into the Underground of Social Network Bots
FrysteevGoing HD without going insane
Gargaj/ConspiracyBridging the Gapblockparty 2009
Travis GoodspeedFun With The MSP430 MCU
Jeon & TreizeHacking Light - How we came to love Holga and Other Stories of photo hi jinx
David "ReL1K" Kennedy Fast-Track: Advanced penetration techniques made easy
Jeff KeyzerHacking the Asus WL-520gU Wireless Router
Mark Lenigan & Kirk LeniganThe Uses of Disorder: Chaos Theory as it Relates to Demos
Michele Martaus"Pilates" for Common Cubicle Injuries
Steve Mokris & John BowditchImmersive Video: Photogrammetry in Game Development
Ne0nRa1nThe Strange and Creepy World of Brain Fingerprinting
Matt "Zamboni" NeelyNotacon Mythbusters: Is Personal Data Stored on Hotel Keys? Using Magstripe Analysis Tools to Discover the Answer
Rob "Flack" O'HaraThe World of Free Book Publishing
Christopher PilkingtonHacking and Amateur Radio--Consumer Telecommunications is for Noobs
Ed PiskorWizzywig: Hacking Out A Graphic Novelblockparty 2009
Bruce PotterBuilding, Securing, and Living With Game Servers
Trevor ReiterWii-Noises
George Sanger & Jeri EllsworthThe Fat Man and Circuit Girl: LIVE!blockparty 2009
Jason ScottSuper Jason Scott Presentation 64
SigFLUP & LuisProgramming The Sega Genesis For Mad Profit and Crazy Mad Profit
TottenkophHacking Cognition
valanxPennies, Pawn Shops, and Persistence: The Creative Process on a Budget
Jason ViersIntro to Go
ultra lasercon.talk.w32.x86 --OR-- stop clicking on those *&*&#$# email attachments, mom!
How to Give Talks and Influence Organizers - Propaganda
You have something cool; how do you spread the word and get people interested? What makes us tick? Propaganda as an art has been skillfully refined and used everywhere, from politics to advertising. It even crops up in our personal lives, as ads assure us what to do and buy. In a sense, everything is propaganda. Explore the basic techniques used by advertisers and public relations offices, and learn a few new tricks to get ahead.
aestetix hung around a banda of droogs until a drat with a dama and spiltblood of a old man jailed him up. He was cured, all right.
James "Myrcurial" Arlen
From a Black Hat to a Black Suit - The Econopocalypse Now Edition
James Arlen

You want it all. But you're scared. You don't want to put on a suit and watch your soul shrivel. There is another way.

In this session, you will learn: - why you want to do this to yourself - how to get the first job (which will suck) - how to turn the first job into the next job (while still having fun) - how to get the top job (sooner than you thought you could) - and how to do it all without feeling like a corporate whore.

You want to hack the planet? You've got to start somewhere.

Now with new information on why the suffering economy is good news for you!!!

James Arlen is a security consultant most recently engaged as the CISO of a mid-market publicly traded financial institution. He has been involved with implementing a practical level of information security in Fortune 500, TSE 100, and major public-sector corporations for more than a decade. James has a recurring column on Liquidmatrix Security Digest. His areas of interest include organizational change, social engineering, blinky lights and shiny things.
Injection Rejection, or How I Learned To Stop Worrying and Love Bobby Tables
Security pros are familiar with the well-known SQL Injection and Shell Injection attacks. But more obscure attacks such as DNS Injection and even Clipper Macro Injection proliferate because many programmers don't know any better. Learn how to write injection-proof code in any language, on any operating system, no matter how hard the boss pushes you to slap a system() call in there and ship it. This presentation is essential for anyone who designs, writes, reviews, tests, audits, compiles, uses, admins, or pays for software.
catfood has been hacking artlessly since implementing a FORTRAN preprocessor in the Lotus 1-2-3 macro language in 1988. Now, he helps software dev teams get projects done faster without burning out. This presentation is based on actual code observed in the wild.
CG & g0ne
Time To Replicate The Real Threat: Client Side Penetration Testing

Client Sides are the new remote exploit. If you aren't allowing client side attacks during your vulnerability assessments or penetration tests you are ignoring a huge attack vector and the current attack method. You are also failing to exercise your internal and host based exploitation countermeasures (HIDS/HIPS), your ability to test and respond to client side attacks and internal attackers, and missing a valuable opportunity for user awareness training.

