{"id":1287,"date":"2011-08-26T13:17:19","date_gmt":"2011-08-26T13:17:19","guid":{"rendered":"http:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/"},"modified":"2011-08-26T13:17:19","modified_gmt":"2011-08-26T13:17:19","slug":"pozvanka-na-hacktivity-2011","status":"publish","type":"post","link":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/","title":{"rendered":"Pozv\u00e1nka na Hacktivity 2011"},"content":{"rendered":"<p>17-18.9.2011 sa v Budape\u0161ti uskuto\u010dn\u00ed zrejme najv\u00e4\u010d\u0161ia stredoeur\u00f3pska bezpe\u010dnostn\u00e1 konferencia <a href=\"https:\/\/hacktivity.com\/en\/\">Hacktivity<\/a>. Podobne ako v minul\u00fdch rokoch aj tento ro\u010dn\u00edk Hacktivity bude pln\u00fd zauj\u00edmav\u00fdch predn\u00e1\u0161ok z cel\u00e9ho sveta (15-tich r\u00f4znych kraj\u00edn) a \u010do je d\u00f4le\u017eit\u00e9 &#8211; v\u00e4\u010d\u0161ina prezent\u00e1ci\u00ed by mala by\u0165 u\u017e v angli\u010dtine, \u010do dod\u00e1va Hacktivity punc medzin\u00e1rodnej bezpe\u010dnostnej konferencie.<\/p>\n<p>T\u00e9maticky Hacktivity pokr\u00fdva takmer v\u0161etky zauj\u00edmave oblasti v s\u00fa\u010dasnej IT bezpe\u010dnosti:<\/p>\n<ul>\n<li><strong>v\u00edry, malware, botnety <\/strong>(<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/keynote-fighting-computer-malware\/\">Fighting Computer Malware<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/who-s-living-in-my-router-about-the-feasibility-of-botnet-construction-from-embedded-devices\/\">Who&#8217;s living in my router? About the feasibility of botnet construction from embedded devices<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/enterprise-wi-fi-worms-backdoors-and-botnets-for-fun-and-profit\/\">Enterprise Wi-Fi Worms, Backdoors and Botnes for Fun and Profit<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/malware-analysis-tips-and-tricks\/\">Malware analysis, tips and tricks<\/a>)<\/li>\n<li><strong>digit\u00e1lna forenzn\u00e1 anal\u00fdza<\/strong> (<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/it-as-evidence-from-forensics-perspective\/\">IT as evidence from forensic perspective<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/oracle-forensic1\/\">Oracle Forensic<\/a>)<\/li>\n<li><strong>bezpe\u010dnos\u0165 webov\u00fdch aplik\u00e1ci\u00ed <\/strong>(<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/internet-in-the-sandbox\/\">Internet in the sandbox<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/dr-strangelove-or-how-i-learned-to-stop-worrying-and-love-the-beef\/\">Dr. Strangelove or: How I Learned to Stop Worrying and Love the BeEF<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/modern-browser-attack-vectors\/\">Modern Browser Attacks Vectors<\/a>)<\/li>\n<li><strong>bezpe\u010dnos\u0165 mobiln\u00fdch aplik\u00e1ci\u00ed <\/strong>(<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/there-s-an-app-for-that-pentesting-mobile-applications\/\">There&#8217;s An App For That: Pentesting Mobile Applications<\/a>)<\/li>\n<li><strong>bezpe\u010dnos\u0165 datab\u00e1z<\/strong> (<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/oracle-forensic1\/\">Oracle Forensic<\/a><a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/almost-invisible-cloak-in-oracle-databases-or-the-undocumented-helps-us-again\/\">, <\/a><a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/big-hungarian-health-databases\/\">Big Hungarian Health Databases, <\/a><a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/almost-invisible-cloak-in-oracle-databases-or-the-undocumented-helps-us-again\/\">Almost invisible cloak in Oracle database or the &#8222;undocumented&#8220; help us again<\/a>)<\/li>\n<li><strong>bezpe\u010dnos\u0165 SAP syst\u00e9mov<\/strong> (<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/rootkits-and-trojans-on-your-sap-landscape\/\">Rootkits and Trojans on your SAP Landspace<\/a>)<\/li>\n<li><strong>biometrika<\/strong> (<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/fingerprint-identification-systems-security-or-security-leak\/\">Fingerprint identification systems, security or security leak<\/a>)<\/li>\n<li><strong>bezpe\u010dnos\u0165 a hackovanie SCADA syst\u00e9mov<\/strong> (<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/stuxnet-really-the-first-one\/\">Stuxnet &#8211; Really the first one?