Skip to main content

45,745
UPLOADS


More right-solid

More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
GDC Extras Archive
Apr 10, 2011 CMP Game Media Group
movies

eye 543

favorite 0

comment 0

"Sizzle" tape (collection of logos and television news recordings) of the 14th annual Game Developers Conference. Likely created to show to prospective vendors and exhibitors examples of the far-reaching influence of GDC with regards to exposure and brand recognition. People and events appearing in this tape include: General walking around shots, Dara Gray Tinefield, Adam Sessler of ZD-TV, Scott Budman of News Channel 11, Bill Gates of Microsoft, David Louie of ABC San-Jose, Trent...
Topics: GDC, Game Developers Conference
The Two Hands Project Footage Archive
Apr 12, 2011 Two Hands Project
movies

eye 46

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011 Two Hands Project
movies

eye 403

favorite 0

comment 0

Interview of Phil Torrone from Adafruit, followed by footage of NYC Resistor hackerspace, handheld.
Topics: Two Hands Project, Documentary, Interview, Handheld
The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 252

favorite 0

comment 0

The Two Hands Project Footage Archive
movies

eye 28

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 24

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 30

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 21

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 269

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 71

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 30

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 33

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 12, 2011
movies

eye 20

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 25

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 34

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 28

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 24

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 29

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 35

favorite 0

comment 0

The Two Hands Project Footage Archive
movies

eye 40

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 254

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 28

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 14, 2011
movies

eye 26

favorite 0

comment 0

The Two Hands Project Footage Archive
Apr 15, 2011
movies

eye 31

favorite 0

comment 0

The Archive Team Just In Time Grabs
May 14, 2011 John Goerzen
movies

eye 3,256

favorite 9

comment 1

Original Curator's statement by John Goerzen: Back in the early 1990s, before there was a World Wide Web, there was the Internet Gopher. It was a distributed information system in the same sense as the web, but didn’t use hypertext and was text-based. Gopher was popular back then, as it made it easy to hop from one server to the next in a way that FTP didn’t. Gopher has hung on over the years, and is still clinging to life in a way. Back in 2007, I was disturbed at the number of old famous...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: gopher, gopherspace
Sketch Stacks
May 17, 2011
movies

eye 18

favorite 0

comment 0

Sketch Stacks
May 17, 2011
movies

eye 58

favorite 0

comment 0

The Archive Team Just In Time Grabs
movies

eye 271

favorite 0

comment 0

This is the working directory of the OpenAMD project's estimator from The Next Hope, as well as the complete packet dump for obtained during our collection. The collection starts at Friday 12:23:34.714999 and ends at Sunday 16:04:53.403616. It contains, all told, 200123338 packets. Almost all of these are well-formed packets from TNH badges; there are known to be some TLH badges in there (which the localizer knows how to decrypt) and maybe some surprises. Just for clarity, the aggregator was...
Topic: OpenAMD
Unsorted Software History
May 22, 2011 Psygnosis, Inc.
movies

eye 3,305

favorite 2

comment 0

Ork, by Psygnosis. Beamed down to the planet Ixion from the Legion Ship, Cisskel, aspiring Captain Ku-Kabul has to face the dangers and tests specifically placed on this planet in order to prove himself worthy of leadership. Failing any of the tests will end his career as a Legion-Command Officer... permanently! To give him a fighting chance, Ku-Kabul is fitted with twin laser cannons and refuelable jet boosters. Using brains and brawn, he must find, collect, and use objects to solve the many...
Topics: Psygnosis, Ork, Amiga
GDC Extras Archive
May 26, 2011
movies

eye 705

favorite 3

comment 0

This is a collection of gameplay videos from a selection of 1996-era computer and console games, including Super Mario 64, Virtua Fighter, Civilization II, Quake, You Don't Know Jack, Wing Commander III, and many others. In some cases, the same footage loops or different sequences of similar footage is shown in various configurations. While it is not clear what the purpose of the tape was, it was likely to be an editing scratch tape (to test out editing sequences or image quality) or might have...
Topics: GDC, GDC Extras, Sizzle Tape
GDC Extras Archive
May 27, 2011
movies