This talk will focus on justifying why you should be allowing client side penetration testing and giving penetration testers a basic methodology to conduct client side attacks during their penetration test. We will also give (mostly real-world) examples we used during client side penetration tests to go with our methodology.


Chris Gates (CG). Founder Full Scope Security performing full scope penetration testing and security engineering. Previous jobs include full scope penetration tester for one of the DoD Red Teams and Army Signal Officer spending gobs of time in layer 2 and layer 3 land. EthicalHacker.net columnist and security blogger http://carnal0wnage.blogspot.com

Vince Marvelli (g0ne). Founder Full Scope Security performing full scopepenetration testing and security engineering. Previous jobs includes full scope penetration tester for one of the DoD Red Teams, SOC architect and principal engineer, IDS architect and analyst, general IT security analyst and security blogger https://g0ne.wordpress.com

chrisclymer.com | Security Justice Chris Clymer
The State of Apple Security
Common wisdom is that Macs are magically malware proof. Few users run antivirus, HIDS, and other countermeasures which are considered mandatory for the PC. In this talk I will be discussing some of the vulnerabilities, current threats, and emerging threats for Apple's platform. You may want to leave your mac at home, its feelings will probably be hurt during this presentation.
Chris is an Information Security professional with 10 years of experience in IT. He is specialized in UNIX-based systems, and owns several overpriced pieces of fruit. He has spoken at past Notacons, LUGs, and the Information Security Summit among others.
Adrian "IronGeek" Crenshaw
Hacking Video Tutorial Tips: Getting the point across with screencasting computer videos
Adrian \
Over the years I've done a lot of video tutorials on using screencasting software to teach folks new to hacking how various security tools work. I'd like to share the tips and tricks I've learned so that others can start to teach people about technology in the same way. Covered topics will include: Screencasting software, free tools, getting the best video for the least bandwidth, audio work, free hosting, animations and more.
Adrian Crenshaw has worked in the IT industry for the last twelve years. He runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools. He did the cert paper chase for awhile (MCSE NT 4, CNE, A+, Network+. i-Net+) but stopped once he had to start paying for it himself. He's currently working on an MBA, but is interested in getting a network security/research/ teaching job in acedamia.
dai5ychain.net Critical Artware
The Artware Development Environment Artware Environment
blockparty 2009

Three members of the criticalartware crew will demonstrate and explain the technical, aesthetic, psychedelic and social functionality of the Artware Development Environment Artware Environment, the tool they used to develop award-winning artware such as HyperYarn, CHASSIS, and HULL (which won first place in the 'Artware' category at blockparty 2008). The Artware Development Environment Artware Environment will be made available on CD-ROM and online after the demonstration.

Jason Scott invites you to check out the appearance of CriticalArtware (and Jason as well) at the 2008 HOPE Conference in New York City.

Jake, Jon & Tamas live in Chicago (birthplace of dirty new media) and work as cyberpsychedelic artware engineers in a variety of industries.
Fark.com Drew Curtis
The Long Slow Death of Mainstream Media (no really): How We Got Here
It's not a dream, a hoax, or an imaginary story - mainstream media is indeed doomed. How did this happen? Can it be fixed? Is this the death of journalism? Is society going to collapse because of this? Are yes/no questions in headlines always no? Come find out. Bonus: Drew will use a random powerpoint slide generator to illustrate his talk.
Drew Curtis can fly, shoot laser beams out of his eyes, and once fought Godzilla to a standstill. In addition to fighting crime with his trusty sidekick Kid Buddha, Drew has been running Fark.com for the past 10 years.
dailyduino.com droops & Morgellon the Lowtek Mystic
Interactivity with Arduinos, Transducing the Physical World
The Arduino is an open source microcontroller development board that makes it easy for beginners in electronics to do crazy things. We are going to be continuing our Intro to Arduinos talk from Phreaknic, Anyone new to Arduinos should watch that talk online. We will be discussing building your own devices to interact with the real world: making electronic musical instraments, wireless communication, networking Arduinos, controlling lights and sounds, sensing touch, RFID, building custom games with custom controllers, sensing temperature changes and ways of notification like phone calls, sms, hidden buzzers. We will also go into building clothes with embedded electronics.
droops and Morgellon have spent the last year being addicted to the Arduino platform. They are currently working on a book based on their Phreaknic Arduino talk and beyond.
Tom "agent0x0" Eston
The Rise of the Autobots: Into the Underground of Social Network Bots

How do you know that last friend request or Twitter follower was an actual live human being? The truth is...you don't! Bots and bot manufacturers have become rampant in social networks such as MySpace, Facebook and Twitter exploiting the trust relationships that make social media work. Why are bots taking control of social networks? It's simple. Social networks are the fastest growing phenomenon of our time. For example, Facebook alone recently reached 150 million potential targets for spammers, malware authors, and other undesirables in 2008. Social networks are only getting bigger and bots will be part of this trend.

