Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Security Features

Introduction

For the person not familiar with DEFCON, it can be an overwhelming experience. DEFCON is unlike any typical convention that you might go to. It's also a huge success. It was started thirteen years ago by Jeff Moss who goes by the handle "Dark Tangent" and has grown to a massive event with dozens of speakers and an audience of over five thousand people.

The activities include many contests and lectures, as well as many open discussions throughout the convention grounds. Both formal and informal discussion is aided by the DEFCON hotel (the Alexis Park Hotel in Las Vegas) being completely rented out by DEFCON attendees for the three days of the conference.

Welcome to DEFCON

Because of this, it's easy to talk to people and get involved in discussions as a community. All the talks were held in two of the large ballrooms and a tent the DEFCON staff setup in the parking lot with air conditioning. And if you ever got tired of going from lecture to lecture, you could watch the talks on DEFCON TV from the comfort of your own hotel room.

My thoughts coming in

When I first learned about this convention a couple years ago, I wondered what it must be like. Seeing pictures and hearing stories, it sounded like a free-for-all with hackers running loose and terrorizing Las Vegas. Before arriving, I was still a little concerned about what I would be experiencing. Hackers and computer geeks have a reputation for not being the most sociable people and I didn't expect to be let in that easily.

There was also the matter of the hacking. I thought that with this many experienced, knowledgeable people spending all their time trying to take down websites and cause terror on the Internet, there would be a lot of trouble at the event. I wouldn't have been surprised if they shut down all electronic devices in the area, broke into casino computer systems, stole bank information, and then ran off to further exploit their powers!

In short, I felt that DEFCON had the potential to become a huge quagmire with nothing but destruction on its agenda. But what I learned after the three days of the convention was much different than my imagined story of terror.

More Stuff

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

Hi All,I have the ASUS DSL-86U as my main router. I have a new Sky Q router that I would like to use as a repeater / Extender WiFi at home.Usually I w...
If I have a machine configured to use the OpenVPN client in Merlin's firmware, does the firewall still protect me, or does the tunnel bypass all prote...
I'm looking for help to use AiProtection's logs/reports. I've tried to ask Asus support's help about two month ago, but there is no answer from them.....
Hi everyone,On firmware RT-AC56U: 384.6Since a couple of month my forwarding table is getting empty. So i filled it again several times and then since...
A vulnerability in MikroTik WiFi routers has affected nearly 2.5 lakh routers across the globe, leaving them vulnerable to crypto-mining and other for...

Don't Miss These

  • 1
  • 2
  • 3