eye 432

favorite 0

comment 0

Collection of variant computer-generated Game Developers Conference logos, likely to be used to head sold materials and video assets related to the 1999 Game Developers Conference.
Topics: GDC, GDC Extras, Logos
GDC Extras Archive
May 31, 2011
movies

eye 252

favorite 0

comment 0

Sound logo for the Game Developers Conference 1999 - computer-generated numbers bounce around a meeting hall until the GDC Logo appears and the right numbers bounce into place.
Topics: GDC, Game Developers Conference
The Two Hands Project Footage Archive
movies

eye 59

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 6, 2011
movies

eye 333

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 6, 2011
movies

eye 31

favorite 0

comment 0

The Two Hands Project Footage Archive
movies

eye 31

favorite 0

comment 0

The Two Hands Project Footage Archive
movies

eye 45

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011
movies

eye 318

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011
movies

eye 41

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011
movies

eye 72

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011
movies

eye 37

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011
movies

eye 35

favorite 0

comment 0

The Two Hands Project Footage Archive
movies

eye 78

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011 Two Hands Project
movies

eye 34

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011 Two Hands Project
movies

eye 311

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011
movies

eye 49

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011
movies

eye 338

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011 Two Hands Project
movies

eye 40

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011 Two Hands Project
movies

eye 54

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 7, 2011 Two Hands Project
movies

eye 437

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 8, 2011 Two Hands Project
movies

eye 337

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 8, 2011 Two Hands Project
movies

eye 376

favorite 0

comment 0

The Two Hands Project Footage Archive
Jun 8, 2011 Two Hands Project
movies

eye 106

favorite 0

comment 0

From the Two Hands Project's hackerspace documentary, conducted in September of 2009. Interview with Bre Pettis, member of NYC Resistor and co-founder of Makerbot.
Topics: Two Hands Project, Documentary, Footage, Interview, Bre Pettis, Makerbot
Hacker Conferences
movies

eye 119

favorite 0

comment 0

Magnetic cards have been in the wild for years. In that time, there has been lots of talk about how to read them, but most of the information on how to duplicate them has been limited to "Magnetic card writers are too expensive for you." The goal of this presentation is to give an overview of magnetic card technology, demonstrate a way to deceive a card reader into thinking it just saw a card, and demonstrate a cheap card duplicator. The presentation will cover what magnetic cards do,...
Topics: Shmoocon, 2006, Abend, Magnetic Cards, Hackercons, Presentation, Hacking, Hackers
Hacker Conferences
Jun 12, 2011 Acidus
movies

eye 95

favorite 0

comment 0

Web application IDS evasion techniques and countermeasures is a mature area of study. LibWhisker-based apps and Snort have been in a tug-of-war for years. However, the initial reconnaissance of a website or web app has been largely neglected. Its either done by hand (which is tedious) or with a traditional crawler like wget (which is very noisy). An automated crawl appears as an enormous spike in hit count and byte transfer that is well outside the bell-curve for normal users. This presentation...
Topics: Shmoocon, 2006, Acidus, Covert Crawling, Hackercons, Presentation, Hacking, Hackers
Hacker Conferences
Jun 12, 2011 Pedram Amini and Chris Eagle
movies

eye 255

favorite 0

comment 0

Reverse engineering (RE) skills are handy in a number of situations. Determining the behavior of malware, discovery of software vulnerabilities and showing off to your friends are just a few of the benefits that immediately come to mind. Unfortunately reverse engineers are mostly self trained, work in solitude and do not openly work together when developing tools and techniques. This goal of this session is to present some of our ideas and tools (past, present and future) to foster an open...
Topics: Shmoocon, 2006, Chris Eagle, Pedram Amini, Reverse Engineering
Hacker Conferences
Jun 12, 2011 dr.kaos, digunix, atlas, and beth
movies

