際際滷

際際滷Share a Scribd company logo
Open solutions, smarter people




                           Security

   You are also part of the game




This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
Open solutions, smarter people




                        Who is that guy?
   Bert Desmet
   23 years old
   Fedora  Ambassador, mentor, packager
   Loadays  Co organizer
   Numius  System Engineer, Consultant
   Devnox  Developer, System Engineer
Open solutions, smarter people




                         Today's topics
   I'm a good hacker.
   Why I love USB sticks.
   Remember your password?
   Shhhhhhht!
Open solutions, smarter people




I am a good hacker.
Open solutions, smarter people




No tech hacking?
Open solutions, smarter people




Shoulder surfing
Open solutions, smarter people




Dumpster diving
Open solutions, smarter people




Social engineering
Open solutions, smarter people




Taking pictures
Open solutions, smarter people




Why I love USB sticks.
Open solutions, smarter people




They are easy
Open solutions, smarter people




And small
Open solutions, smarter people




              They are easily..
 Forgotten
 Stolen
Open solutions, smarter people




                   Some thoughts about it
   Encrypt your sensitive data
   Never put passwords on your system
   Use the intranet
   Never leave your portable gear alone
   Never forget your gear
Open solutions, smarter people




                             Some statistics
 53% of UK workers lost portable devices
    >50% at a drinking venue
        Taxis and public transport
 1 lost data record cost more than $187
    70% indirect cost
          Lost costumers
Open solutions, smarter people




Remember your password?
Open solutions, smarter people




                How to choose a password
   Avoid using dictionary words
   Use special characters and numbers
   Change your password every month
   Blah blah blah
Open solutions, smarter people




                How to choose a password
   Avoid using dictionary words
   Use special characters and numbers
   Change your password every month
   Blah blah blah
Open solutions, smarter people




                          Entropy
 H : Entropy
 N : Possible symbols
 Length of string




                         H= Llog2 N
Open solutions, smarter people




                          Example time!
 This is.obviously a.bad passw0rd:-(
     L : 35
     W : 94
     H : 賊230
 PrXyc.N(n4k77#L!eVdAfp9
     L : 23
     W : 94
     H : 賊151
Open solutions, smarter people




                  Time to crack a password
 [[Guesses before string is found = 2H]]
 This is.obviously a.bad passw0rd:-(
     2230 = 1.72543659  1069
     1000 guesses /s = 5.5 x 1058 years
 PrXyc.N(n4k77#L!eVdAfp9
     2151 = 2.85449539  1045
     1000 guesses /s = 9  1034 years
Open solutions, smarter people




Password Strenght
Open solutions, smarter people




                             Lastpass
 Fully encrypted
 Generate extremely hard passwords
 Choose a good master password!
Open solutions, smarter people




                            Some tips
 Never store passwords on pc
 Never use autologin
Open solutions, smarter people




Shhhhhhhht!
Open solutions, smarter people




I want you to shut up!
Open solutions, smarter people




               Security through obscurity
 Don't tell anyone
 Security based on secrecy
Open solutions, smarter people




                     Kerckhoffs' doctrine
 Security can't depend on secrecy
Open solutions, smarter people




                           Reality
 There are always leaks
     By accident
     Deliberately
 Try to keep 'secrets'
Open solutions, smarter people




Wait! There is more!
Open solutions, smarter people




In a perfect world..
Open solutions, smarter people




There is always a hole.
Open solutions, smarter people




I like onions
Open solutions, smarter people




                      Multi Level Security
 Multiple systems
 Building fort Knox
 You are the first line of defense
Open solutions, smarter people




Extra! Extra!
Open solutions, smarter people




Something you have..
Open solutions, smarter people




Yubikey
Open solutions, smarter people




  I preach.
And I practice.
Open solutions, smarter people




                                         Questions?
 Bert Desmet
 Security, you are also part of the game




   Mail: Bert@devnox.eu
   Twitter: @bdesmet_
   Website: http://blog.bdesmet.be
   Website: http://www.devnox.eu
   This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
Open solutions, smarter people