<\/a>,<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/scada-dismal-or-bang-bang-scada\/\">SCADA Dismal, or, bang-bang SCADA<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/scada-hacking-security-workshop\/\">SCADA Hacking &amp; Security Workshop<\/a>)<\/li>\n<li><strong>lockpicking<\/strong> (<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/lockpicking-the-finest-art-of-opening-locks\/\">Lockpicking &#8211; the finest art of opening locks<\/a>)<\/li>\n<li><strong>soci\u00e1lne in\u017einierstvo<\/strong> (<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/social-engineering-and-psychology\/\">Social Engineering and Psychology<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/social-engineering-when-the-veil-lifted\/\">Social Engineering &#8211; when the veil lifted<\/a>)<\/li>\n<li><strong>hardv\u00e9rov\u00e9 hackovanie <\/strong>(<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/crypto-chipset-security-passive-active-combined-attacks\/\">Crypto-Chipset Security &#8211; Passive Active Combined Attacks<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/hacking-hardware-for-fun-and-profit1\/\">Hacking hardware for Fun and Profit<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/from-silicon-layout-to-circuit-diagram\/\">From silicon layout to circuit diagram<\/a>)<\/li>\n<li><strong>tvorba exploitov <\/strong>(<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/customizing-public-exploits\/\">Customizing Public Exploits<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/firewalls-and-exploits\/\">Firewalls and Exploits<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/breaking-the-wall-mission-impossible\/\">Breaking The Wall &#8211; Mission: Impossible<\/a>)<\/li>\n<li><strong>anonymita, whitestleblowing a kryptoanarchia <\/strong>(<a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/wikileaks-info-freedom-fight-or-info-terrorism-roundtable-discussion\/\">Wikileaks: info-freedom fight or info-terrorism?<\/a>, <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/cryptoanarchy-after-19-years-since-crypto-anarchist-manifesto\/\">Cryptoanarchy after 19 years since Cryptoanarchist Manifesto<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Prv\u00fd de\u0148 konferencie otvor\u00ed ameri\u010dan Peter Szor ma\u010farsk\u00e9ho p\u00f4vodu venuj\u00faci sa viac ako 20 rokov v\u00fdskumu v\u00edrov a antiv\u00edrovej problematike (spolu s Johnom McAfeem, \u010di Eugenom Kasperskym), je autorom kultovej knihy &#8222;<a href=\"http:\/\/www.amazon.com\/Art-Computer-Virus-Research-Defense\/dp\/0321304543\">The Art of Computer VIrus Research and Defense<\/a>&#8220; ako aj autorom viac ako 40-tich patentov a inov\u00e1cii v obore detekcie po\u010d\u00edta\u010dov\u00fdch v\u00edrov a ich prevencie. T\u00e9maticky podobn\u00fa prezent\u00e1ciu bude ma\u0165 v nede\u013eu poobede Andr\u00e1s Kabai &#8211; <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/malware-analysis-tips-and-tricks\/\">O anal\u00fdze malwaru<\/a>.<\/p>\n<p>Hne\u010f po otvoren\u00ed konferencie nasleduj\u00fa dve prezent\u00e1cie venuj\u00face sa <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/it-as-evidence-from-forensics-perspective\/\">digit\u00e1lnej forenznej anal\u00fdze<\/a> od certifikovan\u00fdch forenzn\u00fdch expertov &#8211; <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/speakers\/csaba-barta\/\">Csaba Bartu<\/a> a <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/speakers\/zsolt-illesi\/\">Zsoltana Ill\u00e9siho<\/a>.<\/p>\n<p>Ostrie\u013ean\u00fd americk\u00fd veter\u00e1n Joseph McCray vysvetl\u00ed princ\u00edpy <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/there-s-an-app-for-that-pentesting-mobile-applications\/\">penetra\u010dn\u00e9ho testovania mobiln\u00fdch aplik\u00e1ci\u00ed<\/a>.