This presentation will take you on a journey into the thriving bot underground where bots are manufactured for every purpose imaginable. We will talk about good bots, bad bots, really evil bots, how to identify bots, terminating bots and the future possibility of social network botnets to rule them all.

Tom Eston is a information security professional from Cleveland Ohio. Tom currently works for a financial institution as the security assessment team lead and penetration tester. In his spare time he conducts social media security research, blogs about security on spylogic.net and co-hosts the Security Justice podcast. Tom is also the author of the Facebook Privacy & Security Guide and a frequent speaker on information security topics.
Going HD without going insane
High Definition has become commonplace in the consumer world, but if you think the confusion ends with the sales guy at the big box store explain lcd vs. plasma, you're wrong. The broadcast world is full of many standards and technologies with new ones every day. We will take a look at building an HD Television studio on a budget and the digital production workflow. For all their promises, these "better" technologies don't always quite work, leaving many professionals frustrated and at the whim of customer support. There are many gaps which mean opportunities for creative and enterprising people to make, modify and hack existing equipment to work.
Steev likes bacon, and hardware hacking. Mostly self taught, he has been ripping open gear and digging in equipment racks as long as he can remember. Getting shocked, cut and burnt does not deter him but he would rather avoid it as the result of trying to make things work the way he wants instead of they way they were designed.
Bridging the Gap
blockparty 2009

Organizing a party is a tricky task. Organizing a party in a different country is even trickier. In a different continent? Very very exhausting - and that's just the jetlag! While the European and American culture has a lot in common, they also differ a lot, especially when it comes to doing a demoparty; advertising, infrastructure, attitude - these are all something one has to adapt to. Gargaj will attempt to take you on a convenient little comparison-journey on the differences of organizing Function (a big small party) and NVScene (the small big party), introduce you to various customs in various party-styles and eventually offend you. (Probably, anyway.)

Gargaj will be attending both the Breakpoint and Blockparty demoparties, happening within a week of each other, in two different continents