                                                         Sources
   Chess game: http://www.flickr.com/photos/seeminglee/1479932683/
   Closed vault: http://www.flickr.com/photos/mstyne/3654056683/
   Open vault: http://www.flickr.com/photos/spotsgot/156025944/
   Onion: http://www.flickr.com/photos/inferis/107293622/
   Laptop + usb stick: http://www.flickr.com/photos/wstryder/2780310027/
   New York Public Library: http://www.flickr.com/photos/paul_lowry/2616820493/
   Statistics on loosing gear: http://www.securestix.com/bad_news.php
   Shoulder surfing: http://www.flickr.com/photos/bonzoesc/209474964/
   Dumpster: http://www.flickr.com/photos/urbanjacksonville/1803065217/
   Telephone call: http://www.flickr.com/photos/lst1984/994531885/
   Taking pictures: http://www.flickr.com/photos/glenpooh/708845839/
   Xkcd joke: http://xkcd.com/936/
   Shut up: http://www.flickr.com/photos/lorenia/934705558/
   3way handhake: http://media.photobucket.com/image/3%20way%20handshake/Haley_Bug/Mission%20Trip%20Choir%20Tour%202006/100_0087.jpg?o=1
   Yubikey: http://www.flickr.com/photos/thofle/3206443137/
   Special thanks to: Johnny Long
Open solutions, smarter people
Ad

Recommended

Hack u intro
Hack u intro
hacku
Contribute or die
Contribute or die
Bert Desmet
So, You Want to Land a Job
So, You Want to Land a Job
John Gallagher
Cave Spring Knights Touchdown Club 2014
Cave Spring Knights Touchdown Club 2014
John Gallagher
Fedora 14 overview
Fedora 14 overview
Bert Desmet
How To Take Notes During Meetings
How To Take Notes During Meetings
Russel C. Arida
Load balancing implementation in wireless networks
Load balancing implementation in wireless networks
Muthu Kumaar Thangavelu
Climbing the Age & Ladder Chart
Climbing the Age & Ladder Chart
Russel C. Arida
亟仂亞舒亟亳仆舒&温馨沿;弍亠仍仂于舒1
亟仂亞舒亟亳仆舒&温馨沿;弍亠仍仂于舒1
guestfb2102
Boeing rocketdyne radical innovation case study
Boeing rocketdyne radical innovation case study
Muthu Kumaar Thangavelu
SESTINFO 2011 Apresentacao Android
Rafael Sakurai
Social Training Project for Merchandisers
Social Training Project for Merchandisers
Russel C. Arida
Semantic web design for www.data.gov.sg - Technical Report
Semantic web design for www.data.gov.sg - Technical Report
Muthu Kumaar Thangavelu
Why You Should Partner With Colonial Life
Why You Should Partner With Colonial Life
donnadwyer
Buckmann labs KM case study
Buckmann labs KM case study
Muthu Kumaar Thangavelu
Human Capital Management
Human Capital Management
Muthu Kumaar Thangavelu
Measures of corporate performance
Measures of corporate performance
SamahAdra
Bp business and information strategy alignment
Bp business and information strategy alignment
Muthu Kumaar Thangavelu
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
adamdeja
Learn Hacking
Learn Hacking
hackingtraining
E Crime Mid Year Meeting London
E Crime Mid Year Meeting London
Hartj
Shannon Morris PDLM presentation
Shannon Morris PDLM presentation
shannoncmorris
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
Barcamp Kerala
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
Deja vu Security
Passwords
Passwords
Kevin OBrien
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Small Business
Computer Security
Computer Security
tonik
So whats in a password
So whats in a password
Rob Gillen
A journey through an INFOSEC labyrinth
A journey through an INFOSEC labyrinth
Avdnei Andrei
Human/User-Centric Security
Human/User-Centric Security
Shujun Li

More Related Content

Viewers also liked (10)

亟仂亞舒亟亳仆舒&温馨沿;弍亠仍仂于舒1
亟仂亞舒亟亳仆舒&温馨沿;弍亠仍仂于舒1
guestfb2102
Boeing rocketdyne radical innovation case study
Boeing rocketdyne radical innovation case study
Muthu Kumaar Thangavelu
SESTINFO 2011 Apresentacao Android
Rafael Sakurai
Social Training Project for Merchandisers
Social Training Project for Merchandisers
Russel C. Arida
Semantic web design for www.data.gov.sg - Technical Report
Semantic web design for www.data.gov.sg - Technical Report
Muthu Kumaar Thangavelu
Why You Should Partner With Colonial Life
Why You Should Partner With Colonial Life
donnadwyer
Buckmann labs KM case study
Buckmann labs KM case study
Muthu Kumaar Thangavelu
Human Capital Management
Human Capital Management
Muthu Kumaar Thangavelu
Measures of corporate performance
Measures of corporate performance
SamahAdra
Bp business and information strategy alignment
Bp business and information strategy alignment
Muthu Kumaar Thangavelu
亟仂亞舒亟亳仆舒&温馨沿;弍亠仍仂于舒1
亟仂亞舒亟亳仆舒&温馨沿;弍亠仍仂于舒1
guestfb2102
Boeing rocketdyne radical innovation case study
Boeing rocketdyne radical innovation case study
Muthu Kumaar Thangavelu
SESTINFO 2011 Apresentacao Android
Rafael Sakurai
Social Training Project for Merchandisers
Social Training Project for Merchandisers
Russel C. Arida
Semantic web design for www.data.gov.sg - Technical Report
Semantic web design for www.data.gov.sg - Technical Report
Muthu Kumaar Thangavelu
Why You Should Partner With Colonial Life
Why You Should Partner With Colonial Life
donnadwyer
Measures of corporate performance
Measures of corporate performance
SamahAdra
Bp business and information strategy alignment
Bp business and information strategy alignment
Muthu Kumaar Thangavelu

