Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Security Features

Introduction

For the person not familiar with DEFCON, it can be an overwhelming experience. DEFCON is unlike any typical convention that you might go to. It's also a huge success. It was started thirteen years ago by Jeff Moss who goes by the handle "Dark Tangent" and has grown to a massive event with dozens of speakers and an audience of over five thousand people.

The activities include many contests and lectures, as well as many open discussions throughout the convention grounds. Both formal and informal discussion is aided by the DEFCON hotel (the Alexis Park Hotel in Las Vegas) being completely rented out by DEFCON attendees for the three days of the conference.

Welcome to DEFCON

Because of this, it's easy to talk to people and get involved in discussions as a community. All the talks were held in two of the large ballrooms and a tent the DEFCON staff setup in the parking lot with air conditioning. And if you ever got tired of going from lecture to lecture, you could watch the talks on DEFCON TV from the comfort of your own hotel room.

My thoughts coming in

When I first learned about this convention a couple years ago, I wondered what it must be like. Seeing pictures and hearing stories, it sounded like a free-for-all with hackers running loose and terrorizing Las Vegas. Before arriving, I was still a little concerned about what I would be experiencing. Hackers and computer geeks have a reputation for not being the most sociable people and I didn't expect to be let in that easily.

There was also the matter of the hacking. I thought that with this many experienced, knowledgeable people spending all their time trying to take down websites and cause terror on the Internet, there would be a lot of trouble at the event. I wouldn't have been surprised if they shut down all electronic devices in the area, broke into casino computer systems, stole bank information, and then ran off to further exploit their powers!

In short, I felt that DEFCON had the potential to become a huge quagmire with nothing but destruction on its agenda. But what I learned after the three days of the convention was much different than my imagined story of terror.

More Stuff

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

I have a Asus RT-AC1200 wireless router. I currently have time limits set up on kids Xbox & PS4 however not sure if it works properly, my son was up a...
I currently have an Asus RT-AC86U running Merlin 384.7 and that combination works great for me.However, I am having difficulties with a device on my n...
I'm Having the latest firmware Version:384.7 on my RT-AC86U. Does anybody know what this means? As shown below, it will return every 30 mins.. I have ...
I'm using freedns.afraid.org for my DDNS and LetsEncrypt and I keep seeing the following in the logs (I'm just wondering what it means):Code: Oct 16 ...
Hi all,Other than the convenience is there any huge difference between AIMesh and Repeater/AP Mode? thanks kindly.

Don't Miss These

  • 1
  • 2
  • 3