<\/p>\n<p>\u010eal\u0161ia sekcia prezent\u00e1ci\u00ed je venovan\u00e1 datab\u00e1zam &#8211; pod\u013ea mojho n\u00e1zoru jeden z najv\u00e4\u010d\u0161\u00edch svetov\u00fdch bezpe\u010dnostn\u00fdch expertov na Oracle <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/speakers\/alexander-kornbrust1\/\">Alexander Kornbrust<\/a> predstav\u00ed <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/oracle-forensic1\/\">forenzn\u00fa anal\u00fdzu Oracle datab\u00e1z<\/a>, L\u00e1szl\u00f3 T\u00f3th vysvetl\u00ed ako je mo\u017en\u00e9 nedokumentovan\u00fa vlastnos\u0165 Oracle oradebug vyu\u017ei\u0165 ako hackersk\u00fd n\u00e1stroj a uvedie n\u00e1s do problematiky debugovania 64-bitov\u00fdch Linuxov\u00fdch bin\u00e1riek.<\/p>\n<p>V sobotu by som si ur\u010dite nenechal ujs\u0165 predn\u00e1\u0161ku od Ertunga Arsala <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/rootkits-and-trojans-on-your-sap-landscape\/\">Rootkity a backdoory v SAP prostred\u00ed<\/a>, \u010di Georgi Geshevovu predn\u00e1\u0161ku o <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/breaking-the-wall-mission-impossible\/\">bezpe\u010dnostn\u00fdch vlastnostiach OpenWall GNU Linux distrib\u00facie<\/a>.<\/p>\n<p>N\u00e1\u0161 kamar\u00e1t <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/speakers\/andras-veres-szentkiralyi\/\">Andr\u00e1s Veres-Szentkir\u00e1lyi<\/a> z Budape\u0161tianskeho H.A.C.K bude hovori\u0165 o <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/hacking-hardware-for-fun-and-profit1\/\">hackovan\u00ed hardv\u00e9ru a jeho sk\u00fasenostiach s Arduinom<\/a> pri rie\u0161en\u00ed ve\u013ek\u00e9ho mno\u017estva praktick\u00fdch probl\u00e9mov z re\u00e1lneho \u017eivota.<\/p>\n<p>Ak ste pou\u017e\u00edvate\u013eom propriet\u00e1rneho protokolu Skype, mo\u017eno pr\u00e1ve pre V\u00e1s bude prezent\u00e1cia od Felixa Schustera o <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/design-and-implementation-of-an-additional-layer-of-encryption-for-skype\/\">\u010fal\u0161ej bezpe\u010dnostnej vrstve umo\u017e\u0148uj\u00facej end-to-end \u0161ifrovan\u00e9 hovory<\/a> bez mo\u017enosti odpo\u010d\u00favania (ako zo strany spolo\u010dnosti Skype, \u010di vl\u00e1d \u0161t\u00e1tov).<\/p>\n<p>\u010cak\u00e1 n\u00e1s aj biometrika &#8211; Csaba Otti s prezent\u00e1ciou <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/fingerprint-identification-systems-security-or-security-leak\/\">aj o tom ako jednoducho kop\u00edrova\u0165 odtla\u010dky prstvov a ob\u00eds\u0165 autentifika\u010dn\u00e9 syst\u00e9my<\/a>, ktor\u00e9 sa na biometriku spoliehaj\u00fa.<\/p>\n<p>Panelov\u00e1 diskusia na z\u00e1ver d\u0148a je venovan\u00e1 <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/wikileaks-info-freedom-fight-or-info-terrorism-roundtable-discussion\/\">kontraverznej t\u00e9me wikileaks<\/a> a etick\u00fdm &#8222;leakerom&#8220; \ud83d\ude42<\/p>\n<p>Druh\u00fd de\u0148 konferencie otvor\u00ed Raoul &#8222;Nobody&#8220; Chiesa, na ve\u013ea bezpe\u010dnostn\u00fdch konferenci\u00e1ch u\u017e d\u00f4verne zn\u00e1my a ostrie\u013ean\u00fd taliansk\u00fd old-schoolov\u00fd hacker venuj\u00faci sa eur\u00f3psk\u00e9mu cyber zlo\u010dinu, \u010di hackovaniu SCADA (priemyseln\u00fdch) syst\u00e9mov.<br \/>\nNede\u013en\u00e9 prezent\u00e1cie na\u0161tartuje Tam\u00e1s Paul\u00edk o ve\u013emi zauj\u00edmavej t\u00e9me, nad ktorou som s kamar\u00e1tmi uva\u017eoval u\u017e pred p\u00e1r rokmi &#8211; <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/who-s-living-in-my-router-about-the-feasibility-of-botnet-construction-from-embedded-devices\/\">ako je mo\u017en\u00e9 vystavi\u0165 vlastn\u00fd botnet z embedded zariaden\u00ed (wifi routere apod)<\/a> a to pou\u017eit\u00edm <a href=\"http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.149.9782&amp;rep=rep1&amp;type=pdf\">Cross Channel Scripting (XCS) \u00fatoku<\/a>. Na t\u00fato prezent\u00e1ciu nadv\u00e4zuje predn\u00e1\u0161ka Viveka Ramachandrana <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/enterprise-wi-fi-worms-backdoors-and-botnets-for-fun-and-profit\/\">ako uveden\u00fd botnet z wifi zariaden\u00ed vyu\u017ei\u0165 na \u0161\u00edrenie malwareu, vytv\u00e1ranie anonymn\u00fdch proxy tunelov a zadn\u00fdch vr\u00e1tok<\/a>.