Similar to Security, you are also part of the game (20)

Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
adamdeja
Learn Hacking
Learn Hacking
hackingtraining
E Crime Mid Year Meeting London
E Crime Mid Year Meeting London
Hartj
Shannon Morris PDLM presentation
Shannon Morris PDLM presentation
shannoncmorris
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
Barcamp Kerala
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
Deja vu Security
Passwords
Passwords
Kevin OBrien
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Small Business
Computer Security
Computer Security
tonik
So whats in a password
So whats in a password
Rob Gillen
A journey through an INFOSEC labyrinth
A journey through an INFOSEC labyrinth
Avdnei Andrei
Human/User-Centric Security
Human/User-Centric Security
Shujun Li
How to Become a Hacker?
How to Become a Hacker?
removed_e10bf3fe21ff4e6e6a55bdd2c09fcb15
presentation on hacking
presentation on hacking
Ayush Upadhyay
Introduction to security
Introduction to security
Mostafa Elgamala
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
Drooger, jack cyber security
Drooger, jack cyber security
Hagerstown Chamber Business Expo
OCITA 2012: Opening Up to Open Source Software for Government
OCITA 2012: Opening Up to Open Source Software for Government
Jillmz
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
Quek Lilian
Software security (vulnerabilities) and physical security
Software security (vulnerabilities) and physical security
Nicholas Davis
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
adamdeja
E Crime Mid Year Meeting London
E Crime Mid Year Meeting London
Hartj
Shannon Morris PDLM presentation
Shannon Morris PDLM presentation
shannoncmorris
Bar Camp 11 Oct09 Hacking
Bar Camp 11 Oct09 Hacking
Barcamp Kerala
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
Deja vu Security
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Small Business
Computer Security
Computer Security
tonik
So whats in a password
So whats in a password
Rob Gillen
A journey through an INFOSEC labyrinth
A journey through an INFOSEC labyrinth
Avdnei Andrei
Human/User-Centric Security
Human/User-Centric Security
Shujun Li
presentation on hacking
presentation on hacking
Ayush Upadhyay
Introduction to security
Introduction to security
Mostafa Elgamala
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
OCITA 2012: Opening Up to Open Source Software for Government
OCITA 2012: Opening Up to Open Source Software for Government
Jillmz
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
Quek Lilian
Software security (vulnerabilities) and physical security
Software security (vulnerabilities) and physical security
Nicholas Davis
Ad

Recently uploaded (20)

OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
janeliewang985
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
Cluster-Based Multi-Objective Metamorphic Test Case Pair Selection for Deep N...
janeliewang985
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
Lessons Learned from Developing Secure AI Workflows.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Priyanka Aash
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
Ad