eye 201

favorite 0

comment 0

Privacy and anonymity are hard to come by these days. What's worse, many if not most, of the world's network users don't have the slightest idea of the levels of monitoring to which they are subjected, much less the proper chain of steps necessary to strengthen their communications channels. While there are applications and systems that provide heightened anonymity and confidentiality to users, all require user-knowledge of configuration and proper systems administration techniques. The tiniest...
Hacker Conferences
Jun 12, 2011 Joel Wilbanks
movies

eye 95

favorite 1

comment 0

Building an enterprise class surveillance system (ECSS) is not as complicated as it sounds. Constructing a system with all the bells and whistles only takes a desire to save the company money and the ability to research and evaluate products currently available in the industry. In January 2004 I proved this theory by constructing an effective ECSS without any prior knowledge of surveillance. From inception to project completion, there were several security companies (some VERY large and well...
Hacker Conferences
Jun 12, 2011 Beetle
movies

eye 111

favorite 0

comment 0

Whether you've noticed it or not, there's a trendy opinion emerging, amongst the folks around you, that the smaller hacker cons are where it's at. Fewer crowds, more clue. Less traffic, cooler tools. Fewer feds, more friends. ToorCon is the standard. CanSecWest is the cold kick-ass con. Creative genius abounds at CodeCon. LayerOne is the nifty newbie. Notacon, Phreaknic, etc. rock you. And in D.C., for the second year running, we have ShmooCon, which might actually have more feds than any other...
Topics: Shmoocon, Beetle, Own the Con, 2006, Hacker Conferences
Hacker Conferences
Jun 12, 2011 Richard Bejtlich
movies

eye 430

favorite 0

comment 0

This talk will introduce the open source network security monitoring suite called Sguil (www.sguil.net). Sguil is a Tcl/Tk interface to alert data from Snort, session data from the Security Analyst Network Connection Profiler (SANCP), and full content data from Tcpdump or a second instance of Snort. Sguil is unlike any Web-based alert GUI used to perform so-called "analysis" of Snort alerts, like ACID or BASE. While products like ACID and BASE are limited to browsing Snort alerts and...
Topics: Shmoocon, 2006, Richard Bejtlich, Network Security Monitoring
Hacker Conferences
Jun 12, 2011 Laurent Butti and Franck Veysset
movies

eye 146

favorite 1

comment 0

Wireless intrusions like rogue access points, injection and mac spoofing attack are a common way to obtain unauthorized access to corporate or hot spot networks. In this presentation, we will first do a quick reminder on WiFi attacks (packet injection, rogue AP...). We will then present some new tools, and released them at Shmoocon: Raw Fake AP Raw Glue AP Mysterious tool!!! As a conclusion, we will highlight some detection/mitigation mechanisms. Franck Veysset is a network security expert...
Hacker Conferences
Jun 12, 2011 Cazz
movies

eye 35

favorite 0

comment 0

Hacker Conferences
Jun 12, 2011 Renderman, Thorn, Dutch, and Joshua Wright
movies

eye 301

favorite 0

comment 0

The Church of Wifi has been hard at work in the last 6 months. At what, we aren't sure. When we woke up we found we had some projects lying around we thought we'd share. Breaking WPA-PSK is possible with coWPAtty, but trying to do so onsite can be time consuming and boring. All that waiting around for things to be computed each and every time we want to check for dumb and default passwords. Well, we're impatient and like to know the password NOW! So we came up with a 'jdumas' tool to do this...
Hacker Conferences
Jun 12, 2011 Jon Callas
movies

eye 46

favorite 0

comment 0

If you build it, someone's going to break it. That's life. If you break it, you want to get someone to fix it. How do we get the builders and breakers to work together, cooperatively? News stories are filled with builders and breakers having bad relationships that cause bad press, law suits, and worse for one, the other, or both. This session is about how to do this better. How to get bug reports and not look like an idiot. How to tell people what you broke without looking like a miscreant. The...
Hacker Conferences
Jun 12, 2011 Damin
movies

