YoVDO

Hacking Survival - So You Want to Compute Post Apocalypse

Offered By: YouTube

Tags

Conference Talks Courses

Course Description

Overview

Explore post-apocalyptic computing strategies in this Derbycon 2012 conference talk. Delve into survival scenarios like zombie outbreaks, financial collapse, and government failure from a hacker's perspective. Learn about protecting electronics, power management, and rebuilding communication networks. Discover techniques for data transmission using PSK31, Winlink 2000, and packet radio. Examine the potential of commodity gear, HSMM-MESH, and WiFi in disaster situations. Gain insights on essential software, hardware redundancy, and the importance of practice in preparing for technological challenges in a world-ending event.

Syllabus

Intro
About us
The End of the World As We Know It
Act of FSM
Zombies
Financial Collapse
Government Failure
The End Goal
A Hacker's Perspective
Two is one, One is none
Technology Saving Lives
Protecting Electronics
On Having Power...
batteries
Rebuild?
Phone Patch?
Who Needs Wires?
Ham Radio
Practice Makes Perfect
Gear (1)
Again, More Practice
Protecting Gear Redux
THE COMPUTER!
Sending Data
PSK3| (2)
Winlink 2000
Packet Radio
Commodity Gear
HSMM-MESH
A Bit On the WiFi...
Moar Power
Get Extras
More On Extras
Software
We Have A Plan • We know what we need to do to rebuild
Help?


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube