Date: November 5, 2015 at
Location: Algonquin College (Woodroffe Campus), room T317
Note This meeting is at the Woodroff campus of Algonquin in Building T, room T-317 at 7:00pm
This month we will be having a single talk on malware reverse engineering. The talk will be filled with examples and may go on for an extended period, depending on audience interest..
There will be a one hour pre-meeting item from 18:00 to 19:00 for people who are new to Linux, have general questions, or wish to help out with people who are just getting started.
After Meeting Social:
After the meeting, there will be a social event at one of the nearby pubs or restaurants. A short discussion and vote as to location will be taken then.
After the main talk there will be the opportunity for a GPG key signing. This is a monthly offering, just look for Scott after the talk and we can go from there. Bring some kind of photo ID and some keyslips if you expect people to sign your key.If you need some method of creating pages of keyslips, there is an online slip generator available.
Most intrusions involve some form of malicious software. When investigating an incident, the responder typically seeks to answer questions such as: Which systems are affected? What actions can the malware specimen perform on the system? How does it spread? How does it maintain contact with the attacker? These questions can all be answered by analyzing the malware.
Patrick Malcolm will demonstrate how malware reverse engineering can support the efforts of those pursuing adversaries employing malicious code in their trade-craft.
Do you have an idea about how to promote Linux and Open Source Software in Ottawa? OCLUG may be able to help with up to $500 towards your expenses.
For the rest of 2015, we will be meeting at Algonquin College (Woodroffe Campus) in Building T, room T317.