eye 83

favorite 0

comment 0

Asterisk is both an open source toolkit for telephony applications and a full-featured PBX. Asterisk is quickly following in the footsteps of Apache, sendmail and icecast. This session provides an overview of Asterisk and provides examples of scenarios where Asterisk can supplant traditional, expensive, proprietary PBX technology. It also provides an overview of the Asterisk community and how it has developed over the years. The content is presented in an easy to digest format that is suitable...
Hacker Conferences
Jun 13, 2011 Elonka Dunin
movies

eye 218

favorite 0

comment 0

In a courtyard at CIA Headquarters stands an encrypted sculpture called Kryptos. Its thousands of characters contain encoded messages, three of which have been solved. The fourth part, 97 or 98 characters at the very bottom, have withstood cryptanalysis for over a decade. The artist who created Kryptos, James Sanborn, has also created other encrypted sculptures such as the decade-old Cyrillic Projector, which was cracked in 2003 by an international team led by Elonka Dunin. This talk is...
Hacker Conferences
Jun 13, 2011 Matt Fisher
movies

eye 49

favorite 0

comment 0

Hacker Conferences
Jun 13, 2011 Fyodor
movies

eye 291

favorite 1

comment 0

While many security practitioners use Nmap, few understand its full power. Nmap deserves part of the blame for being too helpful. A simple command such as "nmap scanme.insecure.org" leaves Nmap to choose the scan type, timing details, target ports, output format, source ports and addresses, and more. You can even specify -iR (random input) and let Nmap choose the targets! Hiding all of these details makes Nmap easy to use, but also easy to grow complacent with. Many people never...
Hacker Conferences
Jun 13, 2011 Jennifer Granick
movies

eye 46

favorite 0

comment 0

Jennifer Stisa Granick joined Stanford Law School in January 2001, as Lecturer in Law and Executive Director of the Center for Internet and Society (CIS). She teaches, speaks and writes on the full spectrum of Internet law issues including computer crime and security, national security, constitutional rights, and electronic surveillance, areas in which her expertise is recognized nationally. Granick came to Stanford after almost a decade practicing criminaldefense law in California. Her...
Hacker Conferences
Jun 13, 2011 Ike
movies

eye 150

favorite 0

comment 0

Early unix mainframe computing brought elegant process and resource sharing systems which helped get more application use out of expensive hardware. These concerns have been largely been pushed aside in computing with the rise of desktop PCs, and large farms of ever-shrinking pizza boxes in the data center. Today, as more punch gets packed into 1u than ever, server resources can be further consolidated and abstracted to securely separate complex and sophisticated services in the same hardware...
Hacker Conferences
Jun 13, 2011 Dan Kaminsky
movies

eye 67

favorite 0

comment 0

Our networks are growing. Is our understanding of them? This talk will focus on the monitoring and defense of very large scale networks, describing mechanisms for actively probing them and systems that may evade our most detailed probes. We will analyze these techniques in the context of how IPv6 affects, or fails to affect them. A number of technologies will be discussed, including: New findings in our worldwide scans of the DNS infrastructure Mechanisms for very high speed reconstruction of...
Hacker Conferences
Jun 13, 2011 Johnny Long
movies

eye 158

favorite 0

comment 0

The Shmoo Group has decided to play a bit of a prank on Johnny. Come watch him jump through flaming hoola-hoops while dodging high-powered fully-automatic Shmooballs and giving three different presentations in one! Johnny Long is a "clean-living" family guy who just so happens to like hacking stuff. Over the past two years, Johnny's most visible focus has been on this Google hacking "thing" which has served as yet another diversion to a serious (and bill-paying) job as a...
Hacker Conferences
movies