Gargaj is a founding member of renowned demogroup Conspiracy, helping member of Scene.org, organizer of Function, NVScene, various Norwegian parties, and maintainer of pretty much every second demoscene portal in existence.
travisgoodspeed.blogspot Travis Goodspeed
Fun With The MSP430 MCU
Learn how to build things--and break things--with the MSP430 microcontroller. Covers reverse engineering, Zigbee, infrared, toys, belt buckles, board fabrication, password cracking, and more.
Travis Goodspeed is a neighborly reverse engineer from Knoxville, Tennessee. He authored the first 802.15.4 stack overflow exploit, and he is playing with the MYK78 "Clipper Chip" in his spare time.
Jeon & Treize
Hacking Light - How we came to love Holga and Other Stories of photo hijinx
Almost Everyone has a camera. But how many of you have done anything but turn it on and take a picture? In this talk we will show what you can achieve with "toy" cameras, How to resurrect old cameras to use modern film, how to get your digital camera to see the world in a whole new spectrum, and more.
Both have worked over 5 years each in the photo and imaging industry for various companies.
David "ReL1K" Kennedy
Fast-Track: Advanced penetration techniques made easy
Advanced penetration testing techniques are often thought of as taking large amounts of knowledge and experience in order to complete. Fast-Track is an open-source penetration testing suite that allows penetration testers attack vectors never before seen. In this presentation, David will present the features of Fast-Track, gaining remote access to systems via popular attack vectors like SQL 1433, SQL Injection, buffer overflows, client-side attacks, and various other methods that Fast-Track allows you to simplify. Additionally, traditional payload methods using the debug conversion method only allowed payloads of 64kb, Fast-Track has a new attack vector that completely bypasses this restriction allowing you to delivery whatever size payload you want. Fast-Track is available on all *nix platforms and is also featured in Back| Track 3, Back|Track 4, and NUbuntu.
David Kennedy is a Principal and Practice Lead at SecureState, a Cleveland Ohio based Information Security consulting firm. Before SecureState, David worked with the National Security Agency (N.S.A.) and became one of the lead instructors on penetration testing. David has presented at numerous conferences and seminars including DEFCON, HTCIA, ISSA, ISACA, and the Northeast Ohio Information Security Summit. David is the author of the widely popular open-source penetration suite, Fast-Track.
Jeff Keyzer
Hacking the Asus WL-520gU Wireless Router
The Asus WL-520gU is a compact, inexpensive wireless router that can be had for as little as $20 after discounts and rebates. Under the hood, this router is a powerful embedded computing platform featuring a 200MHz Broadcom BCM5354 processor, 16MB RAM, and 4MB flash. It can easily be reflashed to run several varieties of Linux, including OpenWrt. Unlike most other wireless routers in this price range, the WL-520gU also includes a USB host port. This opens up many new possibilities for creating interesting projects. I will present some examples, including my own design for a wireless streaming internet radio. For years, the WRT54G has been the router of choice for hacking and unusual applications. I'll show you why you may want to consider using the WL-520gU in your next project instead.
Jeff Keyzer is an electrical engineer and hardware hacker who lives in San Francisco and operates under the handle mightyohm. His diverse interests include embedded systems, RF and analog circuit design, microcontrollers, cars and fuel injection systems, machining, welding, and fabrication. He hosts a blog at mightyohm.com featuring tutorials, project notes (most with full schematics and source) and other resources for people who live and breathe electronics.
Mark Lenigan & Kirk Lenigan
The Uses of Disorder: Chaos Theory as it Relates to Demos
Fractal graphics have been a part of the visual toolkit of the Demoscene for years now. However, they are only the tip of the iceberg when it comes the mathematics of complex, non-linear dynamical systems (popularly known as Chaos Theory). This talk will introduce you to the basics of chaos theory and the applications of it for the Demoscene in particular.

Kirk Lenigan holds a Master's of Science degree in Computational Mathematics from the University of Michigan-Dearborn. He currently works as a sysadmin in CAD systems for a major Tier 2 auto supplier in Michigan.

Mark Lenigan holds a Bachelor's of Science in Physics from University of Michigan-Dearborn. He's been playing around with computer graphics and math for well over a decade, mostly with an eye towards scientific visualization and data analysis.

Michele Martaus
"Pilates" for Common Cubicle Injuries
People suffer from many common posture problems as a result of office work. We are moving less as technology promotes a more sedentary work environment and lifestyle. Performing small, repetitive movements like typing and sitting for long periods takes a toll on ones body and health. Michele will describe several issues that affect people who spend their day behind a desk. Some of these common injuries include: carpal tunnel syndrome, forward head syndrome and low back pain. She will address these and other injuries and introduce exercises that can be performed in a cubicle. Who knows, maybe your whole office will join in the fun!!
Michele is continuously looking to study and learn more about movement in the human body. She has studied with Kelly Kane at the Kane School of Core Integration in New York City, Kuan Hui Chew, a dancer, movement therapist and Pilates instructor and more recently Marie-Jose Blom-Lawrence a member of the faculty at Southern Californias Loyola Marymount University, an anatomy/kinesiology and physiology teacher. In May 2007 Michele completed a week-long dissection on three cadavers with Gil Hedley at the University of Medicine and Dentistry of New Jersey to further her study of human anatomy. She plans to do rehabilitation work with Pilates in the fields of injury prevention and rehabilitation.
Steve Mokris & John Bowditch
Immersive Video: Photogrammetry in Game Development
By utilizing recently developed technologies such as 360-degree photography and immersive video, our team can construct accurate models of buildings and other sites that may be considered at risk for terrorist attacks, hostage situations, or other disasters. For example, if a large-scale fire breaks out on the 10th floor of the Cleveland, Ohio 5/3 Center, first responders will be able to navigate through a virtual world representation, and design an appropriate response. While this project is primarily designed for emergency response, the platform can also be used for planning, prevention, and recovery needs. The presentation will consist of a demonstration of the technology used to capture photos and videos, the process of building a virtual world from this visual data, and the current status of the overall project.
The Game Research and Immersive Design (GRID) Lab, an initiative of Ohio University's Scripps College of Communication, was developed by college staff and faculty to provide the Appalachian Ohio region with training, education, and an opportunity to develop technical and creative skills through the use of interactive digital game technology. The GRID Lab also serves as an innovative and creative center for undergraduate, graduate, faculty and staff research and project development.
The Strange and Creepy World of Brain Fingerprinting
Imagine a world in the future where your thoughts could be used against you to sentence you for a crime, could decide if you will be allowed fly on an airplane, or could decided whether or not your own government considers you a terrorist. Sound like something out of dystopian novel? Feel free to bring along your tinfoil hat because this presentation will explain how the ground-work for this type of future is being explored by the science of today.
Ne0nRa1n has never graduated from any secondary institution, has never held down a job of any great importance, and yet seems to give quite a few speeches on the avant-garde subject called neurohacking. Kind of makes you wonder, huh? Oh yeah, she still hasn't written a book either.
Matt "Zamboni" Neely
Notacon Mythbusters: Is Personal Data Stored on Hotel Keys? Using Magstripe Analysis Tools to Discover the Answer