<\/p>\n<p>Paralelne v tom istom \u010dasebude ma\u0165 Zolt\u00e1n Horn\u00e1k predn\u00e1\u0161ku <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/crypto-chipset-security-passive-active-combined-attacks\/\">o pas\u00edvn\u00fdch a akt\u00edvnych \u00fatokoch na krypto\u010dipy s cie\u013eom extraktova\u0165 priv\u00e1tne k\u013e\u00fa\u010de, \u010di rozbi\u0165 samotn\u00e9 \u0161ifrovanie<\/a> pomocou r\u00f4znych zauj\u00edmav\u00fdch met\u00f3d ako napr\u00edklad \u010dasov\u00e1 anal\u00fdza vy\u017earovania.<\/p>\n<p>Nebude ch\u00fdba\u0165 ani <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/social-engineering-and-psychology\/\">predn\u00e1\u0161ka o soci\u00e1lnom in\u017einierstve a psychol\u00f3gii<\/a> od profesora Petra Bodora a <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/social-engineering-when-the-veil-lifted\/\">nadv\u00e4zuj\u00faca prezent\u00e1cia Esztery Oroszi<\/a>, sle\u010dny, ktor\u00e1 soci\u00e1lne in\u017einierstvo priamo profesion\u00e1lne vykon\u00e1va.<\/p>\n<p>Tento rok budem ma\u0165 mo\u017enos\u0165 na Hacktivity prispie\u0165 svojou <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/cryptoanarchy-after-19-years-since-crypto-anarchist-manifesto\/\">technicko-politickou prezent\u00e1ciou o ve\u013emi kontraverznej t\u00e9me &#8211; Kryptoanarchia &#8211; 19 rokov od nap\u00edsania krytptoanarchistick\u00e9ho manifesta<\/a>. Viac neprezrad\u00edm &#8211; nev\u00e1hajte pr\u00eds\u0165 do Budape\u0161ti a dozvedie\u0165 sa nie\u010do o tejto ve\u013emi zauj\u00edmavej t\u00e9me na\u017eivo.<\/p>\n<p>\u010eal\u0161\u00ed blok prezent\u00e1cii je venovan\u00fd hackovaniu priemyseln\u00fdch SCADA syst\u00e9mov, prezent\u00e1ciou od L\u00e1szl\u00e1 Bir\u00e1 &#8211; <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/stuxnet-really-the-first-one\/\">Stuxnet &#8211; Really, the first one?<\/a>, Yaniva Mirona &#8211; <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/scada-dismal-or-bang-bang-scada\/\">SCADA Dismal, or bang-bang Scada<\/a> a workshopu <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/scada-hacking-security-workshop\/\">SCADA hacking &amp; Security.<\/a><\/p>\n<p>Paralelne k SCADA bude blok prezent\u00e1cii o sie\u0165ovej a webovej aplika\u010dnej bezpe\u010dnosti &#8211; odpor\u00fa\u010dam nenecha\u0165 si ujs\u0165 prezent\u00e1ciu od Michele Orru (spoluautora skvel\u00e9ho BeEF exploit frameworku) &#8211; <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/dr-strangelove-or-how-i-learned-to-stop-worrying-and-love-the-beef\/\">Dr. Strangelove or: How I Learned to Stop Worrying and Love the BeEF<\/a> a Marcella Majora a Mih\u00e1ly Z\u00e1gona &#8211; <a href=\"https:\/\/hacktivity.com\/en\/hacktivity-2011\/programs\/modern-browser-attack-vectors\/\">Modern Browser Attack Vectors<\/a> s d\u00f4razom na bezpe\u010dnos\u0165 HTML5, OpenGL a mno\u017estvo \u010fal\u0161\u00edch vlastnost\u00ed nov\u00fdch prehliada\u010dov.<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg\" alt=\"\" \/><\/p>\n<p>Neodmyslite\u013enou s\u00fa\u010das\u0165ou Hacktivity bud\u00fa samozrejme aj sprievodn\u00e9 akcie &#8211; interakt\u00edvne workshopy, lockpicking, hranie sa s Arduino ako aj hackersk\u00e9 hry (Capture The Flag, Wargame). Prv\u00fdkrat v strednej Eur\u00f3pe bude spusten\u00e1<a href=\"http:\/\/cyberlympics.org\/\">CyberLympics<\/a> &#8211; t\u00edmov\u00e1 hackersk\u00e1 olympi\u00e1da.<br \/>\nN\u00e1v\u0161teva bezpe\u010dnostnej konferencie <a href=\"https:\/\/hacktivity.com\/\">Hacktivity<\/a> sa d\u00e1 samozrejme skombinova\u0165 s n\u00e1v\u0161tevou Budape\u0161tiansk\u00fdch hackerspaceov <a href=\"http:\/\/hsbp.org\/\">H.A.C.K.