eye 49

favorite 0

comment 0

Steve Manzuik has more than 13 thirteen years of experience in the information technology and security industry, with a particular emphasis on operating systems and network devices. In 2001, Mr. Manzuik founded and was the technical lead for Entrench Technologies. Prior to Entrench, Mr. Manzuik was a manager in Ernst & Young's Security & Technology Solutions practice, where he was the solution line leader for the Canadian Penetration Testing Practice. Before joining Ernst & Young,...
Hacker Conferences
Jun 13, 2011 Lance James
movies

eye 103

favorite 0

comment 0

In 2003, the concept of the age-old megavirus changed. Agobot, Sasser, Berbew, Haxdoor, mitgleider, and many more that some will never hear about have been flying across IDS systems for the past two years. This type of malicious software contains certain unique elements and arrive in multiple variants enabling a more clandestine-like activity, as well as prolonging the lifespan of effectivity thwarting detection by AV vendors. Can reasonable [or practical] counter-measures be built? Signature...
Hacker Conferences
Jun 13, 2011 Adrian Marinescu
movies

eye 157

favorite 0

comment 0

All applications and operating systems have coding errors and we have seen technical advances both in attack and mitigation sophistication as more security vulnerabilities are exploiting defects related to application and OS memory and heap usage. Starting with W2k3 and XP/ SP2 Windows incorporated technologies to reduce the reliability of such attacks. The heap manager in Windows Vista pushes the innovation much further in this area. This talk will describe the challenges the heap team faced...
Hacker Conferences
Jun 13, 2011 Shawn Merdinger
movies

eye 67

favorite 0

comment 0

This presentation will be a continuation of my presentation at 32nd CSI. My presentation for ShmooCon will build on the Level one analysis outlined at CSI to include more attacks and threat analysis (i.e. Levels two and Level three). Shawn Merdinger is a security researcher based in Austin, Texas. He is currently employed by TippingPoint, a division of 3Com, where he conducts VoIP security analysis. He previously was a Research Engineer with Cisco Systems' Security Technologies Assessment Team...
Hacker Conferences
Jun 13, 2011 Dan Moniz and Patrick Stach
movies

eye 74

favorite 0

comment 0

In late 2004, a few Shmoo, at the suggestion of Beetle, started working in earnest on using RainbowCrack to generate the entirety of the LanMan keyspace, with the intent of breaking LanMan once and for all. Chief in this was work done by snax and Dan Moniz, who pooled around 120 CPUs combined at the high point of the collaboration to run rtgen jobs to build the datasets, which was completed by ShmooCon 2005. Further work was done by other Shmoo especially in the areas of sorting and storing the...
Hacker Conferences
Jun 13, 2011 Jim Noble
movies

eye 37

favorite 0

comment 0

Outbound Content Compliance is a growing industry within Information Security. This area of control watches traffic and data in networks to scan the content for potential violations of policy. With the increase in visibility of personal data loss, organizations are increasingly coming under fire to tighten their controls, and ensure data privacy to the consumer. Today, several 1st generation products provide the visibility to the "data leakage", providing the ability to modify...
Hacker Conferences
Jun 13, 2011 Simple Nomad
movies

eye 143

favorite 0

comment 0

Simple Nomad is an internationally recognized security expert, and has written and released a wide variety of advisories, tools, and white papers involving computer security. Founder of NMRC, an international hacking group, he also works by day at Vernier Networks where his job is to slice and dice computers and the networks they reside on. He frequently speaks at security conferences, has been quoted in the New York Times, Washington Post, CNN, a bunch of Internet news outlets, and is an...
Hacker Conferences
Jun 13, 2011 Deviant Ollam
movies

eye 428

favorite 0

comment 0

Physical security isn't just a concern of the IT world. Besides securing server rooms, locks of all sizes and styles are scattered throughout our lives. However, much of the general public is unaware of the insecurities present in many lock designs. Through discussion and direct example, Deviant Ollam will address the strengths and weaknesses of the locks we see everyday securing doors, bikes, guns, computers, and more. Discussion of effective tools, experimental techniques, advanced picking...
Hacker Conferences
Jun 13, 2011 Michael Rash
movies

