Re: Will the real hacker please stand up and raise their hand

Hash: SHA1

On Tue, 18 Jul 2006, Mark Teicher wrote:

This would make a great panel talk at BlackHat or DEFCON?? :) Kind of reminds me of that talk at BlackHat 2002 "Why blah kiddies s***"..

Can You Ever Trust A Hacker? UBS Trial Puts It To A Test

An interesting article to be sure, but the beef that the defense has with Karl Kasper's testimony is pretty much a straw man. Sure, Kasper works under the name "John Tan" and has been a member of the l0pht. Neither of those facts are show-stoppers when it comes to his credentials.

If anything, trying to discredit Kasper's bona fides on those counts is like trying to dismiss Ehrich Weiss's work in debunking fraud "psychics" simply because his regular job was as an illusionist and he operated under the name of Harry Houdini.

- -Jay

( ( _______
)) )) .-"There's always time for a good cup of coffee."-. >====<--.
C|~~|C|~~| \------ Jay D. Dyson - jdyson@xxxxxxxxxxxxx ------/ | = |-'
`--' `--' `------- I put the 'male' in malevolent. -------' `------'

Version: GnuPG v1.4.4 (TreacherOS)
Comment: See for current keys.


This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request@xxxxxxxxxx for details.