For years emails and rumors have circulated that personal information such as credit card numbers, names and addresses are stored stored on hotel room keys.

The talk starts with an introduction to magstripe cards and how information is encoded onto the cards. The next section discusses what tools can be used to read and analyze magstripe cards. Next we test the myth by looking at data collected from a large number of hotel keys to determine what personal information is stored on them. The talk concludes with a discussion of advanced magstripe analysis, data manipulation techniques and how these techniques can be used during penetration tests and security assessments.

By day Matt Neely is the manager of the Profiling team at SecureState where he focuses on penetration testing, web application security reviews and wireless security assessments. By night he is The Great Zamboni, pursuing his research interests in lockpicking, security convergence and wireless hacking. He also co-hosts the Security Justice podcast along with Dave, Tom, Tyler and Chris.
Rob "Flack" O'Hara
The World of Free Book Publishing
Despite an increasingly digital world, there will always be a place for the printed word. As the author of two self-published books dealing with technology, in my presenation I will discuss the process of self-publishing technology-related books from start to finish -- this will include everything from planning and writing a book to editing books, self-publishing your book for free, and marketing your book to fellow technophiles. While websites are by far the quickest way to spread information, written books are by far the most resiliant way to archive it. The goal of this presentation is to spark the inner writer/documenter in hackers and insire them to document their discoveries and inspire others!
Rob "Flack" O'Hara has loves playing with technology and the English language. Rob is the author of "Commodork: Sordid Tales from a BBS Junkie" and "Invading Spaces: A Beginner's Guide to Arcade Collecting," and has been published in 2600: The Hacker's Quarterly, Cult of the Dead Cow, Videogame Collector Magazine, Forever Retro Magazine, Retro Gaming Hacks (O'Reilly Books), and several other publications. Rob was a founder of Soulz at Zero, the OK Krackers, tbh405, and is currently a member of the cDc's Ninja Strike Force.
Website Christopher Pilkington
Hacking and Amateur Radio--Consumer Telecommunications is for Noobs
The idea of venturing into amateur radio seems ridiculous given the current economic conditions, and given most can already communicate globally using the Internet. The presentation will attempt to dispel some of the misconceptions of amateur radio (or at least qualify some of the unfortunate truths), and demonstrate the many facets of amateur radio that are intriguing to the hacker, particularly the long-standing tradition of home building radio equipment. Familiar techniques of the hardware hacking scene, particularly microcontrollers and devkits like Arduino will be incorporated, modernizing what has, until very recently, been a predominantly analog art. The hemorrahging-edge of "homebrewing", software-defined radio, will be discussed, as well as more entry-level home building of test equipment and simple transceivers.
Chris has been a licensed radio amateur since 1991, and has been experimenting with electronics since he was a toddler (when he stuck a fork into a mains outlet of his parents' home.) By trade he is a Network Engineer (read: router monkey) and is his spare time is currently working on an Atmega168-based radio-teletype modem while consuming large quantities of his favorite craft beers. Chris lives outside Syracuse, New York.
edpiskorEd Piskor
Wizzywig: Hacking Out A Graphic Novel
blockparty 2009

Ever wonder what goes into making a graphic novel? Curious about the specific challenges involved in the creation of a graphic novel about hacking and phreaking?