eye 100

favorite 0

comment 0

This talk will demonstrate some recent advances in Single Packet Authorization (SPA) as implemented by fwknop. In particular, a working demonstration of code that implements the following new capabilities will be presented: A patch to OpenSSH that integrates the fwknop client directly. Integration of GPG key rings as an optional replacement for the symmetric Rijndael algorithm. The ability to require additional authorization credentials such as those required by LDAP and UNIX crypt() on the...
Hacker Conferences
Jun 13, 2011 Jason Scott
movies

eye 240

favorite 0

comment 0

"This con sucks. In fact, every con sucks. Every con was better last year, and that con sucked too." While this sort of discussion takes place at hundreds of bars, hotel rooms and meeting spaces every year, it would be a good thing to have a solid body of knowledge about the history of hacker conferences, their roots and pre-roots, and trends they show as both a cultural event and context in the world. Inspired by Beetle's speech on Shmoocon held while at Shmoocon, discussing the...
Topics: Shmoocon, 2006, Jason Scott, History, ConCon
Hacker Conferences
Jun 13, 2011 Eldon Sprickerhoff
movies

eye 116

favorite 0

comment 0

Over the last few months I have had the opportunity to test several commercial wireless IDS/IPS on behalf of a client. There are several marketing key points that most products profess to offer and trumpet: Detection of rogue AP's Detection of ad hoc networks Recognize known attacks Identify policy violations Identify physical location of user/AP Capture network traffic Threat detection (MAC address spoofing, DoS, MiTM) Lock out inappropriate behavior through wireless disassociation and/or...
Hacker Conferences
Jun 13, 2011 Eric Smith
movies

eye 94

favorite 0

comment 0

Network security at layer two is often overlooked because many administrators do not consider attacks from within to be a credible threat. This philosophy may apply to carefully firewalled data centers, but universities and other institutional settings are particularly vulnerable to attacks at layer two. Furthermore, nearly all wireless networks, even those employing WPA or 802.1x, can fall victim to the inherent trust designs of the underlying ethernet protocols. In this presentation we will...
Hacker Conferences
Jun 13, 2011 Joe Stewart
movies

eye 166

favorite 0

comment 0

The amount of malware being propagated in the wild is growing to staggering proportions. Many people are aware of the problem and would like to help stem the tide, but without significant skills in debugging and assembly language, most are left to simple "strings" analysis or VMWare-based sandbox behavioral analysis. The malware authors have responded by packing their creations with an ever-increasing array of packers, and utilizing sandbox-detection techniques to prevent themselves...
The GET LAMP Interview Archives
Jun 20, 2011 Jason Scott
movies

eye 920

favorite 0

comment 0

A quick rush out the door at 9am, and I was on my way to Brunswick, Maine, to interview Chuck Benton, creator of the infamous adult text adventure game, "Softporn Adventure". I got there at 11:55, just a few hairs short of the appointed time. His company (which he founded) had recently moved to new digs in Brunswick, inside a renovated factory, and he had a great corner office overlooking a loud, thundery dam (which I took a picture of, both from my car and from his window). Lighting...
Topics: Chuck Benton, Softporn, GET LAMP, Text Adventure
The GET LAMP Interview Archives
Jun 22, 2011
movies

eye 756

favorite 0

comment 1

Interview with Warren Robinett for the GET LAMP documentary, conducted in San Jose on November 15, 2007. After multiple attempts to schedule an interview with Robinett, who travels frequently for his work, an opportunity came to interview him in California. Conducted at the home of Christian Wirth, Robinett answered a number of questions related to the creation of Adventure, an Atari 2600 game inspired by Crowther and Woods' Adventure. In creating the game, Robinett pioneered a number of...
favoritefavoritefavoritefavorite ( 1 reviews )
Topics: GET LAMP, Warren Robinett, Easter Egg, Atari, Adventure
The GET LAMP Interview Archives
Jun 23, 2011 Jason Scott
movies