<\/a>, \u010di kult\u00farno-informatick\u00e9ho centra <a href=\"http:\/\/www.kitchenbudapest.hu\/en\">Kitchen Budapes\u0165.<\/a><\/p>\n<p>Ak ste na Hacktivity e\u0161te neboli, tak mysl\u00edm, \u017ee tento ro\u010dn\u00edk by ste si ur\u010dite nemali necha\u0165 ujs\u0165.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>17-18.9.2011 sa v Budape\u0161ti uskuto\u010dn\u00ed zrejme najv\u00e4\u010d\u0161ia stredoeur\u00f3pska bezpe\u010dnostn\u00e1 konferencia Hacktivity. Podobne ako v minul\u00fdch rokoch aj tento ro\u010dn\u00edk Hacktivity bude pln\u00fd zauj\u00edmav\u00fdch predn\u00e1\u0161ok z cel\u00e9ho sveta (15-tich r\u00f4znych kraj\u00edn) a \u010do je d\u00f4le\u017eit\u00e9 &#8211; v\u00e4\u010d\u0161ina prezent\u00e1ci\u00ed by mala by\u0165 u\u017e v angli\u010dtine, \u010do dod\u00e1va Hacktivity punc medzin\u00e1rodnej bezpe\u010dnostnej konferencie. T\u00e9maticky Hacktivity pokr\u00fdva takmer v\u0161etky [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[12],"tags":[667,668,289,620],"class_list":["post-1287","post","type-post","status-publish","format-standard","hentry","category-uncategorized-cs","tag-budapest-cs","tag-h-a-c-k-cs","tag-hacktivity-cs","tag-security-conference-cs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pozv\u00e1nka na Hacktivity 2011 - Nethemba<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pozv\u00e1nka na Hacktivity 2011 - Nethemba\" \/>\n<meta property=\"og:description\" content=\"17-18.9.2011 sa v Budape\u0161ti uskuto\u010dn\u00ed zrejme najv\u00e4\u010d\u0161ia stredoeur\u00f3pska bezpe\u010dnostn\u00e1 konferencia Hacktivity. Podobne ako v minul\u00fdch rokoch aj tento ro\u010dn\u00edk Hacktivity bude pln\u00fd zauj\u00edmav\u00fdch predn\u00e1\u0161ok z cel\u00e9ho sveta (15-tich r\u00f4znych kraj\u00edn) a \u010do je d\u00f4le\u017eit\u00e9 &#8211; v\u00e4\u010d\u0161ina prezent\u00e1ci\u00ed by mala by\u0165 u\u017e v angli\u010dtine, \u010do dod\u00e1va Hacktivity punc medzin\u00e1rodnej bezpe\u010dnostnej konferencie. T\u00e9maticky Hacktivity pokr\u00fdva takmer v\u0161etky [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-26T13:17:19+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg\" \/>\n<meta name=\"author\" content=\"Pavol Lupt\u00e1k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nethemba\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavol Lupt\u00e1k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/\"},\"author\":{\"name\":\"Pavol Lupt\u00e1k\",\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\"},\"headline\":\"Pozv\u00e1nka na Hacktivity 2011\",\"datePublished\":\"2011-08-26T13:17:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/\"},\"wordCount\":1192,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg\",\"keywords\":[\"budapest\",\"h.a.c.k\",\"hacktivity\",\"security conference\"],\"articleSection\":[\"Uncategorized @cs\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/\",\"url\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/\",\"name\":\"Pozv\u00e1nka na Hacktivity 2011 - Nethemba\",\"isPartOf\":{\"@id\":\"https:\/\/nethemba.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg\",\"datePublished\":\"2011-08-26T13:17:19+00:00\",\"author\":{\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\"},\"breadcrumb\":{\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#primaryimage\",\"url\":\"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg\",\"contentUrl\":\"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nethemba.com\/cs\/home-new-2025\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pozv\u00e1nka na Hacktivity 2011\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nethemba.com\/de\/#website\",\"url\":\"https:\/\/nethemba.com\/de\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nethemba.