The graphic novel series, Wizzywig, has garnered a loyal underground following due to its respect and appreciation of the culture. The creator, Ed Piskor, will be on hand to discuss the process, and show off some art from the comics.

Ed Piskor is a Pittsburgh based cartoonist, best known for his work on American Splendor with Harvey Pekar and his comic series Wizzywig. He's currently putting pen to paper on the third volume of the series.
Bruce Potter
Building, Securing, and Living With Game Servers
Running a game server can be a crazy experience. As online games become more popular, more people are running game servers for fun and for profit. Unfortunately running a server to host your favorite game can be a huge challenge. Buggy server code, crazy problems deep down in the kernel that effect game play, asshat players trying to hack your server, and dealing with other server admins are just a few issues you'll run in to. And, honestly, the internal workings of game servers and how they interact with the hardware and software is fascinating in its own right. This talk will cover all aspects of running your own game server. You'll learn about kernel interrupt handling, remote server administration, game hacking, server statistics, and the culture of running game servers. And maybe, just maybe, there will be some TF2 playing.
Bruce Potter (gdead@shmoo.com) is the founder of The Shmoo Group of security professionals, a group dedicated to working with the community on security, privacy, and crypto issues. His areas of expertise include wireless security, software assurance, and advanced IT defense techniques. Mr. Potter has co-authored several books and is a regular speaker at security conferences. Mr. Potter was trained in computer science at the University of Alaska, Fairbanks and is currently the CTO of Ponte Technologies.
Trevor Reiter
Trevor Reiter
Video games that let players emulate musical instruments are a dime-a-dozen. The Wiimote is a fresh idea in human-computer interaction, so why should we subject it to being forced to emulate other instruments? This presentation will cover ways to add a Wii-mote to your musical tool box. It will also serve as an introductory peek into audio programming languages like Pure Data and Max/MSP, as well as a little bit of Electroacoustic composition. Ideas to be covered include: Making the actual connection, what's possible with a Wiimote, translating action into sounds, forming MIDI messages, and using external synthesizers.
Trevor graduated from Bowling Green State University in 2007 with a bachelor's in Computer Science, and is currently pursuing a Master's degree in CS from BGSU. His undergraduate minor was in Recording Technology, and this led to an interest in the nature of sound and musical composition from a Computer Science perspective.
Fat Man and Circuit GirlGeorge Sanger & Jeri Ellsworth
The Fat Man and Circuit Girl: LIVE!
blockparty 2009
At last year's Blockparty, Jeri Ellsworth and George Sanger, both Blockparty speakers, met for the first time, and hit it off really well. They collaborated at the party on a demo machine that won first prize in the wild competition, drank some energy drink together onstage, and have since done what everyone who gets along should do: start a TV show. Called "Fat Man and Circuit Girl", this program features George and Jeri talking about electronics projects, art creation, music, and whatever else comes to mind. And in this spirit, we've invited them back for a special live broadcast of their show!

The Fat Man, George Alistair Sanger, has been creating music and other audio for games since 1983. He is internationally recognized for having contributed to the atmosphere of over 250 games, including such sound-barrier-breaking greats as Loom, Wing Commander I and II, The 7th Guest I and II, NASCAR Racing, Putt-Putt Saves the Zoo, and ATF. He wrote the first General MIDI soundtrack for a game, the first direct-to-MIDI live recording of musicians, the first redbook soundtrack included with the game as a separate disk, the first music for a game that was considered a "work of art," and the first soundtrack that was considered a selling point for the game.

On a 380-acre ranch on the Guadalupe River, The Fat Man hosts the annual Texas Interactive Music Conference and BBQ (Project Bar-B-Q), the computer/music industry's most prestigious and influential conference.

Jeri Ellsworth is best known as the engineer behind the C64-DTV, a Commodore-64-in-a-Joystick that has sold over half a million units. She has founded a computer store chain, designed race cars, and is hard at work building a classic arcade in Oregon.

Jason Scott
Super Jason Scott Presentation 64
In some ways, time has given more perspective on the release of Super Mario 64 for the Nintendo N64 game system. As the first of the seminal Mario series to appear in 3D, a lot was riding on this game and Nintendo put the full strength of their software and hardware resources behind its creation. In this fast-paced but indepth presentation, Jason Scott gives context and trivia related to Mario 64 and shows examples of how its groundbreaking approach could still be a source of learning and example for modern computer interaction.
Jason Scott is the administrator of TEXTFILES.COM and the director of a number of computer history documentaries. His interests lie in the fascinating area of the 1970-1990 chome computer revolution, but he has been known to linger in other realms from time to time.
SigFLUP & Luis
Programming The Sega Genesis For Mad Profit and Crazy Mad Profit
Learn about how to program the Sega Genesis from setting up a compiler environment to counting z80 cycles. Join SigFLUP and Luis as they describe VDP interfacing, emulator concerns, VGM writing, romulator design and much much more. Soon you'll be on the road to obtaining crazy mad profit!