eye 1,448

favorite 0

comment 0

John Romero is probably best known as the co-founder of iD Software and co-creator of Doom and Quake (and Commander Keen). But his game experience extends back to the era of the Apple II and before. While reveling in the golden age of video games, his friend told him that there were games for free at the local college, and there they discovered the family of games now considered classics: Hunt the Wumpus, "Poison Cookie" and a game which turned out to be Adventure. He was inspired...
Topics: GET LAMP, John Romero
The GET LAMP Interview Archives
Jun 28, 2011 Jason Scott
movies

eye 1,541

favorite 0

comment 0

Scott Adams is considered one of the giants of adventure games, especially text-based adventures (The Scott Adams Grand Adventures (SAGA) series is especially cited). He is the founder of Adventure International, which sold software for a variety of platforms, mostly involving entertainment. This company grew wildly through the early 1980s but eventually went bankrupt in the inevitable industry shake-out, but should be considered one of the top "old-school" microcomputer software...
Topics: GET LAMP, Scott Adams, Adventure International, Text Adventures
The GET LAMP Interview Archives
Jun 29, 2011 Jason Scott
movies

eye 372

favorite 0

comment 0

Mike Roberts is the creator of TADS (Text Adventure Development System), one of the most popular game development systems. As one of the creators of commercial text adventure products in the 1990s, his perspective was invaluable for understanding the waning context of these games at that time. TADS continues to be developed and is considered a nearest competitor to the Inform system.
Topics: GET LAMP, Mike Roberts, Text Adventures, TADS
The GET LAMP Interview Archives
Jun 30, 2011 Jason Scott
movies

eye 1,063

favorite 1

comment 0

Bob Supnik represents a kind of interview I take great pride in: "Obscure, but critical". Even within text adventure circles, his name is not as well known as that of Don Woods, Willie Crowther, Scott Adams, or others. Yet Supnik holds an important place in the history of text adventures - while employed at DEC (Digital Equipment Corporation), he found the engineers enthralled with Adventure, but wanted to be able to play the game on something other than a mainframe, which had all...
Topics: GET LAMP, Bob Supnik, Zork, Adventure, ADVENT
The GET LAMP Interview Archives
Jul 8, 2011 Jason Scott
movies

eye 278

favorite 1

comment 0

When recording dozens of interviews for a documentary, a few are going to have notably less footage than the others, for no major reason other than time constraints and subject matter. While Mike Sousa is very scant in the GET LAMP movie and bonus features, he gave an excellent interview, the clips from which are finally available here. Mike Sousa's most notable feature to me that caused me to seek him out was his method of collaborating with other authors for most of his work; he'd worked with...
Topics: GET LAMP, Mike Sousa, Text Adventures, Interactive Fiction, Interviews
The GET LAMP Interview Archives
Jul 8, 2011 Jason Scott
movies

eye 495

favorite 2

comment 0

Lance Micklus was one of my favorite experiences of all the interviews and production run of GET LAMP. As the founder of Lance Micklus, Inc., he was right there at the start of the computer game revolution, one of the small mom-and-pop software houses that put out games for computers, in his case mostly the TRS-80. His company had employees, put out a number of products that were advertised in magazines of the time, and he even did work with Scott Adams and Adventure International. The main...
Topics: GET LAMP, Lance Micklus, Lance Micklus Associates, Text Adventure, TRS-80
The GET LAMP Interview Archives
Jul 8, 2011 Jason Scott
movies

