Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hacking Survival - So You Want to Compute Post Apocalypse

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore post-apocalyptic computing strategies in this Derbycon 2012 conference talk. Delve into survival scenarios like zombie outbreaks, financial collapse, and government failure from a hacker's perspective. Learn about protecting electronics, power management, and rebuilding communication networks. Discover techniques for data transmission using PSK31, Winlink 2000, and packet radio. Examine the potential of commodity gear, HSMM-MESH, and WiFi in disaster situations. Gain insights on essential software, hardware redundancy, and the importance of practice in preparing for technological challenges in a world-ending event.

Syllabus

Intro
About us
The End of the World As We Know It
Act of FSM
Zombies
Financial Collapse
Government Failure
The End Goal
A Hacker's Perspective
Two is one, One is none
Technology Saving Lives
Protecting Electronics
On Having Power...
batteries
Rebuild?
Phone Patch?
Who Needs Wires?
Ham Radio
Practice Makes Perfect
Gear (1)
Again, More Practice
Protecting Gear Redux
THE COMPUTER!
Sending Data
PSK3| (2)
Winlink 2000
Packet Radio
Commodity Gear
HSMM-MESH
A Bit On the WiFi...
Moar Power
Get Extras
More On Extras
Software
We Have A Plan • We know what we need to do to rebuild
Help?

Reviews

Start your review of Hacking Survival - So You Want to Compute Post Apocalypse

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.