SigFLUP is a Nintendo emulator author and a console programmer- in general she's been hacking the mook out of systems since her Atari 1040ST.

Luis is a third year student at NYU pursuing his Bachelor's degree in Digital Communications and Media. He is currently working as a Software Engineer for Thomson Reuters. In his free time he can be found playing competitive foosball, experimenting with electronics using Arduino or playing emulated arcade games.

Hacking Cognition

As a result of the constant high stressed, sleep-deprived, and malnourished state of being that the majority of us live in, smart drugs are considered a normal part of life. Wake up, grab a Monster on your way to the office and then pop out for a smoke when your head feels like it is about to explode in order to help you relax and refocus.

Our presentation will give an overview of what parts of your brain controls various cognitive functions, stressors that effect these functions, the more popular smart drugs that are currently available, which cognitive functions they affect, and the short and long term effects that are associated with each. At the end of the presentation, we'll have caffeinated pixi sticks for members of the audience to take with them.


Tottenkoph is currently working on her bachelor's of science, wrapping up her major in IT Management and getting a late start on her degree in biochemistry. When she's not at school, Tottenkoph can be found at the local Veterans Hospital, bugging the doctors with questions and volunteering part time. After getting sick of digital billboards, Tottenkoph tricked-err...convinced her old friend, Selkie, into joining forces for the talk.

Pennies, Pawn Shops, and Persistence: The Creative Process on a Budget
The purpose of this presentation is to inspire others to use what is around them to create something fascinating, if only for their own amusement. The discussion will attempt to outline methods when designing various tools, displays, and other objects. Economical ways to acquire shop tools will be explored, along with finding effective workspace. Several creations will be shown in varying degrees of completion, with follow-on discussion at each stage outlining lessons learned in the project. All of the projects were completed with a very small budget in mind to allow maximum community participation and inspiration. The projects involve the Sea Otter lockpicks, a lock decoder, displays, artwork for FOOLS products, and the Ark of the Covenant 2.0.
valanx is a member of the Fraternal Order Of LockSport (FOOLS) and is responsible for creating the displays for the Lockpicking Pagoda, the Ark of the Covenant 2.0, the FOOLS logo, and has collaborated on projects with other FOOLS and the PacketSniffers. He has given demonstrations on lockpicking and pick design at DEFCON and NOTACON.
Jason Viers
Intro to Go

A presentation aimed to introduce people to the amazing game Go. It is the oldest game still played in its original form, yet it's one of the few games that humans still regularly trounce the best computer programs. This presentation will describe the game and its rules, some discussion of basic strategy, and an overview of what it is exactly that makes the game so difficult for computers to play.

Additional information: "Graded Go Problems for Beginners", by Kano Yoshinori

American Go Association - http://www.usgo.org/

KGS Go Server - http://www.gokgs.com/

Jason Viers has long been fascinated by the simplicity and beauty of the game Go, and committing to this presentation has finally given him enough of a kick in the pants to get him to really learn something about it.
linkultra laser
con.talk.w32.x86 --OR-- stop clicking on those *&*&#$# email attachments, mom!

The internet is great for taking technology and putting it to use in a way that it was never intended for. There's one particular novel use of technology that the internet is particularly great for!


Ok, ok, two uses. Here we'll look at some of the interesting, scary, and crazy ways that malicious software can be hidden in just about everything you find on the internet, for the purposes of stealing your identity, credit cards, or worse...

And as not to disappoint those of you who were just interested in the porn, malware is often found on porn sites... i'll just leave it at that.

Ultra laser doesn't work well under pressure and 120 word limits on describing himself. He is an elite hax0r with a sooper seekrit pseudonym. He likes pina coladas and long walks on the beach.


Audio Visual rentals provided by Rentech Solutions

© 2009 FTS Conventures | web2009 -at- notacon dot org
fax: 216-221-1409 | Contact Us