eye 495

favorite 0

comment 0

One of the more common questions and statements made when I was discussing the production of GET LAMP was what role MUDs would play in the final work. MUDs, or Multi-User-Dimensions, or Multi-User-Dungeons (or Multi-Undergraduate Destroyers) were compelling, text-based worlds that took the world by storm starting in the 1970s and then attracting a mass of new adherents in the late 1980s and early 1990s with the introduction of many college students to the internet. Now, as it turns out, while...
Topics: GET LAMP, Jim Aspnes, TinyMUD, Interview, Text Adventures, Interactive Fiction
The GET LAMP Interview Archives
Jul 8, 2011 Jason Scott
movies

eye 465

favorite 0

comment 0

Stephen Granade is one of the rare writers who was paid, for some amount of time, to write about Interactive Fiction regularly. While employed by about.com, he maintained a section on the subject, including links and essays. With the closure/ending of his time with about.com, he still had the rights to his works and used this as the foundation for a new site, Brass Lantern, which reviews and analyzes interactive fiction. Granade is also the current maintainer/organizer of The Annual IF...
Topics: GET LAMP, Stephen Granade, Interview, IFcomp, Brass Lantern, Text Adventures, Interactive Fiction
The GET LAMP Interview Archives
Jul 10, 2011 Jason Scott
movies

eye 349

favorite 0

comment 0

Robb Sherwin goes by a number of names and aliases, both in his capacity as IF author and as website curator. He has a deep interest in Interactive Fiction, and has created a collection of modern IF from 1999 onward, moving between Inform and HUGO languages, as well as simulating the Magnetic Scrolls style of half-graphic half-text IF. He has also given a presentation on IF with Paul O'Brian and is a talented writer in general. Sherwin's self-written biography, from a 2006 presentation he gave...
Topics: GET LAMP, Get Lamp Interview
Videogame Videos
Jul 11, 2011 Jason Scott
movies

eye 1,025

favorite 0

comment 0

The Penny Arcade Expo 2007 was the fourth Penny Arcade Expo (PAX) and the first to be held at the Washington State Convention and Trade Center. By some measures, it was the year it became the largest gamer-focused convention, filling over 130,000 square feet of space with exhibits, lectures, musical concerts and gaming rooms. It was held August 24-27. This is a collection of footage shot by Jason Scott with a newly acquired HD handheld camera (a Canon HV-20) of various PAX-related events and...
Topics: Penny Arcade Expo, MC Frontalot, Jonathan Coulton, LAN Party, Cosplay, Convention, Video Games
Away From Keyboard
movies

eye 654

favorite 0

comment 0

From Nick F. Farr: There are some parts of me that simply refuse to believe that dankaye is gone. First, Dan was genuinely happy. Since he started his work with Americorps, he's been happier than at any other time I've known him. Over e-mail these past few weeks, it wasn't hard to see that Dan was really enjoying himself. Dan was living a higher purpose, one he sought throughout his life and seemed to elude him until now. Dan had a good group of people he called friends, a spot on the planet...
The GET LAMP Interview Archives
Jul 13, 2011 Jason Scott
movies

eye 399

favorite 0

comment 0

Several people had suggested I meet up with Mike Gentry - his work, Anchorhead, had itself turned a bunch of heads with its style, emotion, and approach. While one can never really tell what someone is "first" and "second", he seemed a great writer first who happened to use interactive fiction to tell one of his stories, not unlike Adam Cadre with Photopia. So we made an arrangement to meet in Virginia, at his home. You never know how things will turn out for any interview,...
Topics: GET LAMP, Interview, Mike Gentry, Interactive Fiction, Text Adventures
GDC Extras Archive
Jul 14, 2011 Jason Scott
movies

eye 434

favorite 0

comment 0

Many of the GDC tapes are BetacamSP format and subject to problems involving the magnetic signal. While the audio is not quite as noticeable, the video image can show a fluttery, milky overlay to the original recording. By applying a flicker reduction filter via Virtualdub, the time cost in re-rendering the material is made up for by the increase in quality. This demonstration shows a single range of tape before and after the filtering. The speaker is Ernest Adams, discussing games as art.
Topics: Tech Demo, Virtualdub, Flicker, Filter