BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Link: UCOP&#039;s e-newsletter - ECPv6.15.19//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://link.ucop.edu
X-WR-CALDESC:Events for Link: UCOP&#039;s e-newsletter
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
DTSTART:19701029T020000
RRULE:FREQ=YEARLY;BYMONTH=11;BYDAY=1SU
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:19700402T020000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=2SU
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20190310T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20191103T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20200308T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20201101T090000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
TZNAME:PDT
DTSTART:20210314T100000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
TZNAME:PST
DTSTART:20211107T090000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Los_Angeles:20201019T120000
DTEND;TZID=America/Los_Angeles:20201019T130000
DTSTAMP:20260415T192106
CREATED:20200928T224054Z
LAST-MODIFIED:20200928T224054Z
UID:10008375-1603108800-1603112400@link.ucop.edu
SUMMARY:What is Hacking\, Really? Insights into Breaches and Exploits
DESCRIPTION:“Hackers” have become emblazoned in our society.  They dominate news headlines\, are featured in prominent Hollywood movies\, and have become larger than life — instilling fear in IT professionals and awe in many young computer scientists.  Who are these people\, what does it mean “hack” something\, and what the heck is a binary?  Surely\, you have seen a news headline that talks about hackers stealing data\, taking over cars\, or disrupting power plants and thought to yourself\, “how did they do that; is that even possible?” \nIn this talk\, my goal is to convince you that “hacking” isn’t that hard\, and try to tease apart fact from fiction with respect to hackers.  I will highlight some hacking techniques and show you how to “own” a computer.  We will explore some of the technical limitations of our current computing systems and why they are exploitable.  Finally\, I will walk you through a simple example of binary exploitation\, and how you can make a program do things it wasn’t intended to do.  At the end of this talk\, you should be able to read news headlines with sufficient skepticism and\, in some rare cases\, considerable respect for the hacker’s skills. \nJoin the discussion here 
URL:https://link.ucop.edu/event/what-is-hacking-really-insights-into-breaches-and-exploits/
END:VEVENT
END:VCALENDAR