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234\",\"name\":\"Pavol Lupt\u00e1k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"caption\":\"Pavol Lupt\u00e1k\"},\"sameAs\":[\"https:\/\/www.nethemba.com\/\"],\"url\":\"https:\/\/nethemba.com\/cs\/author\/nethemba-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pozv\u00e1nka na Hacktivity 2011 - Nethemba","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/","og_locale":"cs_CZ","og_type":"article","og_title":"Pozv\u00e1nka na Hacktivity 2011 - Nethemba","og_description":"17-18.9.2011 sa v Budape\u0161ti uskuto\u010dn\u00ed zrejme najv\u00e4\u010d\u0161ia stredoeur\u00f3pska bezpe\u010dnostn\u00e1 konferencia Hacktivity. Podobne ako v minul\u00fdch rokoch aj tento ro\u010dn\u00edk Hacktivity bude pln\u00fd zauj\u00edmav\u00fdch predn\u00e1\u0161ok z cel\u00e9ho sveta (15-tich r\u00f4znych kraj\u00edn) a \u010do je d\u00f4le\u017eit\u00e9 &#8211; v\u00e4\u010d\u0161ina prezent\u00e1ci\u00ed by mala by\u0165 u\u017e v angli\u010dtine, \u010do dod\u00e1va Hacktivity punc medzin\u00e1rodnej bezpe\u010dnostnej konferencie. T\u00e9maticky Hacktivity pokr\u00fdva takmer v\u0161etky [&hellip;]","og_url":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_published_time":"2011-08-26T13:17:19+00:00","og_image":[{"url":"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg","type":"","width":"","height":""}],"author":"Pavol Lupt\u00e1k","twitter_card":"summary_large_image","twitter_creator":"@nethemba","twitter_site":"@nethemba","twitter_misc":{"Napsal(a)":"Pavol Lupt\u00e1k","Odhadovan\u00e1 doba \u010dten\u00ed":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#article","isPartOf":{"@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/"},"author":{"name":"Pavol Lupt\u00e1k","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"headline":"Pozv\u00e1nka na Hacktivity 2011","datePublished":"2011-08-26T13:17:19+00:00","mainEntityOfPage":{"@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/"},"wordCount":1192,"commentCount":0,"image":{"@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#primaryimage"},"thumbnailUrl":"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg","keywords":["budapest","h.a.c.k","hacktivity","security conference"],"articleSection":["Uncategorized @cs"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/","url":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/","name":"Pozv\u00e1nka na Hacktivity 2011 - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#primaryimage"},"image":{"@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#primaryimage"},"thumbnailUrl":"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg","datePublished":"2011-08-26T13:17:19+00:00","author":{"@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"breadcrumb":{"@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/"]}]},{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#primaryimage","url":"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg","contentUrl":"http:\/\/farm3.static.flickr.com\/2032\/2088653878_6023196783.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/cs\/pozvanka-na-hacktivity-2011\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/cs\/home-new-2025\/"},{"@type":"ListItem","position":2,"name":"Pozv\u00e1nka na Hacktivity 2011"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"},{"@type":"Person","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234","name":"Pavol Lupt\u00e1k","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","caption":"Pavol Lupt\u00e1k"},"sameAs":["https:\/\/www.nethemba.com\/"],"url":"https:\/\/nethemba.com\/cs\/author\/nethemba-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts\/1287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/comments?post=1287"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/posts\/1287\/revisions"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/media?parent=1287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/categories?post=1287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nethemba.com\/cs\/wp-json\/wp\/v2\/tags?post=1287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}