Security, you are also part of the game

  • 1. Open solutions, smarter people Security You are also part of the game This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
  • 2. Open solutions, smarter people Who is that guy? Bert Desmet 23 years old Fedora Ambassador, mentor, packager Loadays Co organizer Numius System Engineer, Consultant Devnox Developer, System Engineer
  • 3. Open solutions, smarter people Today's topics I'm a good hacker. Why I love USB sticks. Remember your password? Shhhhhhht!
  • 4. Open solutions, smarter people I am a good hacker.
  • 5. Open solutions, smarter people No tech hacking?
  • 6. Open solutions, smarter people Shoulder surfing
  • 7. Open solutions, smarter people Dumpster diving
  • 8. Open solutions, smarter people Social engineering
  • 9. Open solutions, smarter people Taking pictures
  • 10. Open solutions, smarter people Why I love USB sticks.
  • 11. Open solutions, smarter people They are easy
  • 12. Open solutions, smarter people And small
  • 13. Open solutions, smarter people They are easily.. Forgotten Stolen
  • 14. Open solutions, smarter people Some thoughts about it Encrypt your sensitive data Never put passwords on your system Use the intranet Never leave your portable gear alone Never forget your gear
  • 15. Open solutions, smarter people Some statistics 53% of UK workers lost portable devices >50% at a drinking venue Taxis and public transport 1 lost data record cost more than $187 70% indirect cost Lost costumers
  • 16. Open solutions, smarter people Remember your password?
  • 17. Open solutions, smarter people How to choose a password Avoid using dictionary words Use special characters and numbers Change your password every month Blah blah blah
  • 18. Open solutions, smarter people How to choose a password Avoid using dictionary words Use special characters and numbers Change your password every month Blah blah blah
  • 19. Open solutions, smarter people Entropy H : Entropy N : Possible symbols Length of string H= Llog2 N
  • 20. Open solutions, smarter people Example time! This is.obviously a.bad passw0rd:-( L : 35 W : 94 H : 賊230 PrXyc.N(n4k77#L!eVdAfp9 L : 23 W : 94 H : 賊151
  • 21. Open solutions, smarter people Time to crack a password [[Guesses before string is found = 2H]] This is.obviously a.bad passw0rd:-( 2230 = 1.72543659 1069 1000 guesses /s = 5.5 x 1058 years PrXyc.N(n4k77#L!eVdAfp9 2151 = 2.85449539 1045 1000 guesses /s = 9 1034 years
  • 22. Open solutions, smarter people Password Strenght
  • 23. Open solutions, smarter people Lastpass Fully encrypted Generate extremely hard passwords Choose a good master password!
  • 24. Open solutions, smarter people Some tips Never store passwords on pc Never use autologin
  • 25. Open solutions, smarter people Shhhhhhhht!
  • 26. Open solutions, smarter people I want you to shut up!
  • 27. Open solutions, smarter people Security through obscurity Don't tell anyone Security based on secrecy
  • 28. Open solutions, smarter people Kerckhoffs' doctrine Security can't depend on secrecy
  • 29. Open solutions, smarter people Reality There are always leaks By accident Deliberately Try to keep 'secrets'
  • 30. Open solutions, smarter people Wait! There is more!
  • 31. Open solutions, smarter people In a perfect world..
  • 32. Open solutions, smarter people There is always a hole.
  • 33. Open solutions, smarter people I like onions
  • 34. Open solutions, smarter people Multi Level Security Multiple systems Building fort Knox You are the first line of defense
  • 35. Open solutions, smarter people Extra! Extra!
  • 36. Open solutions, smarter people Something you have..
  • 37. Open solutions, smarter people Yubikey
  • 38. Open solutions, smarter people I preach. And I practice.
  • 39. Open solutions, smarter people Questions? Bert Desmet Security, you are also part of the game Mail: Bert@devnox.eu Twitter: @bdesmet_ Website: http://blog.bdesmet.be Website: http://www.devnox.eu This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
  • 40. Open solutions, smarter people Sources Chess game: http://www.flickr.com/photos/seeminglee/1479932683/ Closed vault: http://www.flickr.com/photos/mstyne/3654056683/ Open vault: http://www.flickr.com/photos/spotsgot/156025944/ Onion: http://www.flickr.com/photos/inferis/107293622/ Laptop + usb stick: http://www.flickr.com/photos/wstryder/2780310027/ New York Public Library: http://www.flickr.com/photos/paul_lowry/2616820493/ Statistics on loosing gear: http://www.securestix.com/bad_news.php Shoulder surfing: http://www.flickr.com/photos/bonzoesc/209474964/ Dumpster: http://www.flickr.com/photos/urbanjacksonville/1803065217/ Telephone call: http://www.flickr.com/photos/lst1984/994531885/ Taking pictures: http://www.flickr.com/photos/glenpooh/708845839/ Xkcd joke: http://xkcd.com/936/ Shut up: http://www.flickr.com/photos/lorenia/934705558/ 3way handhake: http://media.photobucket.com/image/3%20way%20handshake/Haley_Bug/Mission%20Trip%20Choir%20Tour%202006/100_0087.jpg?o=1 Yubikey: http://www.flickr.com/photos/thofle/3206443137/ Special thanks to: Johnny Long